how should operators challenge for the softfor the soft...

46
How should operators challenge How should operators challenge How should operators challenge How should operators challenge for the Soft for the Soft for the Soft for the Soft- - -5G 5G 5G 5G? ? ? June 10, 2016 June 10, 2016 June 10, 2016 June 10, 2016 KDDI KDDI KDDI KDDI R&D Laboratories Inc., Chairman R&D Laboratories Inc., Chairman R&D Laboratories Inc., Chairman R&D Laboratories Inc., Chairman Dr. Dr. Dr. Dr. Fumio Watanabe Fumio Watanabe Fumio Watanabe Fumio Watanabe 2nd IEEE Conference on Network 2nd IEEE Conference on Network 2nd IEEE Conference on Network 2nd IEEE Conference on Network Softwarization Softwarization Softwarization Softwarization ( ( (NetSoft NetSoft NetSoft NetSoft 2016) 2016) 2016) 2016) Workshop on Software Defined 5G Networks Workshop on Software Defined 5G Networks Workshop on Software Defined 5G Networks Workshop on Software Defined 5G Networks

Upload: nguyenkhanh

Post on 14-Mar-2018

218 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

How should operators challenge How should operators challenge How should operators challenge How should operators challenge for the Softfor the Softfor the Softfor the Soft----5G5G5G5G????

June 10, 2016June 10, 2016June 10, 2016June 10, 2016

KDDI KDDI KDDI KDDI R&D Laboratories Inc., ChairmanR&D Laboratories Inc., ChairmanR&D Laboratories Inc., ChairmanR&D Laboratories Inc., Chairman

Dr. Dr. Dr. Dr. Fumio WatanabeFumio WatanabeFumio WatanabeFumio Watanabe

2nd IEEE Conference on Network 2nd IEEE Conference on Network 2nd IEEE Conference on Network 2nd IEEE Conference on Network SoftwarizationSoftwarizationSoftwarizationSoftwarization ((((NetSoftNetSoftNetSoftNetSoft 2016)2016)2016)2016)Workshop on Software Defined 5G NetworksWorkshop on Software Defined 5G NetworksWorkshop on Software Defined 5G NetworksWorkshop on Software Defined 5G Networks

Page 2: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

1

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

AbstractAbstractAbstractAbstract

“5G” mobile networks are required to cope with diverse requirements not only enhanced mobile broadband but also massive-machine type communication and ultra-reliable/low latency communication.

How “5G” network can be super flexible would be the most essential. Software defined networking is undoubtedly one of the key for next generation network expecting flexibility, scalability, cost reduction, rapid service provisioning, and etc.

However, SDN is really challenging from a view point of operators to handle huge scale of the network and devices.

This talk will examine these expectations and challenges from an operator’s perspective. And it will cover typical approaches how to effectively apply SDN to commercial networks.

Page 3: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

2

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Today’s Topics Today’s Topics Today’s Topics Today’s Topics

1.1.1.1. For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”

2.2.2.2. For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”

3.3.3.3. For new For new For new For new “Operation Style” “Operation Style” “Operation Style” “Operation Style”

4.4.4.4. For “Security For “Security For “Security For “Security and Privacyand Privacyand Privacyand Privacy””””

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 4: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

3

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Expectation to Network Expectation to Network Expectation to Network Expectation to Network SoftwarizationSoftwarizationSoftwarizationSoftwarization

� Rapid service provisioningRapid service provisioningRapid service provisioningRapid service provisioning

– Easy virtual machine instance creation and function installation.

� Flexible extensionFlexible extensionFlexible extensionFlexible extension

– Command-based traffic-control policy enforcement

– Classification and directing user traffic to build service over functions

� Granular isolation of workloadGranular isolation of workloadGranular isolation of workloadGranular isolation of workload

– Virtual machine-based workload Isolation

– CPU core and NIC ports-based resource unit

� Cost reductionCost reductionCost reductionCost reduction

– CAPX by commonly-implemented servers

– OPEX by command line interface to Management and Controlling service system

Page 5: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

4

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Today’s Topics Today’s Topics Today’s Topics Today’s Topics

1.1.1.1. For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”

2.2.2.2. For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”

3.3.3.3. For new For new For new For new “Operation Style” “Operation Style” “Operation Style” “Operation Style”

4.4.4.4. For “Security For “Security For “Security For “Security and Privacyand Privacyand Privacyand Privacy””””

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 6: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

5

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

2.Massive-Machine TypeCommunication

2.Massive-Machine TypeCommunication

3.Ultra-reliable and Low Latency Communication

3.Ultra-reliable and Low Latency Communication

1.Enhanced Mobile Broadband1.Enhanced Mobile Broadband

Source: ITU-R WP5D, Rev. 1 to Document 5D/TEMP/625-E, 17 June 2015

Three User Three User Three User Three User ScenariosScenariosScenariosScenarios by ITUby ITUby ITUby ITU----R WP5DR WP5DR WP5DR WP5D

Page 7: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

6

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Global Mobile data traffic Global Mobile data traffic Global Mobile data traffic Global Mobile data traffic (Cisco)(Cisco)(Cisco)(Cisco)

24.3

16.1

10.7

6.8

4.22.5

� Overall mobile data traffic is expected to grow to Overall mobile data traffic is expected to grow to Overall mobile data traffic is expected to grow to Overall mobile data traffic is expected to grow to 24.3 24.3 24.3 24.3 exabytes per exabytes per exabytes per exabytes per month by month by month by month by 2019, 2019, 2019, 2019, nearly an nearly an nearly an nearly an 10101010----fold fold fold fold increase over increase over increase over increase over 2014201420142014. . . .

� Mobile Mobile Mobile Mobile data traffic will grow at a data traffic will grow at a data traffic will grow at a data traffic will grow at a CAGR of CAGR of CAGR of CAGR of 57 57 57 57 percent from percent from percent from percent from 2014 2014 2014 2014 to to to to 2019201920192019....

http://www.cisco.com/c/en/us/solutions/collateral/servicehttp://www.cisco.com/c/en/us/solutions/collateral/servicehttp://www.cisco.com/c/en/us/solutions/collateral/servicehttp://www.cisco.com/c/en/us/solutions/collateral/service----provider/visualprovider/visualprovider/visualprovider/visual----networkingnetworkingnetworkingnetworking----indexindexindexindex----vni/white_paper_c11vni/white_paper_c11vni/white_paper_c11vni/white_paper_c11----520862.pdf520862.pdf520862.pdf520862.pdf

Page 8: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

7

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Extreme Concentration of TrafficExtreme Concentration of TrafficExtreme Concentration of TrafficExtreme Concentration of Traffic

IkebukuroIkebukuroIkebukuroIkebukuro

ShinjukuShinjukuShinjukuShinjuku

GinzaGinzaGinzaGinza

SSSShibuyahibuyahibuyahibuya

ShinagawaShinagawaShinagawaShinagawa

HourHourHourHour

Traffic Density

Tokyo MetropolisTokyo MetropolisTokyo MetropolisTokyo Metropolis

High

Low

Traffic Traffic Traffic Traffic blows up locally in particular time and locations. blows up locally in particular time and locations. blows up locally in particular time and locations. blows up locally in particular time and locations.

100m X100m mesh100m X100m mesh100m X100m mesh100m X100m mesh

Page 9: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

8

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

In the Super Bowl 2015In the Super Bowl 2015In the Super Bowl 2015In the Super Bowl 2015

25,93625,93625,93625,936 unique devicesunique devicesunique devicesunique devices connecting to the network on game day, with a a a a

peak concurrent usage of peak concurrent usage of peak concurrent usage of peak concurrent usage of 17,32217,32217,32217,322. (72,219 in total)

very high very high very high very high density trafficdensity trafficdensity trafficdensity traffic

Many 4K/8K realMany 4K/8K realMany 4K/8K realMany 4K/8K real----time video in the Y2020time video in the Y2020time video in the Y2020time video in the Y2020

Page 10: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

10

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

True True True True Challenge for Challenge for Challenge for Challenge for Enhanced Enhanced Enhanced Enhanced Mobile Mobile Mobile Mobile BroadbandBroadbandBroadbandBroadband

� Microscopic system capacity Microscopic system capacity Microscopic system capacity Microscopic system capacity to cope with to cope with to cope with to cope with extreme extreme extreme extreme high density high density high density high density traffic traffic traffic traffic in particular in particular in particular in particular time and locations time and locations time and locations time and locations

� Robustness to handle extreme busty trafficRobustness to handle extreme busty trafficRobustness to handle extreme busty trafficRobustness to handle extreme busty traffic

� Robustness of CRobustness of CRobustness of CRobustness of C----planeplaneplaneplane

Macroscopic system capacity to cope Macroscopic system capacity to cope Macroscopic system capacity to cope Macroscopic system capacity to cope with macro data explosionwith macro data explosionwith macro data explosionwith macro data explosion

� Higher frequency band Higher frequency band Higher frequency band Higher frequency band

� Hot spots and small cellHot spots and small cellHot spots and small cellHot spots and small cell

� DDDDirectional beam by adaptive beam forming irectional beam by adaptive beam forming irectional beam by adaptive beam forming irectional beam by adaptive beam forming

� Flexible resource management on radio & networkFlexible resource management on radio & networkFlexible resource management on radio & networkFlexible resource management on radio & network

� CCCC----plane capacity and separated design of Cplane capacity and separated design of Cplane capacity and separated design of Cplane capacity and separated design of C----plane & Dplane & Dplane & Dplane & D----planeplaneplaneplane

� New architecture for robust CNew architecture for robust CNew architecture for robust CNew architecture for robust C----planeplaneplaneplane

Page 11: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

11

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Higher Frequency BandsHigher Frequency BandsHigher Frequency BandsHigher Frequency Bands

Higher frequency band Higher frequency band Higher frequency band Higher frequency band with wider bandwidthwith wider bandwidthwith wider bandwidthwith wider bandwidth

� WRCWRCWRCWRC----2019 will discuss to 2019 will discuss to 2019 will discuss to 2019 will discuss to identify 5G spectrum above identify 5G spectrum above identify 5G spectrum above identify 5G spectrum above 6GHz.6GHz.6GHz.6GHz.

� 28GHz band would be a candidate 5G band which may be used in 28GHz band would be a candidate 5G band which may be used in 28GHz band would be a candidate 5G band which may be used in 28GHz band would be a candidate 5G band which may be used in near future.near future.near future.near future.

88880GHz0GHz0GHz0GHz50GHz50GHz50GHz50GHz 60GHz60GHz60GHz60GHz 70GHz70GHz70GHz70GHz40GHz40GHz40GHz40GHz

4GHz4GHz4GHz4GHz1GHz1GHz1GHz1GHz 2GHz2GHz2GHz2GHz 3GHz3GHz3GHz3GHz

40GHz40GHz40GHz40GHz10GHz10GHz10GHz10GHz 20GHz20GHz20GHz20GHz 30GHz30GHz30GHz30GHz

Total : about 600MHzTotal : about 600MHzTotal : about 600MHzTotal : about 600MHzExample of existing assignmentExample of existing assignmentExample of existing assignmentExample of existing assignment (Japan)(Japan)(Japan)(Japan)

Huge bandwidth may be availableHuge bandwidth may be availableHuge bandwidth may be availableHuge bandwidth may be available

http://www.telecomtv.com/articles/5g/ericsson-previews-its-mwc-activities-with-gigabit-lte-13244/

Ericsson at MWC 2016

Page 12: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

12

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

How to use Higher Frequency BandsHow to use Higher Frequency BandsHow to use Higher Frequency BandsHow to use Higher Frequency Bands (1)(1)(1)(1)

How to use such high frequency bands for mobile services?How to use such high frequency bands for mobile services?How to use such high frequency bands for mobile services?How to use such high frequency bands for mobile services?

1.1.1.1. Beam Forming Beam Forming Beam Forming Beam Forming

2.2.2.2. Short range, Spots & Gates, IndoorShort range, Spots & Gates, IndoorShort range, Spots & Gates, IndoorShort range, Spots & Gates, Indoor

ExampleExampleExampleExample 20202020×20 cm array antenna20 cm array antenna20 cm array antenna20 cm array antenna

800MHz800MHz800MHz800MHz1 antenna1 antenna1 antenna1 antenna

2 GHz2 GHz2 GHz2 GHz4 antennas4 antennas4 antennas4 antennas

10 GHz10 GHz10 GHz10 GHz100 antennas100 antennas100 antennas100 antennas

22220 GHz0 GHz0 GHz0 GHz400 antennas400 antennas400 antennas400 antennas

http://www.samsung.com/global/business/networks/insights/news/samsung-demonstrates-a-trio-of-5g-technology-candidates-at-mwc-2015

Full Dimension Multiple Input Multiple Output

Page 13: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

13

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

How to use Higher Frequency BandsHow to use Higher Frequency BandsHow to use Higher Frequency BandsHow to use Higher Frequency Bands (2)(2)(2)(2)

How to use such high frequency bands for mobile services?How to use such high frequency bands for mobile services?How to use such high frequency bands for mobile services?How to use such high frequency bands for mobile services?

1.1.1.1. Beam Forming Beam Forming Beam Forming Beam Forming

2.2.2.2. Short range, Short range, Short range, Short range, Spots & GatesSpots & GatesSpots & GatesSpots & Gates, Indoor, Indoor, Indoor, Indoor

10Gbps Spots10Gbps Spots10Gbps Spots10Gbps Spotsbbbburst transmissionurst transmissionurst transmissionurst transmission

Page 14: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

14

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

How can “5G” utilize mmHow can “5G” utilize mmHow can “5G” utilize mmHow can “5G” utilize mm----wave Spots?wave Spots?wave Spots?wave Spots?BackgroundBackgroundBackgroundBackground

� WRCWRCWRCWRC----19 will identify 5G spectrum above 6GHz, e.g. mm19 will identify 5G spectrum above 6GHz, e.g. mm19 will identify 5G spectrum above 6GHz, e.g. mm19 will identify 5G spectrum above 6GHz, e.g. mm----wave.wave.wave.wave.

� To provide higher throughput, e.g. 10Gbps, higher frequency To provide higher throughput, e.g. 10Gbps, higher frequency To provide higher throughput, e.g. 10Gbps, higher frequency To provide higher throughput, e.g. 10Gbps, higher frequency bands, e.g. mmbands, e.g. mmbands, e.g. mmbands, e.g. mm----wave, will be usedwave, will be usedwave, will be usedwave, will be used

� Cell size will be smaller like a “spot”Cell size will be smaller like a “spot”Cell size will be smaller like a “spot”Cell size will be smaller like a “spot”

� Sojourn Sojourn Sojourn Sojourn time at a spot would be very short, e.g. < 1stime at a spot would be very short, e.g. < 1stime at a spot would be very short, e.g. < 1stime at a spot would be very short, e.g. < 1s

Can we fully utilize 10Gbps radio Can we fully utilize 10Gbps radio Can we fully utilize 10Gbps radio Can we fully utilize 10Gbps radio “spots” by existing 3GPP network “spots” by existing 3GPP network “spots” by existing 3GPP network “spots” by existing 3GPP network architecture and protocols?architecture and protocols?architecture and protocols?architecture and protocols?

10Gbps Spots10Gbps Spots10Gbps Spots10Gbps Spotsbbbburst transmissionurst transmissionurst transmissionurst transmission

Video

Page 15: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

15

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Challenge for New Network ArchitectureChallenge for New Network ArchitectureChallenge for New Network ArchitectureChallenge for New Network Architecture

mmmmmmmm----wave access Gate wave access Gate wave access Gate wave access Gate 2. Prediction of

the next Gate

4. Burst transmission at the Gate

1. Transmission on 4G

DL request

Server

4G-LTE

4G-LTE

mm-wave

backhaul

3. Pre-transmission to the Gate

SwitchingSwitchingSwitchingSwitching----free by sessionfree by sessionfree by sessionfree by session----less communication less communication less communication less communication � aggregate the different transmission methodsaggregate the different transmission methodsaggregate the different transmission methodsaggregate the different transmission methods

� burst transmission and congestionburst transmission and congestionburst transmission and congestionburst transmission and congestion----control based on control based on control based on control based on CCN & ICNCCN & ICNCCN & ICNCCN & ICN....

�Mobile Edge ComputingMobile Edge ComputingMobile Edge ComputingMobile Edge Computing CCN (Content-centric Network) ICN (Information Centric Networking)

Video

Page 16: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

16

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Today’s Topics Today’s Topics Today’s Topics Today’s Topics

1.1.1.1. For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”

2.2.2.2. For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”

3.3.3.3. For new For new For new For new “Operation Style” “Operation Style” “Operation Style” “Operation Style”

4.4.4.4. For “Security For “Security For “Security For “Security and Privacyand Privacyand Privacyand Privacy””””

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 17: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

17

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

True Challenge for Network FlexibilityTrue Challenge for Network FlexibilityTrue Challenge for Network FlexibilityTrue Challenge for Network Flexibility

Source:ITUSource:ITUSource:ITUSource:ITU----R WP5D R WP5D R WP5D R WP5D Revision Revision Revision Revision 3 3 3 3 totototo Document Document Document Document 5D/TEMP/5485D/TEMP/5485D/TEMP/5485D/TEMP/548----EEEE

“Super Flexibility” for diverse demand & requirement“Super Flexibility” for diverse demand & requirement“Super Flexibility” for diverse demand & requirement“Super Flexibility” for diverse demand & requirement� Devices: Smart Phone, IoT, M2M, drone, etc.

� Traffic pattern: data/signaling heavy, profile, spiky, UPL/DNL, etc.

� Security requirement

� Business segment: Consumer, Enterprise, MVNO/MVNE, OTT, etc.

� Connectivity: Internet, dedicated, private, limited area

Page 18: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

18

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Network FlexibilityNetwork FlexibilityNetwork FlexibilityNetwork Flexibility

1111

2222

3333 Quick network Quick network Quick network Quick network configuration configuration configuration configuration & & & & advanced network operationadvanced network operationadvanced network operationadvanced network operation

Flexible network Flexible network Flexible network Flexible network configuration & constructionconfiguration & constructionconfiguration & constructionconfiguration & construction

Virtualization, NFVVirtualization, NFVVirtualization, NFVVirtualization, NFVService Service Service Service ChainingChainingChainingChaining

To cope with a variety of network demandsTo cope with a variety of network demandsTo cope with a variety of network demandsTo cope with a variety of network demands

Sliced NetworkSliced NetworkSliced NetworkSliced Network

Virtualization, Virtualization, Virtualization, Virtualization, NFVNFVNFVNFVMANO : Management MANO : Management MANO : Management MANO : Management & & & & OrchestrationOrchestrationOrchestrationOrchestration

To cope with a variety of user wants and demands for To cope with a variety of user wants and demands for To cope with a variety of user wants and demands for To cope with a variety of user wants and demands for advanced network servicesadvanced network servicesadvanced network servicesadvanced network servicesTo cope with a variety of user wants and demands for To cope with a variety of user wants and demands for To cope with a variety of user wants and demands for To cope with a variety of user wants and demands for advanced network servicesadvanced network servicesadvanced network servicesadvanced network services

Page 19: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

19

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Network FlexibilityNetwork FlexibilityNetwork FlexibilityNetwork Flexibility

VirtualizationVirtualizationVirtualizationVirtualization Slice NWSlice NWSlice NWSlice NW MECMECMECMEC

Mobile Mobile Mobile Mobile NetworkNetworkNetworkNetwork

CloudCloudCloudCloud

APPAPPAPPAPP

APPAPPAPPAPP

APPAPPAPPAPP APPAPPAPPAPP

APPAPPAPPAPP

APPAPPAPPAPP

DataDataDataDataDataDataDataDataDataDataDataDataAPPAPPAPPAPPAPPAPPAPPAPP

Edge computingEdge computingEdge computingEdge computing

CacheCacheCacheCacheInternetInternetInternetInternet

NFV InfrastructureNFV InfrastructureNFV InfrastructureNFV InfrastructureVirtualVirtualVirtualVirtual

ManagerManagerManagerManager

VirtualVirtualVirtualVirtualInfrastructureInfrastructureInfrastructureInfrastructure

ManagerManagerManagerManager

OrchestratorOrchestratorOrchestratorOrchestratorOSS/BSSOSS/BSSOSS/BSSOSS/BSS

Virtual Network Virtual Network Virtual Network Virtual Network FunctionFunctionFunctionFunction

VNFVNFVNFVNFManagerManagerManagerManager

NFV NFV NFV NFV Reference ModelReference ModelReference ModelReference Model

� Core Network will smoothly migrate from existing 4G coreCore Network will smoothly migrate from existing 4G coreCore Network will smoothly migrate from existing 4G coreCore Network will smoothly migrate from existing 4G core

� Evolving by use of NFV/SDN, Slice architecture, Mobile edge computing, etc.Evolving by use of NFV/SDN, Slice architecture, Mobile edge computing, etc.Evolving by use of NFV/SDN, Slice architecture, Mobile edge computing, etc.Evolving by use of NFV/SDN, Slice architecture, Mobile edge computing, etc.

Page 20: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

20

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

DECORE DECORE DECORE DECORE (Dedicated Core) (Dedicated Core) (Dedicated Core) (Dedicated Core)

� 3GPP Release 13 specification3GPP Release 13 specification3GPP Release 13 specification3GPP Release 13 specification

� RAN connects multiple Core Networks using same PLMNRAN connects multiple Core Networks using same PLMNRAN connects multiple Core Networks using same PLMNRAN connects multiple Core Networks using same PLMN----IDIDIDID

� Easy migration from existing EPC Easy migration from existing EPC Easy migration from existing EPC Easy migration from existing EPC

� Device can connect one CNDevice can connect one CNDevice can connect one CNDevice can connect one CN

CN for smartphoneCN for smartphoneCN for smartphoneCN for smartphone

MMEMMEMMEMME SGWSGWSGWSGW PGWPGWPGWPGW

CN for CarCN for CarCN for CarCN for Car

MMEMMEMMEMME SGWSGWSGWSGW PGWPGWPGWPGW

CN for Smart CN for Smart CN for Smart CN for Smart IoTIoTIoTIoT devicesdevicesdevicesdevices

MMEMMEMMEMME SGWSGWSGWSGW PGWPGWPGWPGW

RANRANRANRAN

Page 21: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

21

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

NGMN Sliced Network NGMN Sliced Network NGMN Sliced Network NGMN Sliced Network (5GMN)(5GMN)(5GMN)(5GMN)

https://www.google.co.jp/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjfuOfbp7_KAhWB2qYKHUjGCfsQFggdMAA&url=https%3A%2F%2Fwww.ngmn.org%2Fuploads%2Fmedia%2FNGMN_5G_White_Paper_V1_0.pdf&usg=AFQjCNGNch54aACgPl1U1Uit2fmBUBbcQw&sig2=Uip3j3-fqUoBLlTf4ipe-A&cad=rja

NGMN 5G White NGMN 5G White NGMN 5G White NGMN 5G White PaperPaperPaperPaper

� Multiple logical networks are defined on a physical network.Multiple logical networks are defined on a physical network.Multiple logical networks are defined on a physical network.Multiple logical networks are defined on a physical network.

� Logical networks are isolated each other for tier user traffic and operation.Logical networks are isolated each other for tier user traffic and operation.Logical networks are isolated each other for tier user traffic and operation.Logical networks are isolated each other for tier user traffic and operation.

� Separate Core & RANSeparate Core & RANSeparate Core & RANSeparate Core & RAN

Page 22: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

22

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Dynamic Sliced Network Dynamic Sliced Network Dynamic Sliced Network Dynamic Sliced Network (5GMF)(5GMF)(5GMF)(5GMF)

� EndEndEndEnd----totototo----endendendend logical networks through Core to RANlogical networks through Core to RANlogical networks through Core to RANlogical networks through Core to RAN

� Dynamic configuration Dynamic configuration Dynamic configuration Dynamic configuration for various services, applications, and/or groupsfor various services, applications, and/or groupsfor various services, applications, and/or groupsfor various services, applications, and/or groups

Page 23: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

23

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Slice NW 1Slice NW 1Slice NW 1Slice NW 1Slice NW 1Slice NW 1Slice NW 1Slice NW 1

Slice NW 2Slice NW 2Slice NW 2Slice NW 2Slice NW 2Slice NW 2Slice NW 2Slice NW 2

Slice NW 3Slice NW 3Slice NW 3Slice NW 3Slice NW 3Slice NW 3Slice NW 3Slice NW 3

Logically separated Networks on a Physical network and Physical devices

Full Sliced NetworksFull Sliced NetworksFull Sliced NetworksFull Sliced Networks

Many logical networks having different nature will Many logical networks having different nature will Many logical networks having different nature will Many logical networks having different nature will be be be be provided to suite different demands and conditions.provided to suite different demands and conditions.provided to suite different demands and conditions.provided to suite different demands and conditions.

The Internet

Cloud

Logical Device Soft Defined Access Soft Defined Core

Logical Slice: not only core NW but also RAN and Logical Slice: not only core NW but also RAN and Logical Slice: not only core NW but also RAN and Logical Slice: not only core NW but also RAN and DDDDevicesevicesevicesevices

Page 24: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

24

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Full Sliced Full Sliced Full Sliced Full Sliced Networks Networks Networks Networks exampleexampleexampleexample

Networks for Connected CarNetworks for Connected CarNetworks for Connected CarNetworks for Connected Car

1. For Control1. For Control1. For Control1. For Control1. For Control1. For Control1. For Control1. For Control Car manufacturerCar manufacturerCar manufacturerCar manufacturer

2. SW update 2. SW update 2. SW update 2. SW update 2. SW update 2. SW update 2. SW update 2. SW update Car manufacturerCar manufacturerCar manufacturerCar manufacturer

3333----1111. Sensor car. Sensor car. Sensor car. Sensor car3333----1111. Sensor car. Sensor car. Sensor car. Sensor car Car manufacturerCar manufacturerCar manufacturerCar manufacturer

4. Entertainment4. Entertainment4. Entertainment4. Entertainment4. Entertainment4. Entertainment4. Entertainment4. Entertainment The InternetThe InternetThe InternetThe Internet

Sliced NetworksSliced NetworksSliced NetworksSliced Networks

1.1.1.1. For Control : low For Control : low For Control : low For Control : low llllatency, high reliability, closed NWatency, high reliability, closed NWatency, high reliability, closed NWatency, high reliability, closed NW

2.2.2.2. SW update : big fileSW update : big fileSW update : big fileSW update : big file, DL, c, DL, c, DL, c, DL, certification ertification ertification ertification of of of of contents, delay tolerant, closedcontents, delay tolerant, closedcontents, delay tolerant, closedcontents, delay tolerant, closed

3.3.3.3. Sensor car : upSensor car : upSensor car : upSensor car : up----link, small data, frequent, real time/non real timelink, small data, frequent, real time/non real timelink, small data, frequent, real time/non real timelink, small data, frequent, real time/non real time

4.4.4.4. Entertainment : Internet, best effort, Entertainment : Internet, best effort, Entertainment : Internet, best effort, Entertainment : Internet, best effort, SP sponsored/user SP sponsored/user SP sponsored/user SP sponsored/user chargechargechargecharge

3333----2222. Sensor car. Sensor car. Sensor car. Sensor car3333----2222. Sensor car. Sensor car. Sensor car. Sensor car Service ProviderService ProviderService ProviderService Provider

One physical deviceOne physical deviceOne physical deviceOne physical deviceMultiple logical deviceMultiple logical deviceMultiple logical deviceMultiple logical device

Page 25: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

25

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Today’s Topics Today’s Topics Today’s Topics Today’s Topics

1.1.1.1. For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”

2.2.2.2. For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”

3.3.3.3. For new For new For new For new “Operation Style” “Operation Style” “Operation Style” “Operation Style”

4.4.4.4. For “Security For “Security For “Security For “Security and Privacyand Privacyand Privacyand Privacy””””

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 26: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

26

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Challenges to Network Challenges to Network Challenges to Network Challenges to Network SoftwarizationSoftwarizationSoftwarizationSoftwarization

� Requires new operation style different from current comm. system. Requires new operation style different from current comm. system. Requires new operation style different from current comm. system. Requires new operation style different from current comm. system.

designing implementing deploying managing maintaining

SDN

New operation style:Command-based deployment & operation

Service operation process

� Building a clear policy of function granularity and best combination Building a clear policy of function granularity and best combination Building a clear policy of function granularity and best combination Building a clear policy of function granularity and best combination of functionsof functionsof functionsof functions– 3GPP function set suit non-network softwarized implementation

– Network softwarization allows various function splits.

SGW

MMEHSS

PGW

PCRF

SoftwarizedSoftwarizedSoftwarizedSoftwarized mobile coremobile coremobile coremobile core

MME SGW

PGWPCRF

Session backup

Traffic Control

Tunnel Mng.

DB

Current mobile coreCurrent mobile coreCurrent mobile coreCurrent mobile core(4G mobile system)(4G mobile system)(4G mobile system)(4G mobile system)

Page 27: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

27

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Approach to leveraging network Approach to leveraging network Approach to leveraging network Approach to leveraging network softwarizationsoftwarizationsoftwarizationsoftwarization

1.1.1.1. NewNewNewNew----style operationstyle operationstyle operationstyle operation

� Parallel deployment of current and softwarized comm. systems

• Double standard system operations over migration period

• Network softwarization includes replacing equip. of fundamental transport

� Softwarized comm. system gradually develops in this migration phase.

• In each steps of development, the automated deploying, managing and

maintaining

SoftwarizedSoftwarizedSoftwarizedSoftwarizedmobile coremobile coremobile coremobile core

Current Current Current Current mobile coremobile coremobile coremobile core

Current Current Current Current mobile coremobile coremobile coremobile core

Manual procedure while current

mobile core exists

New-style (command-based)operation to softwarized

mobile core

Manual procedure in detail steps in current mobile core operation

Dedicated CoreDedicated CoreDedicated CoreDedicated Core(3GPP Rel(3GPP Rel(3GPP Rel(3GPP Rel----13)13)13)13)

Updating process

Page 28: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

28

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Approach to leveraging network Approach to leveraging network Approach to leveraging network Approach to leveraging network softwarizationsoftwarizationsoftwarizationsoftwarization

2.2.2.2. Simple architectureSimple architectureSimple architectureSimple architectureIn terms system operation, simple is the best

1) Function split 1: split by state info., aggregating functions into long-live, short-lived and no state-info. Group

2) Function split 2: split by services, aggregating functions into dedicated service system (slice NW).

Integrating various sub-functions into three types of functions

integrating sub-functions into a single function with a role of dedicated comm. system

Data plane : Data plane : Data plane : Data plane : no no no no statestatestatestate

Control plane : Control plane : Control plane : Control plane : shortshortshortshort----lived lived lived lived statestatestatestate

Database layer : Database layer : Database layer : Database layer : longlonglonglong----lived lived lived lived statestatestatestate

HSSHSSHSSHSS PCRFPCRFPCRFPCRF

MMEMMEMMEMME SGWSGWSGWSGW----CCCC PGWPGWPGWPGW----CCCC

PGWPGWPGWPGW----DDDDSGWSGWSGWSGW----DDDD

Function split 1Function split 1Function split 1Function split 1 Function split 2Function split 2Function split 2Function split 2

Slice 1Slice 1Slice 1Slice 1

PGW1

MME1

SGW1

PGW1

Slice Slice Slice Slice 2222 Slice Slice Slice Slice 3333

Database layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layer

PGW2

MME2

SGW2

PGW2 PGW3

MME3

SGW3

PGW3

Page 29: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

29

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Way of KDDIWay of KDDIWay of KDDIWay of KDDI

� Developing a platform allowing automating implementation of comm. system from the given architecture.

– Common features as software libraries: database, and control- and data-planes

– Common Orchestrator to control and mange multiple comm. systems

SoftwarizedSoftwarizedSoftwarizedSoftwarizedmobile coremobile coremobile coremobile core

ArchitectureArchitectureArchitectureArchitecture

eNB

HSS PCRF

PGWSGW

MME

MME HSS SGW PGWPCR

F

Platform automatically Platform automatically Platform automatically Platform automatically implementing system implementing system implementing system implementing system

Data plane

Control plane

Database layer

Redundancy

Status statistics

Admission Ctrl.Common orchestratorCommon orchestratorCommon orchestratorCommon orchestrator

rapidly sensing state change by rapidly sensing state change by rapidly sensing state change by rapidly sensing state change by distributed OSS includeddistributed OSS includeddistributed OSS includeddistributed OSS included

Sys. 1Sys. 1Sys. 1Sys. 1

PGW1

MME1

SGW1

PGW1

Sys. 2Sys. 2Sys. 2Sys. 2 Sys. 3Sys. 3Sys. 3Sys. 3

Database layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layer

PGW2

MME2

SGW2

PGW2 PGW3

MME3

SGW3

PGW3

Orchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSS

Page 30: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

30

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Development of Orchestrator Development of Orchestrator Development of Orchestrator Development of Orchestrator

The Best Adoption of The Best Adoption of The Best Adoption of The Best Adoption of Framework AwardFramework AwardFramework AwardFramework AwardAT&T, Orange, KDDI R&D Laboratories, IBM,

Nokia, Cisco, Tech Mahindra and Hewlett-Packard “Recover First, Resolve Next: Closed Loop Control for Managing Hybrid Networks.”

NICE 1-4 Jun 2015

Common physical infra.Common physical infra.Common physical infra.Common physical infra.

AI for monitoring systemAI for monitoring systemAI for monitoring systemAI for monitoring system

KDDI R&D Labs., HP Wind River, Brocade

Sys. 1Sys. 1Sys. 1Sys. 1

MME

PGW1

MME1

SGW1

PGW1

Sys. 2Sys. 2Sys. 2Sys. 2 Sys. 3Sys. 3Sys. 3Sys. 3

Database layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layerDatabase layer

MME

PGW2

MME2

SGW2

PGW2

MME

PGW3

MME3

SGW3

PGW3

Orchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSSOrchestrator: SDN & OSS

Analysis to detect failureAnalysis to detect failureAnalysis to detect failureAnalysis to detect failure

Instantaneous makeInstantaneous makeInstantaneous makeInstantaneous make----beforebeforebeforebefore----break and recovery break and recovery break and recovery break and recovery through rapid analysis of through rapid analysis of through rapid analysis of through rapid analysis of

fault signs by AIfault signs by AIfault signs by AIfault signs by AI

Page 31: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

31

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Today’s Topics Today’s Topics Today’s Topics Today’s Topics

1.1.1.1. For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”

2.2.2.2. For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”

3.3.3.3. For new For new For new For new “Operation Style” “Operation Style” “Operation Style” “Operation Style”

4.4.4.4. For “Security For “Security For “Security For “Security and Privacyand Privacyand Privacyand Privacy””””

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 32: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

32

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

SoftSoftSoftSoft----5G NW5G NW5G NW5G NW SecuritySecuritySecuritySecurity ChallengeChallengeChallengeChallenge

�Network Network Network Network softwarizationsoftwarizationsoftwarizationsoftwarization� MalwareMalwareMalwareMalware

� BugBugBugBug

� Security holeSecurity holeSecurity holeSecurity hole

�Logical Sliced NWs Logical Sliced NWs Logical Sliced NWs Logical Sliced NWs ((((Logically separated Logically separated Logically separated Logically separated NWs)NWs)NWs)NWs)

≠ ≠ ≠ ≠ physically separated NWs from security point of viewphysically separated NWs from security point of viewphysically separated NWs from security point of viewphysically separated NWs from security point of view

==== DDoS attack for one sliced NW may impact for other NWsDDoS attack for one sliced NW may impact for other NWsDDoS attack for one sliced NW may impact for other NWsDDoS attack for one sliced NW may impact for other NWs

= may have additional week points = may have additional week points = may have additional week points = may have additional week points

�OrchestratorOrchestratorOrchestratorOrchestrator= may have additional week points = may have additional week points = may have additional week points = may have additional week points

Page 33: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

33

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

M2M M2M M2M M2M connections connections connections connections forecast forecast forecast forecast (GSMA)(GSMA)(GSMA)(GSMA)

� Low cost devices will boost Low cost devices will boost Low cost devices will boost Low cost devices will boost IoTIoTIoTIoT marketmarketmarketmarket

2015.9.12015.9.12015.9.12015.9.1CatCatCatCat----1 module by 1 module by 1 module by 1 module by GemaltoGemaltoGemaltoGemalto

2017?2017?2017?2017?CatCatCatCat----M devicesM devicesM devicesM devices

Source : GSMA Intelligence, Cellular M2M forecasts, 2015.2https://gsmaintelligence.com/research/2015/02/cellular-m2m-forecasts-unlocking-growth/457/

3GPP Rel-12Cat 0

3GPP Rel-13Cat M

Page 34: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

34

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Operator ChallengesOperator ChallengesOperator ChallengesOperator Challenges

1.1.1.1. Radio AccessRadio AccessRadio AccessRadio Access� Module CostModule CostModule CostModule Cost

� Battery LifeBattery LifeBattery LifeBattery Life

� Number of ConnectionNumber of ConnectionNumber of ConnectionNumber of Connection

� CapacityCapacityCapacityCapacity

� Better Coverage Better Coverage Better Coverage Better Coverage

� Signaling and TrafficSignaling and TrafficSignaling and TrafficSignaling and Traffic

2.2.2.2. NetworkNetworkNetworkNetwork� “Super Flexibility” for diverse demand & “Super Flexibility” for diverse demand & “Super Flexibility” for diverse demand & “Super Flexibility” for diverse demand & requirementrequirementrequirementrequirement

� Sliced Logical NWSliced Logical NWSliced Logical NWSliced Logical NW

3.3.3.3. Security and PrivacySecurity and PrivacySecurity and PrivacySecurity and Privacy

4.4.4.4. BusinessBusinessBusinessBusiness

Page 35: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

35

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

ChallengeChallengeChallengeChallenge for Massivefor Massivefor Massivefor Massive----Machine Machine Machine Machine Type CommunicationType CommunicationType CommunicationType Communication

Module CostModule CostModule CostModule Cost

Battery LifeBattery LifeBattery LifeBattery Life

ConnectionsConnectionsConnectionsConnections

Better CoverageBetter CoverageBetter CoverageBetter Coverage

CapacityCapacityCapacityCapacity

e.g. 7,000 more smart meters are connected to one sector

e.g. 10 years life by AA batteries for gas meters

e.g. 5$ modules extend the market and application

e.g. smaller antenna, single antenna, low output power

e.g. different type of traffic, control channel heavy

Page 36: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

36

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Variety of Variety of Variety of Variety of IoTIoTIoTIoT requirement for Networkrequirement for Networkrequirement for Networkrequirement for Network

High rate (Mbps)High rate (Mbps)High rate (Mbps)High rate (Mbps)

Low rate (kbps)Low rate (kbps)Low rate (kbps)Low rate (kbps)

0000

1000100010001000

2000200020002000

3000300030003000

IntermittentIntermittentIntermittentIntermittent SteadySteadySteadySteady

Signage

Smart meter

Monitoring camera

Steady Sensor

Number of devices in a sector

Example of use caseExample of use caseExample of use caseExample of use case

� Density & total numberDensity & total numberDensity & total numberDensity & total number� Average bit rate & peak bit rateAverage bit rate & peak bit rateAverage bit rate & peak bit rateAverage bit rate & peak bit rate� Steady or IntermittentSteady or IntermittentSteady or IntermittentSteady or Intermittent� Real time or delay tolerantReal time or delay tolerantReal time or delay tolerantReal time or delay tolerant

� Uplink and/or DownlinkUplink and/or DownlinkUplink and/or DownlinkUplink and/or Downlink� Error toleranceError toleranceError toleranceError tolerance� Security levelSecurity levelSecurity levelSecurity level� Cost balanceCost balanceCost balanceCost balance

Page 37: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

37

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

IoTIoTIoTIoT Security related activitiesSecurity related activitiesSecurity related activitiesSecurity related activities

� GSMA : GSMA : GSMA : GSMA : A set of A set of A set of A set of IoTIoTIoTIoT Security Guidelines, CLP.11, CLP.12, CLP.13, CLP.14Security Guidelines, CLP.11, CLP.12, CLP.13, CLP.14Security Guidelines, CLP.11, CLP.12, CLP.13, CLP.14Security Guidelines, CLP.11, CLP.12, CLP.13, CLP.14

� OneM2M : OneM2M : OneM2M : OneM2M : Security Common Security Common Security Common Security Common Service Service Service Service FunctionFunctionFunctionFunction

� AllseenAllseenAllseenAllseen Alliance : Alliance : Alliance : Alliance : AllJoyn AllJoyn AllJoyn AllJoyn IoTIoTIoTIoT Framework/Security FunctionalityFramework/Security FunctionalityFramework/Security FunctionalityFramework/Security Functionality

� Open Interconnect Open Interconnect Open Interconnect Open Interconnect Consortium : Consortium : Consortium : Consortium : OIC security specificationOIC security specificationOIC security specificationOIC security specification

� TTC : TTC : TTC : TTC : SSSSecurity structure in HEMSecurity structure in HEMSecurity structure in HEMSecurity structure in HEMS

� Thread GroupThread GroupThread GroupThread Group

� Industrial Industrial Industrial Industrial Internet Internet Internet Internet ConsortiumConsortiumConsortiumConsortium

� ・・・

Page 38: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

38

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Security Security Security Security RRRRisks for isks for isks for isks for IoTIoTIoTIoT

http://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/

FBI alert about smart meter hacks

Electric power Electric power Electric power Electric power thefts thefts thefts thefts that related that related that related that related to to to to smart smart smart smart meter meter meter meter deploymentdeploymentdeploymentdeployment in in in in Puerto Puerto Puerto Puerto RicoRicoRicoRico

Page 39: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

39

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

IoTIoTIoTIoT Privacy RisksPrivacy RisksPrivacy RisksPrivacy Risks

Oliver Parson, et al, “Non-intrusive Load Monitoring using Prior Models of General Appliance Types”,

www.ices.cmu.edu/psii/nilm/abstracts/parson_Southampton_NILM2012_abstract.pdf

NISTIR 7628, “Guidelines for Smart Grid Cybersecurity”

Using Hidden Markov Models (HMM) to Using Hidden Markov Models (HMM) to Using Hidden Markov Models (HMM) to Using Hidden Markov Models (HMM) to Produce an Appliance Produce an Appliance Produce an Appliance Produce an Appliance DisaggregationDisaggregationDisaggregationDisaggregation

ffffor example: smart meter or example: smart meter or example: smart meter or example: smart meter

� Useful information not only for Useful information not only for Useful information not only for Useful information not only for smart grid but also other smart grid but also other smart grid but also other smart grid but also other applications, e.gapplications, e.gapplications, e.gapplications, e.g. . . . home parcel home parcel home parcel home parcel delivery delivery delivery delivery service, home service, home service, home service, home security security security security service, service, service, service, advertisement delivery, advertisement delivery, advertisement delivery, advertisement delivery, etc.etc.etc.etc.

� Privacy risks through deep Privacy risks through deep Privacy risks through deep Privacy risks through deep analysis, e.g. appliance analysis, e.g. appliance analysis, e.g. appliance analysis, e.g. appliance disaggregation, life styledisaggregation, life styledisaggregation, life styledisaggregation, life style, family , family , family , family makemakemakemake----upupupup, , , , absent or at absent or at absent or at absent or at home, home, home, home, etc.etc.etc.etc.

Page 40: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

40

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Security and Privacy ChallengeSecurity and Privacy ChallengeSecurity and Privacy ChallengeSecurity and Privacy Challenge

� Limited computational resource and communication Limited computational resource and communication Limited computational resource and communication Limited computational resource and communication capabilitycapabilitycapabilitycapability

� Device managementDevice managementDevice managementDevice management– Large scale device configuration, service orderLarge scale device configuration, service orderLarge scale device configuration, service orderLarge scale device configuration, service order– PersonalizationPersonalizationPersonalizationPersonalization– Physical device managementPhysical device managementPhysical device managementPhysical device management

� Long life timeLong life timeLong life timeLong life time– 10 Year more life cycle, e.g. social infrastructure, car, etc.10 Year more life cycle, e.g. social infrastructure, car, etc.10 Year more life cycle, e.g. social infrastructure, car, etc.10 Year more life cycle, e.g. social infrastructure, car, etc.– Security designSecurity designSecurity designSecurity design, e.g. cryptograph, key, considering long life time, e.g. cryptograph, key, considering long life time, e.g. cryptograph, key, considering long life time, e.g. cryptograph, key, considering long life time

� Means to take the agreement of the Means to take the agreement of the Means to take the agreement of the Means to take the agreement of the useruseruseruser

� OOOOwner wner wner wner of the data of the data of the data of the data acquiredacquiredacquiredacquired

� Privacy Policy ManagerPrivacy Policy ManagerPrivacy Policy ManagerPrivacy Policy Manager

Page 41: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

41

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Business Challenge for Business Challenge for Business Challenge for Business Challenge for OperatorsOperatorsOperatorsOperators

NetworkNetworkNetworkNetwork

Big DATA

PPMPrivacy Policy

Manager

� Average revenue per Average revenue per Average revenue per Average revenue per IoTIoTIoTIoT device would be quite low. device would be quite low. device would be quite low. device would be quite low. IoTIoTIoTIoT is not the is not the is not the is not the transmission service.transmission service.transmission service.transmission service.

� “Wants” of “Wants” of “Wants” of “Wants” of IoTIoTIoTIoT customers customers customers customers are to are to are to are to utilize big data information and to find utilize big data information and to find utilize big data information and to find utilize big data information and to find new value.new value.new value.new value.

� “Value” of Operators;“Value” of Operators;“Value” of Operators;“Value” of Operators;

1.1.1.1. Secure NW = ValueSecure NW = ValueSecure NW = ValueSecure NW = ValueTo provide the best suited secure NWs for various To provide the best suited secure NWs for various To provide the best suited secure NWs for various To provide the best suited secure NWs for various IoTIoTIoTIoT needs, e.g. by sliced needs, e.g. by sliced needs, e.g. by sliced needs, e.g. by sliced logical NW,logical NW,logical NW,logical NW,

2.2.2.2. Reliable Company = ValueReliable Company = ValueReliable Company = ValueReliable Company = ValueTo provide big data manager, PPM and To provide big data manager, PPM and To provide big data manager, PPM and To provide big data manager, PPM and other management functionsother management functionsother management functionsother management functions

� What operator should do; What operator should do; What operator should do; What operator should do;

1.1.1.1. Move Move Move Move away from being product focused away from being product focused away from being product focused away from being product focused to being more service to being more service to being more service to being more service focusedfocusedfocusedfocused

2.2.2.2. Utilize Big Data analytics over timeUtilize Big Data analytics over timeUtilize Big Data analytics over timeUtilize Big Data analytics over time

Page 42: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

42

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Key MessageKey MessageKey MessageKey Message

1.1.1.1. For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”For full utilization of high speed “Hot Spots”

� Higher frequency bands, e.g. mmHigher frequency bands, e.g. mmHigher frequency bands, e.g. mmHigher frequency bands, e.g. mm----wavewavewavewave

� Very small area like “spot” and “gate”Very small area like “spot” and “gate”Very small area like “spot” and “gate”Very small area like “spot” and “gate”

� Very short sojourn time at a spotVery short sojourn time at a spotVery short sojourn time at a spotVery short sojourn time at a spot

� Inefficient existing 3GPP protocols Inefficient existing 3GPP protocols Inefficient existing 3GPP protocols Inefficient existing 3GPP protocols

� ICN/CCN based architectureICN/CCN based architectureICN/CCN based architectureICN/CCN based architecture

� Mobile Edge ComputingMobile Edge ComputingMobile Edge ComputingMobile Edge Computing

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 43: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

43

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Key MessageKey MessageKey MessageKey Message

2.2.2.2. For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”For “Extreme Flexibility”

� Diverse demand & requirementDiverse demand & requirementDiverse demand & requirementDiverse demand & requirement

� “Super Flexible” : fundamental for 5G NW“Super Flexible” : fundamental for 5G NW“Super Flexible” : fundamental for 5G NW“Super Flexible” : fundamental for 5G NW

� Smooth migration from existing NWSmooth migration from existing NWSmooth migration from existing NWSmooth migration from existing NW

� “Logical Sliced NW”, end“Logical Sliced NW”, end“Logical Sliced NW”, end“Logical Sliced NW”, end----totototo----end slice end slice end slice end slice

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 44: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

44

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Key MessageKey MessageKey MessageKey Message

3.3.3.3. For For For For new new new new “Operation Style“Operation Style“Operation Style“Operation Style””””

� SoftwarizationSoftwarizationSoftwarizationSoftwarization rrrrequires equires equires equires new operation style different new operation style different new operation style different new operation style different from from from from current NWcurrent NWcurrent NWcurrent NW

� SoftwarizationSoftwarizationSoftwarizationSoftwarization nnnneeds a clear eeds a clear eeds a clear eeds a clear policy of function policy of function policy of function policy of function granularity and best combination of granularity and best combination of granularity and best combination of granularity and best combination of functionsfunctionsfunctionsfunctions

� Parallel deployment Parallel deployment Parallel deployment Parallel deployment of current one and Softof current one and Softof current one and Softof current one and Soft----5G5G5G5G

� Dedicated Core Dedicated Core Dedicated Core Dedicated Core would be a initial stepwould be a initial stepwould be a initial stepwould be a initial step

� OrchestratorOrchestratorOrchestratorOrchestrator is the keyis the keyis the keyis the key

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 45: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the

45

IEEE NetSoft 2016, 2016/06/10, Copyright@2016 KDDI R&D Laboratories Inc., All Right Reserved Confidential

Key MessageKey MessageKey MessageKey Message

4.4.4.4. For “Security For “Security For “Security For “Security and Privacy”and Privacy”and Privacy”and Privacy”

� Security is the key for the SoftSecurity is the key for the SoftSecurity is the key for the SoftSecurity is the key for the Soft----5G5G5G5G

� Security is the key Security is the key Security is the key Security is the key for for for for IoTIoTIoTIoT with limited computational with limited computational with limited computational with limited computational resource and communication capabilityresource and communication capabilityresource and communication capabilityresource and communication capability

� Privacy risk for Privacy risk for Privacy risk for Privacy risk for IoTIoTIoTIoT

� Privacy Policy Privacy Policy Privacy Policy Privacy Policy Manager Manager Manager Manager is the keyis the keyis the keyis the key

� Value of operator is “secure NW” and “reliable Value of operator is “secure NW” and “reliable Value of operator is “secure NW” and “reliable Value of operator is “secure NW” and “reliable operation”operation”operation”operation”

Challenge for the SoftChallenge for the SoftChallenge for the SoftChallenge for the Soft----5G 5G 5G 5G –––– operator viewpoint operator viewpoint operator viewpoint operator viewpoint ----

Page 46: How should operators challenge for the Softfor the Soft ...dpnm.postech.ac.kr/netsoft2016/workshops/workshop3/IEEE_Soft5G_F... · How should operators challenge for the Softfor the