Internet DRAFT - draft-netslices-usecases

draft-netslices-usecases







None                                                    K. Makhijani, ed
Internet-Draft                                                    J. Qin
Intended status: Informational                              R. Ravindran
Expires: April 21, 2018                              Huawei Technologies
                                                                 L. Geng
                                                            China Mobile
                                                                L. Qiang
                                                                 S. Peng
                                                     Huawei Technologies
                                                               X. de Foy
                                                               A. Rahman
                                                       InterDigital Inc.
                                                                A. Galis
                                               University College London
                                                             G. Fioccola
                                                          Telecom Italia
                                                        October 18, 2017


  Network Slicing Use Cases: Network Customization and Differentiated
                                Services
                      draft-netslices-usecases-02

Abstract

   Network Slicing is meant to enable creating (end-to-end) partitioned
   network infrastructure that may include the user equipment, access/
   core transport networks, edge and central data center resources to
   provide differentiated connectivity behaviors to fulfill the
   requirements of distinct services, applications and customers.  In
   this context, connectivity is not restricted to differentiated
   forwarding capabilities but it covers also advanced service functions
   that will be invoked when transferring data within a given domain.

   The purpose of this document is to focus on use cases that benefit
   from the use of network slicing.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.





Makhijani, ed, et al.    Expires April 21, 2018                 [Page 1]

Internet-Draft            Netslicing use cases              October 2017


   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 21, 2018.

Copyright Notice

   Copyright (c) 2017 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   3
     1.2.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  A Generalized Network Slice as a Service  . . . . . . . . . .   6
     3.1.  Resource Centric Service Concept  . . . . . . . . . . . .   6
     3.2.  Strict Resource Demand  . . . . . . . . . . . . . . . . .   7
     3.3.  Network Customization . . . . . . . . . . . . . . . . . .   7
     3.4.  NSaaS of Different Granularity  . . . . . . . . . . . . .   7
     3.5.  Service customization across multi-provider multi-domains
           as NSaaS  . . . . . . . . . . . . . . . . . . . . . . . .   8
   4.  Network Slicing in 3GPP Mobile Network  . . . . . . . . . . .  10
     4.1.  Network Slices in 3GPP Systems  . . . . . . . . . . . . .  10
     4.2.  Creating, Managing and Operating 3GPP Network Slices  . .  11
   5.  Role of Virtualization in Network slicing . . . . . . . . . .  12
     5.1.  Virtualized Customer Premise Equipment  . . . . . . . . .  12
     5.2.  Enhanced Broadband  . . . . . . . . . . . . . . . . . . .  14
   6.  Services with Resource Assurance  . . . . . . . . . . . . . .  16
     6.1.  Massive Machine to Machine Communication  . . . . . . . .  16
     6.2.  Ultra-reliable Low Latency Communication  . . . . . . . .  18
     6.3.  Critical Communications . . . . . . . . . . . . . . . . .  20
   7.  Network Infrastructure for new technologies . . . . . . . . .  23
     7.1.  ICN as a Network Slice  . . . . . . . . . . . . . . . . .  23
     7.2.  New Verticals - ICN based service delivery  . . . . . . .  24



Makhijani, ed, et al.    Expires April 21, 2018                 [Page 2]

Internet-Draft            Netslicing use cases              October 2017


       7.2.1.  Required Characteristics  . . . . . . . . . . . . . .  25
   8.  Overall Use Case Analysis . . . . . . . . . . . . . . . . . .  26
     8.1.  Requirements Reference  . . . . . . . . . . . . . . . . .  26
     8.2.  Mapping Common characteristics to Requirements  . . . . .  26
   9.  Conclusion  . . . . . . . . . . . . . . . . . . . . . . . . .  28
   10. Security Considerations . . . . . . . . . . . . . . . . . . .  28
   11. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  29
   12. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  29
   13. References  . . . . . . . . . . . . . . . . . . . . . . . . .  29
     13.1.  Normative References . . . . . . . . . . . . . . . . . .  29
     13.2.  Informative References . . . . . . . . . . . . . . . . .  30
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  31

1.  Introduction

   Network Slicing enables the creation of (end-to-end) partitioned
   network infrastructure that may include the user equipment, access/
   core transport networks, edge and central data center resources to
   provide differentiated connectivity behaviors to fulfill the
   requirements of distinct services, applications and customers.  In
   this context, connectivity is not restricted to differentiated
   forwarding capabilities but it also spans service, management and
   control plane support offered to a slice instance.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119.

1.2.  Terminology

   Please refer to [I-D.geng-netslices-architecture] for related
   terminologies and definitions.

   Additionally, the following terms are used:

   o  V2X (Vehicle-to-everything): Is a communication of information
      from a vehicle to any other entity that may be another vehicle,
      road-side network element or application end point.

   o  ITS (Intelligent Transportation Systems): Considered as an aspect
      of how using Internet of Things resource like road sensors can
      creates a smart transport network.  The network offers services
      related to transport and traffic management systems through flow
      of information between road-side sensors, vehicles, smart devices
      and humans.




Makhijani, ed, et al.    Expires April 21, 2018                 [Page 3]

Internet-Draft            Netslicing use cases              October 2017


   o  Over-the-top (OTT): A service, e.g., content delivery using a CDN
      or a social networking service, operated by a different service
      providers to which the users of the NSP service are attached to,
      and to whom it serves as a communication (or bit pipe) provider

   o  Industry vertical: A collection of services or tools specific to
      an industry, trade or market sector. also, referred to as Service
      Verticals in this document.

   o  TETRA: Terrestrial trunked radio is a digital trunked mobile radio
      standard to meet needs of public safety, transportation and
      utilities like organizations.

   o  SLA: Service Level Agreement - A contract between a service
      provider and an end user that stipulates a specified level of
      service, support option, a guaranteed level of system performance
      as relates to downtime or up-time.

2.  Scope

   To maximize resource utilization and minimize infrastructure cost,
   services will need to operate over a shared network infrastructure,
   as against the traditional monolithic model operated either as
   dedicated network or as an overlay.  Service operators can utilize or
   benefit from Network Slicing through multi-tenancy, enabling
   different customized network infrastructures for different group of
   services across different network domains and operating them
   independently.

   In this document, multi-domain refers to combination of different
   kinds of connection-technology network domains.  For example, it may
   be a RAN, DSL etc. in access; a fixed, wireless or mobile service
   provider network; as well as different technology domains, in
   transport networks such as carrier Ethernet, optical, MPLS, TE-tunnel
   etc.  Often, a combination of technology domains is under the same
   administrator's control but may also belong to different
   administrative systems and may require cross-domain coordination.

   The document covers generalized as well as resource guaranteed
   service scenarios that can benefit by applying Network Slicing
   principles as below in Figure 1










Makhijani, ed, et al.    Expires April 21, 2018                 [Page 4]

Internet-Draft            Netslicing use cases              October 2017


                      ----------------------------
                     | Network Slice as a Service |
                      ----------------------------
                                     |                       _______
                    -----------------|----------------_----->| 3GPP |
                    |                |               |       |______|
                    |                |               |
                    |                |               |
          __________+______    ______+______  _______+__________
          | Customization |    |  Resource |  |      New       |
          |               |    | assurance |  |   Technologies |
          |_______________|    |___________|  |________________|
                   /\                 /\                |
                  /| \               / |\               |
                 / |  \             /  | \              |
           _____/_ |  _\_____  ____/___| _\______   ____|__
          | vCPE | | | 5GEX  | | mMTC || | uRLLC |  | ICN |
          |______| | |_______| |______|| |_______|  |_____|
                   |                   |
                   |                   |
               ____|___             ___|___
               | eMBB |             | MCS |
               |______|             |_____|


              Figure 1: Use case organization in the document

   The remaining document is organized as below:

   o  In Section 3, Network Slice as a Service(NSaaS) delivery model is
      described.

   o  Section 3.5, is a scenario for multi-domain network slice
      coordination.

   o  In Section 4, 3GPP architecture for 5G is discussed as a use case
      so that those requirements may be taken into consideration during
      slicing activities in IETF.

   o  Other use cases are discussed from 2 perspectives

      a  Existing scenarios: Several already deployed use cases that
         would further benefit operators when deployed through Network
         Slice paradigm are discussed in Section 5.

      b  Differentiated service scenarios: that must absolutely meet
         strict resource requirements, as if they use a dedicated




Makhijani, ed, et al.    Expires April 21, 2018                 [Page 5]

Internet-Draft            Netslicing use cases              October 2017


         infrastructure.  The example use cases are categorized in
         Section 6.

   o  Section 7, has an example use case of cases where new technologies
      can be verified or deployed using network slicing concept.

   o  In Section 8, the use case requirements are summarized which are
      inputs to the [I-D.qiang-netslices-gap-analysis].

3.  A Generalized Network Slice as a Service

   Network slicing instances share a common infrastructure, which
   provide flexible design of a logical network with specific network
   functions customized to support differentiated performance
   requirements of vertical industry through logical or physical system
   isolation and certain OAM tools.

   Traditionally, vertical industries run their services in a shared
   network environment upon which infrastructure owners and service
   providers offer standalone network capabilities including
   connections, storage and etc.  Network slicing paradigm enables
   supporting the requirements of a network slicing tenant to be met
   individually.  Hence it is anticipated that this type of new business
   model where network slice instances are leased to industry verticals
   as a service (i.e.  Network Slicing as a Service, NSaaS) may become a
   norm in the near future.

3.1.  Resource Centric Service Concept

   Network services specify a set of resource requirements to offer
   desired Quality of Experience (QoE) to it consumers, using features
   offered by the control and forwarding planes.  Traditional service
   guarantees are associated with resource attributes such as
   throughput, packet loss, latency, network bandwidth/burst or other
   bit rates and security.  In addition, redundancy and reliability are
   provided by the infrastructure to improve overall QoE.  More
   recently, concepts such as edge computing allow opportunistic
   placement of services to meet stringent requirements of low latency
   and/or high bandwidth applications.

   Clearly the description of service delivery is more diverse now than
   before and demands higher degree of resource engineering and agility.
   The motivation behind Network slicing paradigm is to enable new
   service deployments without having to build new network
   infrastructures or causing disruptions to already deployed services
   in the network.  In this regard, there are two primary
   characteristics NS should satisfy, a) Strict demand for network
   resource, b) Network Customization.



Makhijani, ed, et al.    Expires April 21, 2018                 [Page 6]

Internet-Draft            Netslicing use cases              October 2017


3.2.  Strict Resource Demand

   Several services are sensitive to response times and/or amount of
   bandwidth, e.g. real time interactive multimedia, high bandwidth
   video feed or remote access to an enterprise network.  Failure to
   meet these criteria lead to service degradation.  Moreover, new
   industry verticals are evolving due to technological advancements in
   sensors, IoT, robotics and multi-media, along with new type of
   network interactions (both human-human or human-machine).  These
   impose even stricter resource and connectivity requirements.  The
   challenge lies in utilizing common network infrastructure and
   judiciously allocating available infrastructure resources.

3.3.  Network Customization

   To a network slice tenant, the ability to customize services
   dynamically is important.  Customization gives control to the
   operator of a slice to create, provision and change network resources
   to suit their service demands.  Customization enables decomposition
   of resources from an underlying network infrastructure and logically
   aggregate them as part of a slice.  These customizations also include
   placement and logical connection of the network functions based on
   the service requirements.

3.4.  NSaaS of Different Granularity

   In order to meet various requirements from the network slice tenant,
   NSaaS should be provided with different granularities.  Some typical
   examples of granularities that a provider may offer are as follows.

   o  Network Domain - Network slice instances of different networks
      i.e.  access (wireless, fixed) network, transport network and core
      network.

   o  Access technologies - Network slice instances of different
      generations of cellular and fixed network technologies, i.e. 4G,
      WiFi, Passive Optical Network (PON) and DSL.

   o  SLA requirements - Network slice instances of different SLA
      requirements, i.e. low-latency network, legacy best-effort network
      and network with guaranteed-bandwidth.

   o  Vertical applications - Network slice instances of different
      industry verticals. i.e. manufacturing site, V2X, industrial IoT
      and smart city.






Makhijani, ed, et al.    Expires April 21, 2018                 [Page 7]

Internet-Draft            Netslicing use cases              October 2017


   o  OTT services - Network slice instances of different applications
      provided by OTT, i.e. messaging, payment, video streaming and
      gaming.

   o  Cross domain services - Network slice instances of different
      services across multi-provider domains such as l2, l3 VPN
      services.

   During the realization of network slice instance, it is also very
   important that sub-instance of a more general one can be provided
   with a finer granularity.  In practice, it is up to the provider to
   decide the granularity to lease the network slice instances.

   The customization of different granularities of a network slice
   introduce many challenges, especially in terms of network management
   and orchestration.  As a network slice provider (provider of end-to-
   end slice service), it is essential to have a comprehensive
   understanding of the network capability.  This requires that network
   connectivity and resources can be exposed to the network slice
   tenants (as the differentiated services).  Accordingly, network slice
   provider is able to orchestrate specific instances based on these
   exposed capabilities.

3.5.  Service customization across multi-provider multi-domains as NSaaS

   L2 and L3 connectivity services can be deployed in a multi-provider
   multi-domain scenario and, in the SDN era, this implies the
   decoupling of network resources for different service provider and
   domain orchestrators.  The allocation of network resources within the
   domain of each service provider, involved by the end-to-end service,
   can be defined as a network slice.

   Within a single domain, provider is aware of the entire topology and
   its own resource availability and has complete control over those
   resources.  However, in a multi domain scenario, the overall
   knowledge of the resources and topologies cannot be made across
   providers.  Therefore, the exchange of information across these
   providers have to be enabled, as shown in Figure 2, inspired by
   [I-D.bernardos-nfvrg-multidomain] and
   [I-D.ietf-opsawg-service-model-explained].











Makhijani, ed, et al.    Expires April 21, 2018                 [Page 8]

Internet-Draft            Netslicing use cases              October 2017


               ----------------------------
              | Customer Service Requester |
               ----------------------------
                        |
           (L2VPN/L3VPN |
              Service   | IF1
               Model)   |                               |
                        +                               +
                   _____|____                       ____|_____
                  |   Multi  |        IF2          |   Multi  |
                  | Provider |<--------+---------->| Provider |
                  |____MdO_1_|                     |___ MdO_2_|
                       /\                               /\
                      /  \                             /  \
                     /    \ IF3                       /    \
             _______/__   _\_________        ________/_    _\________
            |  Domain  | |  Domain  |       |  Domain  |  |  Domain  |
            |___Orch___| |___Orch___|       |___Orch___|  |___Orch___|


       Figure 2: Multi-domain, multi-provider connectivity services

   The Figure 2 shows a multi provider MdO (MP-MdO) exposing an
   interface 1 (IF1) to the tenant, interface 2 (IF2) to other multi
   provider MdO (multi domain orchestrator) and an interface 3 (IF3) to
   individual domain orchestrators.  IF1 is exposed to the tenant who
   could request his specific services and/or slices to be deployed.
   IF2 is between the orchestrators and is a key interface to enable
   multi-provider operation.  IF3 focuses on abstracting the technology
   or vendor dependent implementation details to support orchestration
   in each network domain (see [!@I-D.bernardos-nfvrg-multidomain] for
   details).  The coordination alternatives between MP-MdOs are: *
   Bilateral Cascading: providers can have long-lasting business
   agreements only with their direct neighbors.  * Full Mesh between MP-
   MdOs: Providers can have long-lasting business agreement with any
   provider (neighboring or remote).

   This reference architecture is the main focus of the 5GEx European
   Project.

   Among applications, L2VPN and L3VPN wholesale end-to-end services in
   a multi-provider and multi-domain scenario needs the following
   characteristics for network slice management

   o  An automatic activation test and verification functionality (by
      customer or orchestrator).





Makhijani, ed, et al.    Expires April 21, 2018                 [Page 9]

Internet-Draft            Netslicing use cases              October 2017


   o  Interface to modify parameters of L2VPN or L3VPN service such as
      bandwidth or path redundancy.

   Looking at Figure 2, the customer needs a new L2 end-to-end service
   between CPEs across two domains (MP-MdO1 and MP-MdO2).  As MP-MdO1
   receives the service request, it is deployed as a network slice.  In
   this regards MP-Md01 has prior knowledge of topology and resource
   across domains in some form, it then splits the service request into
   a slice across each of the involved domain.  Once service is set up:
   MP-MdO1 allocates resources for the slice on SP1 domain while MP-MdO2
   allocates on SP2 domain respectively.

   [I-D.ietf-l2sm-l2vpn-service-model] and [RFC8049] can describe IF1
   For L2 and L3 end-to-end services respectively.  The ability to map
   such services as network slice will be considerable opportunity for
   dynamic cross-domain operations.

4.  Network Slicing in 3GPP Mobile Network

   Network Slicing is a core capability of the currently under
   development 3GPP 5G phase 1 mobile system, as it makes it possible
   for different service verticals, such as IoT and broadband
   applications, to be deployed over a common shared infrastructure.
   More details can be found in [TS_3GPP.23.501], [TS_3GPP.23.502],
   [TR_3GPP.38.801], [TR_3GPP.33.899] and [TS_3GPP.28.500].

   3GPP is currently defining its own solution for network slicing.  An
   IETF effort in this field may, however, still be complementary in the
   long run as IETF focuses on the IP infrastructure and protocols which
   are generally out of scope of 3GPP.  Challenges relevant to the IETF
   include isolation between network slices, supporting sharing network
   functions between several slices, building slices recursively from
   smaller slice subnets, implementing slicing across different domains
   for roaming, etc.

4.1.  Network Slices in 3GPP Systems

   In 3GPP systems a network slice is a complete logical network which
   provides telecommunication services and network capabilities.
   Distinct Radio Access Network (RAN) slices and core network slices
   interwork to provide mobile connectivity.  A device may access
   multiple NS simultaneously through a single RAN. 3GPP defines slice
   IDs (NSSAI) composed of a Slice Service Type (SST) and a Slice
   Differentiator (SD).  SST refers to an expected network behavior in
   terms of features and services (e.g. specialized for broadband or
   massive IoT), while SD helps distinguishing among several NS
   instances.




Makhijani, ed, et al.    Expires April 21, 2018                [Page 10]

Internet-Draft            Netslicing use cases              October 2017


   Figure 3 describes the general layout of Network Slicing in mobile
   networks.  A core network slice includes, a Session Management
   Function (SMF), which manages PDU sessions, and a User Plane Function
   (UPF).  Some functions such as the Access and Mobility management
   Function (AMF) are common and shared between multiple RAN and core
   network slices.


              Common Functions   Core Network Slice Instance
             +-----------------+---------------------+
             |   +--------+    |     +--------+      |
             |   | Control|    |     | Control|      |
        +--------+ Plane  +----------+ Plane  |      |
        |    |   | AMF... |    |     | SMF... |      |
    +---+--+ |   +--------+    |     +----+---+      |
    |Device| +-----------------+          |          |
    +---+--+ |   +--------+    |   +------+-----+    |
        |    |   |        |    |   | User Plane |    | +---------------+
        +--------+  RAN   +--------+ Functions  +------+Data Network or|
             |   |        |    |   | UPF...     |    | | The Internet  |
             |   +--------+    |   +------------+    | +---------------+
             +-----------------+---------------------+
             RAN Slice Instance


                       Figure 3: 3GPP Network Slices

4.2.  Creating, Managing and Operating 3GPP Network Slices

   To create a network slice instance, mobile network operators define
   "Network Slice Subnets" into OSS/BSS management system.  NS subnets
   are NS components including NFs and reserved network resources.  OSS/
   BSS communicates with the orchestrator, which, through the rest of
   the NFV-MANO system, configures compute and network elements to
   create, compose and activate slices.

   Mobile network operators can modify the configuration of a RAN or
   core network slice, while it is in use.  To support this, the
   operator needs to measure QoS/SLA data for hosted network services,
   and associate results with the relevant network slice.  Example of
   operations include increase or decrease network capacity or compute
   capacity of NFs; update the configuration of NFs; add, replace or
   remove a NFs or a Network Slice Subnet.

   Slice selection occurs in 2 phases: first, common functions
   (including AMF) and available network slices are pre-selected when
   the device registers with the network.  Later on, the network
   dynamically selects network slices when a device initiates



Makhijani, ed, et al.    Expires April 21, 2018                [Page 11]

Internet-Draft            Netslicing use cases              October 2017


   communication, based on a slice ID associated with the application
   (on the device) that requests a new flow.

5.  Role of Virtualization in Network slicing

   Virtualization is a key enabler of network slices; Many network
   services can be easily deployed using components of NFV framework
   like network functions, hardware decoupling and resource placement
   [#?NFVSLICE].  When deployed as a network slice, the resources
   associated with virtualized network services are managed uniformly by
   network slice provider.  One such use case is described below.

5.1.  Virtualized Customer Premise Equipment

   A CPE is an equipment that connects the customer premises to the
   provider's network.  A CPE may either be a layer-2 or a layer-3
   device (the routing gateway) performing different network functions
   depending on the access technology (DSL modem, PON modem, etc.).  Any
   services provided such as Internet access, IPTV, VoIP, etc. or
   network functions for example, local NAT, local DHCP, IGMP proxy-
   routing, PPP sessions, routing, etc. are also part of CPE.  The
   installation of different on-premise devices, entails a high cost for
   service providers in terms of both initial installation and
   operational support, since they are typically responsible for the
   end-to-end service.

   Traditional CPE deployments are service provider network functions
   installed on customer site to provide above mentioned functionalities
   along with remote site connectivity.  Communication Service provider
   (CSP) is responsible for management and administration of connections
   and state with proper policy, bandwidth, security and QoS
   requirements.



















Makhijani, ed, et al.    Expires April 21, 2018                [Page 12]

Internet-Draft            Netslicing use cases              October 2017


     |-----------------------|
     |              +------+ |------------------+-------+       campus
     |           |--|      | |                  | vCPEx | -----[     ]
     |           |  |      | |------------------+-------+
     |           |  |      | | <====Broadband ==>
     |    -----  |  | vCPE | | -----------------+-------+       branch
     |  (      ) |->|      | |                  | vCPEy |------[     ]
     | (   CSP  )|  |      | |------------------+-------+
     |  (_____)  |  |      | |<===  MPLS/4G. ==>
     |           |  |      | |------------------+-------+    main site
     |           |->|      | |                  | vCPEz |----- [     ]
     |              +------+ |------------------+-------+
     |-----------------------|


          Figure 4: Virtualized CPE with distributed architecture

   Figure 4 shows a virtualized architecture in which many functions are
   moved to CSP's cloud simplifying CPE on premises tremendously.
   Additional details of deployment architecture models are captured in
   [I-D.pularikkal-virtual-cpe] where full dissemination of data path
   and control plane functions is described.  The figure shows vCPEx,
   vCPEy, vCPEz are virtualized CPEs on multiple sites of a specific
   customer, there may be set of different network functions in each x,
   y and z CPE.  The vCPE instance in CSP cloud is integrated to each
   site performing service chains of network functions and resource
   allocations specific for ingress and egress path of each site.

   A vCPE is a well-known concept[VCPEBBF] which when combined with WAN
   technologies provides end to end visibility and reachability to
   remote sites.  However, there is no standard approach to connectivity
   or management of various CPE functions.  Using network slicing, a
   greater level of agility can be achieved, with each customer
   dynamically managing its own network with the assistance of network
   slicing framework.

   The benefit of self-managing a vCPE network slice is the capability
   to move network functions on premise of to the cloud.  An obvious use
   case will be customer initiated gradual migration of network
   functions from a site to CSP cloud.











Makhijani, ed, et al.    Expires April 21, 2018                [Page 13]

Internet-Draft            Netslicing use cases              October 2017


                    +-------------+
                    | Slice       |
                    | Resource Mgr|
                    +-------------+
                        |
                        | NS protocol or i/f
                        V
            |--------------------------------------------------|
            |                                                  |
            |   +-------------+       +-------------+          |
            |   | vCPE Slice  |       | CSP         |          |
            |   |     Monitor |       | vCPE subnet |          |
            |   +-------------+       +-------------+          |
            |                                                  |
            |  +--------+  +--------+  +--------+  +--------+  |
            |  | vCPEy  |  | vCPEy  |  | trans  |  | vCPEz  |  |
            |  | subnet |  | subnet |  | subnet |  | subnet |  |
            |  +--------+  +--------+  +--------+  +--------+  |
            |                                                  |
            |--------------------------------------------------|
                    |                               |
                    | NS transport protocol or i/f  |
                    V                               V
               [campus]    [branch]    [transport] [main site]

                     Figure 5: vCPE as a Network Slice

   In Figure 5, a slice for vCPE is shown.  Using slice subnet approach,
   each vCPE site instance may be considered as an abstracted subnet,
   along with the WAN transport as another subnet.  The network
   functions are chained in a distributed fashion between site vCPEs and
   CSP vCPE subnet.  A monitoring function interfaces with CSP's global
   slice manager for resource management.  A south-bound interface
   through network slice transport protocol, realizes these functions on
   the infrastructure.

5.2.  Enhanced Broadband

   Today, video consumes the largest amount of bandwidth over the
   Internet.  As the higher resolution formats enter mainstream, even
   more bandwidth will be needed to stream 4K/8K/360 degree formats.
   For example, connected Virtual Reality(VR)/Augmented Reality(AR) is
   the future use case of eMBB services.  Notably, media processing for
   AR/VR will require in-network processing functions and high latencies
   between components could lead to downgrade of user experience.
   Therefore, an AR/VR stream requires a special infrastructure that
   differs from best-effort network.




Makhijani, ed, et al.    Expires April 21, 2018                [Page 14]

Internet-Draft            Netslicing use cases              October 2017


   A purpose-built network slice for eMBB streaming shall ensure to
   minimize processing overheads, it may be done by placement of network
   functions closer to subscribers.  Resource scaling for eMBB should be
   dynamic because bandwidth is expensive and such vertical service
   operators may not want to pay for unutilized bandwidth.  Therefore,
   slices should be able to monitor, negotiate and adjust the scale for
   both bandwidth and service functions.  Latency guarantees vary from
   general services, therefore, as a first step, monitoring for quality
   of service is needed and more advanced operation would involve
   recovery and reparation of paths.

   A typical eMBB slice Figure 6 from a network operator is a
   performance oriented service customization.  An eMBB service slice
   template will allow a tenant to request or specify

   (1)  CDN components (as service functions)

        *  Regional network locations of CDN, encoders etc.

        *  Location of acquired content.

        *  Describes transport constraints for its own distribution
           network comprising of connectivity between content
           acquisition and Fan-out points.

   (2)  An interface to subscriber database perhaps as a network
        function, from multiple access network types (cellular, fixed).

   (3)  Live performance monitoring and resource negotiation loop.

   (4)  A well-coordinated network slice protocol that enables resource
        allocation across different network domains.



















Makhijani, ed, et al.    Expires April 21, 2018                [Page 15]

Internet-Draft            Netslicing use cases              October 2017


                        +-------------------------+
                        |  Slice Resource Manager |
                        +-------------------------+
                           |                   |
                           |  NS control       |
                           |                   |
              +------------------+     +----------------+
              |   eMBB Network   |     |   eMBB Network |
              +------------------+     +----------------+
                       |                        |
                       V                        V
                  ----------NS transport ----------------
                     |                  |             |
                     V                  V             V
               ----------------  ----------------  -----------
              | Infrastructure | |Infrastructure | | DC       |
              |  Domain A      | | Domain B      | | Domain C |
               ----------------  ----------------  -----------

            Figure 6: Transport provider network operator view.

6.  Services with Resource Assurance

6.1.  Massive Machine to Machine Communication

   Sensor networks are widely deployed in industries such as
   agriculture, environmental monitoring and manufacturing.  The general
   workflow of wireless sensor network is provided in Figure 7.























Makhijani, ed, et al.    Expires April 21, 2018                [Page 16]

Internet-Draft            Netslicing use cases              October 2017


           6.Decided Behavior
          +-------------------+
          |                   |
     +----v------+            |
     |  Sensor   |            |
     |(1. Data   |            |
     |Collection)|            |
     +----+------+            |
          |2.Collected Data   |  3.Aggregated  +---------------------+
          +------------->+----------+ Data     |     Data Center     |
                      |  Sink Node/ |----------> (4. Data Analysis   |
                      | Base Station|          |         &           |
          +---------->+--------------+--<------|  Behavior Decision) |
          |2.Collected Data   |  5. Decided    +---------------------+
     +----+------+            |     Behavior
     |  Sensor   |            |
     |(1. Data   |            |
     |Collection)|            |
     +----^------+            |
          |                   |
          +-------------------+
           6.Decided Behavior

               Figure 7: Workflow of wireless sensor network

   Figure 7 shows, control of sensor data & behavior at scale, requiring
   wide area coverage and power constrained communication.  A few new
   types of scenarios that require unique infrastructure are:

   o  Smart city networks: an integration of several public
      infrastructures together through M2M communications.  For example
      Automatic metering (for gas, energy, water, etc.), environment
      monitoring (for pollution, temperature, humidity, etc.), traffic
      signal control etc.

   o  E-health communications that remote monitor the physical
      conditions (e.g., heart rate, pulse, blood pressure etc.), and
      accordingly take necessary measures remotely.  E-health
      communication network must be secure, reliable and fast but small-
      size of data exchange.

   mMTC Type Slices involves potentially a large number of small and
   power-constrained devices, therefore, resource allocation at scale is
   of particular importance in mMTC type slices.  Furthermore, different
   kind of IoT devices may exhibit delay sensitivity in industry
   operations etc.  The mMTC type slices should be conscious of
   requirements of scale, variable data pattern, and energy efficient
   communications.



Makhijani, ed, et al.    Expires April 21, 2018                [Page 17]

Internet-Draft            Netslicing use cases              October 2017


6.2.  Ultra-reliable Low Latency Communication

   In uRLLC scenarios, data loss is not acceptable.  Both data and
   control planes may require significant enhancements to transmission
   or information distribution protocols.  [TR_3GPP_38.913] specifies
   access network user plane latency as 1ms and reliability factor of
   99.999% for transmission of a packet of size 32 bytes.  The slices of
   this type must be ensured that shared infrastructure absolutely does
   not cause any adverse effects.

   In the following sections three new uRLLC scenarios are described.

   (1)  Industrial operation: Operations in remote sites usually need
        combined support of cellular and transport network.  Operational
        accuracy is characterized by

        *  Requires high-quality communication links between the control
           site.

        *  Low latency and low jitter in communication path

        *  Closed control loop (Sensor -Controller - Actuator) as shown
           in Figure 8, a typical control cycle time where network is
           involved should be below 10ms [Tactile-Internet].

    ++++++++++   +++++++++++++++
    + Sensor +-->+ Transmitter +---+
    ++++++++++   +++++++++++++++   |
                                   |   ++++++++++++     ++++++++++++++
                                   +-->+   Base   +---->+ Controller +
                                   +---+ Station  +<----+            +
                                   |   ++++++++++++     ++++++++++++++
    ++++++++++++   ++++++++++++++  |
    + Actuator +<--+   Receiver + <--+
    ++++++++++++   ++++++++++++++

                 Figure 8: Industrial closed control loop

   (2)  Remote surgery enables surgeons to perform critical specialized
        medical procedures remotely, providing accurate control and
        haptic feedback.

   A uRLLC network slice only accepts service specific traffic and must
   not receive any other type of traffic to avoid negative impact on the
   service operation.  Capabilities required by uRLLC service provider
   include





Makhijani, ed, et al.    Expires April 21, 2018                [Page 18]

Internet-Draft            Netslicing use cases              October 2017


   o  Locations of the access nodes for terminals (devices, vehicles) to
      the transport network and locations of the controller to construct
      its own network topology within the network slice.  In high
      mobility scenario such as automotive verticals, the dynamic
      topology adjustments are required without loss of data.

   o  Each service vertical has different performance requirements in
      terms of latency, reliability and data rate etc., therefore, the
      uRLLC network slice should allow customization for these
      parameters.

   o  A uRLLC service provider should be able to registers self with
      access rights to resource monitoring and negotiation loop.

   A network slice provider offers a uRLLC Slice with the following
   considerations

   o  Should support/provide specific data and control planes protocols
      with significant enhancements for deterministic latency and
      reliability (e.g.  DetNet[I-D.dt-detnet-dp-sol] in data plane).

   o  Allow uRLLC service operator to access user admission and
      authentication to its network slice in advance.

   o  The network coverage for a uRLLC service provisioning may be
      limited to a confined area, either indoor or outdoor, network
      operator needs to be able to coordinate resource allocation across
      different access types and network domains.

   A high-level Figure 9, shows a URLLC slice provider and service view
   of the network.  The monitoring of resources is done in the context
   of performance.  A performance degradation would require resource
   adjustment.  As shown in Figure 9, in one possible sliced model will
   have its own customizer that uses internal performance observing
   logic with in its slice by coordinating with different subnets/
   domains using southbound NS transport protocol and transfers this
   information to operator via a northbound NS protocol for resource
   adjustment.

   It is implied that domains maybe different access technologies and
   need for a common performance metric propagation and resource
   allocation is important for a uRLLC slice to function properly.









Makhijani, ed, et al.    Expires April 21, 2018                [Page 19]

Internet-Draft            Netslicing use cases              October 2017


         +-----------------------------+
         |                             |
         |            +---------+      | uRLLC service +---------+
         |            | Resource|<-----|---------------| uRLLC   |
         |    +------ | Manager |      |  template     | service |
         |    |       +---------+      |               +---------+
         |    |  +----------+--------+ |
         |    +->|Performance Monitor| |
         |       +---------+------^--+ |
         |                        | |  |
         |------------------------|-+--+
                                  | | resource adjustment
                                  | |
               performance metrics| |
                                  | |
           uRLLC slice            | v
         +---------+-------------+-------------+
         | +--------+--+    +-----------+      |
         | |  Subs     |<-->|uRLLC slice|      |
         | |  Mgmt.    |    |Customizer |      |
         | +-------+---+    +---------^-+      |
         |       +-------+------------|        |
         |       |       |        +---v-----+  +
         |  +--------+  +-------+ | micro   |  |
         |  | GC-1   |  | GC-2  | | resource|  |
         |  | subnet |  | subnet| | mgr.    |  |
         |  +--------+  +-------+ +---------+  |
         |     |          |                    |
         +----+----------+---------+-------+---+
              | |        | |
              V V        V V
         ------------NS transport --------------
         |                  |             |
         V                  V             V
         +--------------+  +------------+ +----------+
         |  Domain A    |  | Domain B   | | Domain C |
         +--------------+  +------------+ +----------+

               Figure 9: Reference for uRLLC Network Slice.

6.3.  Critical Communications

   Critical communications are associated with emergency situations.
   Often referred to as mission critical, the communication has to be
   reliable and non-disruptive.  Different scenarios of critical
   communications relate to public safety responders (e.g. fire
   fighters, paramedics), military, utility or commercial applications,




Makhijani, ed, et al.    Expires April 21, 2018                [Page 20]

Internet-Draft            Netslicing use cases              October 2017


   mainly using reliable voice or short data messaging over wireless
   communication systems.

   Next-generation public safety communications are planned to be built
   with enhanced broadband voice, data and video communications services
   beyond narrowband LMR with broadband LTE networks for high speed data
   (ref 22.179 and FirstNet).

   3GPP defined on-network critical communication can be established
   both via (a) over the network infrastructure to manage the call, (b)
   off-network, where the terminals communicate directly to each other.
   In the network slicing context, over the network, involves transport
   networks for an always available, reliable, and zero packet loss
   quality of traffic support to meet critical services requirements.

   Maintaining a separate broadband infrastructure for critical
   communications incurs a heavy deployment cost.  Especially, as the
   coverage of this separate network has to be extended to large-scale
   nationwide geographies and remain interoperable is too expensive.  As
   new communication technologies emerge, public safety systems will
   have to bear the state of the art adoption cost.  A separate
   infrastructure lacks flexibility to add new value-added services or
   to take advantage of available commercial services.

   While shared infrastructure, brings out challenges of these kind:

   (1)  Reliable support: Of basic mission critical services: Such as
        loss of information in voice communication is not acceptable in
        emergency services, if common infrastructure is to be used, it
        must assure no loss of information.

   (2)  Zero congestion: It is not acceptable for critical calls to be
        delayed at call setup times or be subjected to any other
        congestion scenarios.

   Having the Mission Critical Service (MCS) as a network slice benefit
   from the following:

   o  Insertion and authorization of subscribers in a group
      communication: In a critical infrastructure, the subscriber
      authentication may be done earlier at the entry point
      automatically through slice selection functional entity.

   o  Pre-allocated QoS Class Identifiers (QCIs): Generally, QCIs are
      requested on per session basis which could slow down overall call
      control setup and is undesirable for emergency services.  When
      operating in a slice, these resources maybe reserved ahead of time
      in a coarse-grained manner instead of per session.



Makhijani, ed, et al.    Expires April 21, 2018                [Page 21]

Internet-Draft            Netslicing use cases              October 2017


   MCS network slices are relatively straight forward as it only
   concerns with guaranteed bit rate (GBR) on per media basis and
   management of groups.  From transport they should be able to request
   transport services based on GBR for reliable communication.  A
   reference network slice in Figure 10 below, shows a mission critical
   (MC) organization providing service agreement through a network slice
   template with resource specification.  The MCS slice sets up
   different subnetworks of different subscriber groups and manages its
   membership.  These subnets are realized into the infrastructure
   across different domains through a network slice transport mechanism.
   The MCS must be capable of active resource monitoring to prevent
   congestions to ever occur as well as request additional transport
   resources in case of emergency event occurrence.






































Makhijani, ed, et al.    Expires April 21, 2018                [Page 22]

Internet-Draft            Netslicing use cases              October 2017


   +----------------------------------+
   |                                  |
   |       +------------------+       |  service   +------------------+
   |       | Slice Resource   |       |<-----------| Mission Critical |
   |  +--> |    Manager       |---+   |  agreement |    Organization  |
   |  |    +------------------+   |   |            +------------------+
   |  |                           |   |
   |  |    +----------+-------+   |   |
   |  +--->|  Resource Monitor|<--+   |
   |       +---------+--------+       |
   |           ^             |        |
   |-----------+-------------+--------+
               |             |
               | Resource request
               |             | prioritized resource adjustment
     MC Network|Slice        v dynamic group management
   +------------+------------+-------------+
   | +----------+-------+    +-----------+ |
   | |  Group Subs Mgmt.|<-->| MC slice  | |
   | |                  |    | Customizer| |
   | +---------+--------+    +-----------+ |
   |         |       |                     |     +-+
   |         |       |        +---------+  + +-->| |
   |  +--------+  +-------+   | GRP     |  |     +-+ MC-UE
   |  | GC-1   |  | GC-2  |   | selector|  |     +-+
   |  | subnet |  | subnet|   +---------+  | --->| |
   |  +--------+  +-------+                |     +-+ MC-UE
   |      |          |                     |
   +----+----------+---------+-------+-----+
     | |                       | |
     V V                       V V
   ------------NS transport ----------------
   |                  |             |
   V                  V             V
   ----------------  ----------------  -----------
   | Infrastructure | |Infrastructure | | MC server|
   |  Domain A      | | Domain B      | | Domain C |
   ----------------  ----------------  -----------

         Figure 10: Reference for Mission Critical Network Slice.

7.  Network Infrastructure for new technologies

7.1.  ICN as a Network Slice

   ICN as in Information-Centric Networking is a culmination of multiple
   future Internet research efforts in various parts of the world, now
   being pursued under IRTF's research task group called [ICNRG].



Makhijani, ed, et al.    Expires April 21, 2018                [Page 23]

Internet-Draft            Netslicing use cases              October 2017


   Information-Centric Networking (ICN) addresses Internet's network
   architectural design gaps based on evolving applications requirements
   and end user behavior that is significantly different from what IP
   was designed for - which was optimized for host-to-host communication
   paradigm.  ICN is a non-IP paradigm based on name-based routing and
   offers many desirable networking features to applications such as
   naming, security, caching, mobility, multicasting and computing in a
   manner different from traditional host-centric communication model.
   ICN's name-based abstraction to application minimizes bootstrap
   configuration from the network, making it suitable to several
   communication modalities such as multi-point-to-multi-point, AR/VR,
   D2D and Ad hoc communication.

7.2.  New Verticals - ICN based service delivery

   Services over ICN slices can take advantage of its features such as:

   (1)  In ICN, applications, services and content are addressed using
        names, hence end host resolution services like DNS can be
        avoided, this achieves name resolution to edge content or
        services without incurring additional RTT delays.

   (2)  Service flows will be offered mobility and multicasting support,
        as the networking is session-less and optimized towards
        efficient movement of named data or networking named services
        and host level communication.

   (3)  Services can be deployed at the very edges with ease as ICN
        routers are compute friendly, this is because states in the
        forwarding table can be that of either content or service
        resources.

   (4)  Further saving bandwidth in the upstream link through
        opportunistic caching is an inherent feature of ICN, this also
        leads to energy efficient networking.

   When offered as a programmable and customizable logical network
   slice, ICN based services can be offered as a network slice in
   parallel with traditional IP based services.  ICN can be realized as
   a slice [_5GICN_] based on the choice of data plane resource offered
   by the operators in different domains of the network such as the
   access, core network or main data centers.  While the same resources
   can be used to support services over IP, proper resource isolation
   shall allow it to co-exist with ICN slices as well.  ICN slices can
   be offered over a network slicing framework built upon a programmable
   pool of software and/or hardware based data plane resources.





Makhijani, ed, et al.    Expires April 21, 2018                [Page 24]

Internet-Draft            Netslicing use cases              October 2017


7.2.1.  Required Characteristics

   In ICN, applications use Interest/Data or Get/Put abstractions over
   named resources resolved by ICN's routing plane.  An ICN slice shall
   be a programmable ICN-domain, in which content learning and
   distribution will be done using existing or new ICN aware distributed
   routing logic or through centralized application controllers.  As a
   result, it should be possible to deploy software or hardware based
   network functions such as ICN routers and content producers and
   distributors that serve and speak ICN protocols, or enabled through
   service gateways at the edges of the network.  Just as multiple
   service instances can be part of a slice, an ICN slices can multiplex
   heterogeneous services; on the other hand an ICN slice can be as
   granular as a single service instance too.  The latter approach has
   implications with respect to consumer privacy, access control of name
   data objects, and granularity of mobility handling [_5GICN_].

   A basic ICN slice can be manifested as a resource isolated logical
   network while sharing resources with other connectivity or IP based
   service slices.  An ICN slice relies on programmability and
   virtualization framework to manage the service slices, to allow
   maximum flexibility through ICN aware logically centralized control
   plane for ICN service and slice management.

   o  Through a network slice template -ICN service providing entity
      could specify specific locations (edge of network domains) to
      deploy ICN-routers or other ICN-NFs (ICN aware network functions).
      Its service definition varies with the type of service.

   o  Application driven connectivity between ICN network elements in
      all segments and create an ICN based virtual topology.

   o  Mechanisms to deliver ICN user traffic over the infrastructure
      such as overlay or, ICN NFs can be tightly integrated with the RAN
      such as the eNodeB or implicitly using traffic classification
      function at the edge and tunneled to ICN User Plane Function
      (UPF).

   o  In addition, bandwidth and other network resources may be
      requested from the underlay depending on its capability of
      providing deterministic or statistically guarantees.

   How multiple services will be deployed within an ICN aware slice may
   or may not be exposed to the network operator, depending on if the
   ICN slices are natively managed by it or a by other service
   providers.





Makhijani, ed, et al.    Expires April 21, 2018                [Page 25]

Internet-Draft            Netslicing use cases              October 2017


8.  Overall Use Case Analysis

   The discussion in above use cases can be summarized as following in
   terms of the requirements for network slicing framework.

8.1.  Requirements Reference

   The following functional requirements are derived from discussions in
   above sections.  They are described in details in
   [I-D.qiang-netslices-gap-analysis] document.

   The differentiated services described in this document demonstrate
   several common functionalities.  Therefore, a homogeneous approach
   towards deployment and management is absolutely necessary.

8.2.  Mapping Common characteristics to Requirements

   (1)  Resource Reservation: Compute and network resources are reserved
        as part of initial creation and subsequently during the
        maintenance of a slice.  For example, a service may initially
        reserve resources for its own control plane, and then later it
        may reserve user plane flows for applications on demand.
        Reference use cases: Differentiated services discussed in
        section "Services with Resource Assurance".  A network slice
        aware infrastructure shall be able to support mechanisms for
        elastic scaling (up/down) of resources and their non-disruptive
        provisioning.

   (2)  Resource Assurance: A network slice aware infrastructure allows
        operators to allocate part of the network resources to meet
        stringent resource characteristics.  Scenarios in both Section 5
        and Section 6 require on demand and dynamic adjustments.  It may
        not be possible to achieve this using centralize or API approach
        with finer granularity of resources participating in constrained
        path computation.

   (3)  Multi-dimensional service vertical: Network slicing supports
        dynamic multi-services, multi-tenancy and the means for backing
        vertical market players.

   (4)  Multi-domain coordination: Multi-domain refers to different
        technology related network domains.  For example, it may be RAN,
        DSL etc., mobile core network, ISP or different domains in
        transport networks such as carrier Ethernet, MPLS, TE-tunnel
        etc.  Often, they are under same administrator's control but may
        require coordination across different administrations.
        Furthoremore, capabilities of each domain must be known in order
        to validate if a slice can be created or not.  All scenarios



Makhijani, ed, et al.    Expires April 21, 2018                [Page 26]

Internet-Draft            Netslicing use cases              October 2017


        mentioned require multi-domain coordination to connect and
        administer different subnets.

   (5)  Operational Isolation: A network slice represents logical group
        of network resources, functions and corresponding configurations
        separating its behavior and hence operation from the underlying
        physical network.  Each network slice may have its own operator
        that sees this slice as a complete network (i.e. with router
        instances, policies, programmability, placement of virtual
        network functions according to traffic patterns etc.) and can
        manage as its own network.

   (6)  Transparency: Network slicing does not change the functionality
        of a scenario; It only facilitates creation of an isolated, an
        independently run infrastructure for that use case over a common
        network.  Transparency promotes inter-operability and a common
        resource specification enables it.

   (7)  Reliability: It is an important resource attribute in the type
        of service verticals described above.  Many services verticals
        cannot deliver functionality unless the network is reliable (See
        remote industry operation, remote surgery and other uRLLC
        applications).  In this regard, monitoring probes are needed of
        each network slice and resources associated with it.

   +-------------------------------------+----------------------------+
   | Requirements Illustrated above      |  Aggregated  Requirements  |
   +-------------------------------------+----------------------------+
   |1) Resource reservation              |                            |
   |6) Transparency                      | Req 1. Network Slicing     |
   |4) Multi-access knowledge            |        Specification       |
   |3) Multi-dimensional service vertical|                            |
   +-------------------------------------+----------------------------+
   |4) Multi-Domain coordination         | Req 2. Network Slicing     |
   |                                     |        Cross-Domain        |
   |2) Resource Assurance                |        Coordination        |
   +-------------------------------------+----------------------------+
   |                                     | Req 3. Network Slicing     |
   |5) Operational/performance Isolation |       Performance Guarantee|
   |                                     |        and Isolation       |
   +-------------------------------------+----------------------------+
   |7) Reliability                       | Req 4. Network Slicing OAM |
   +-------------------------------------+----------------------------+

         Figure 11: Mapping Common Characteristics to Requirements

   NSaaS is a key for network operators to deploy network slices.
   Having standard means to realize these use cases, enables (a)



Makhijani, ed, et al.    Expires April 21, 2018                [Page 27]

Internet-Draft            Netslicing use cases              October 2017


   different usecases to be uniformly understood by a network slice
   provider, and (b) similar use cases to be understood in a similar
   fashion by different network slice providers.  Both these cases
   should allow common mechanisms to map and allocate network slices
   over the network infrastructure.

   Due to the availability of diverse technologies in control and data
   planes; the first step should be a top-down means to realize a slice
   with a common technology independent information model.  It may
   describe a resource-centric slice with connectivity, storage, and
   compute resources, network functions, and operational requirements,
   that further get mapped to infrastructure resources and capabilities
   for run-time operations and monitoring.  This model may be used by an
   orchestrator onboarding function for creating instances of network
   slice services and distributing to network infrastructure providers.

9.  Conclusion

   A service should typically need a network slice for one of those
   reasons:

   (1)  The service cannot provide optimal experience on a best-effort
        network.

   (2)  It is inefficient and expensive to build a separate
        infrastructure.

   The separation from a generalized network, should allow new services
   to use newer or different protocols in network, transport and
   management layer/plane for that service (as in the case of ICN, mMTC,
   uRLL).  The goal of Network slices is to offer enriched service
   verticals with very different network capability and performance
   demands but also simplify from the traditional service delivery
   models.

   There is need for a uniform framework for end to end network slicing
   specifications that spans across multiple technology domains and can
   drive extensions in those technolgy-areas for support of Network
   slices.

10.  Security Considerations

   The security considerations apply to each kind of slice.  In addition
   general security considerations of underlying infrastructure whether
   isolated communication with in a slice apply for links using wireless
   technologies.





Makhijani, ed, et al.    Expires April 21, 2018                [Page 28]

Internet-Draft            Netslicing use cases              October 2017


11.  IANA Considerations

   There are no IANA actions requested at this time.

12.  Acknowledgements

   Note, the 5GEX L2VPN and L3VPN usecase is an independent contribution
   by authors and is not endorsed by 5GEX.  Many thanks to the following
   reviewers for providing details for several use cases and for helping
   with the review of the document.

   Stewart Bryant (stewart.bryant@gmail.com), Hannu Flinck
   (hannu.flinck@nokia-bell-labs.com), Med Boucadair
   (mohamed.boucadair@orange.com), Dong Jie (dong.jie@huawei.com).

13.  References

13.1.  Normative References

   [I-D.bernardos-nfvrg-multidomain]
              Bernardos, C., Contreras, L., Vaishnavi, I., and R. Szabo,
              "Multi-domain Network Virtualization", draft-bernardos-
              nfvrg-multidomain-03 (work in progress), September 2017.

   [I-D.dt-detnet-dp-sol]
              Korhonen, J., Andersson, L., Jiang, Y., Finn, N., Varga,
              B., Farkas, J., Bernardos, C., Mizrahi, T., and L. Berger,
              "DetNet Data Plane Encapsulation", draft-dt-detnet-dp-
              sol-02 (work in progress), September 2017.

   [I-D.geng-netslices-architecture]
              67, 4., Dong, J., Bryant, S., kiran.makhijani@huawei.com,
              k., Galis, A., Foy, X., and S. Kuklinski, "Network Slicing
              Architecture", draft-geng-netslices-architecture-02 (work
              in progress), July 2017.

   [I-D.ietf-l2sm-l2vpn-service-model]
              Wen, B., Fioccola, G., Xie, C., and L. Jalil, "A YANG Data
              Model for L2VPN Service Delivery", draft-ietf-l2sm-l2vpn-
              service-model-03 (work in progress), September 2017.

   [I-D.ietf-opsawg-service-model-explained]
              Wu, Q., LIU, W., and A. Farrel, "Service Models
              Explained", draft-ietf-opsawg-service-model-explained-05
              (work in progress), October 2017.






Makhijani, ed, et al.    Expires April 21, 2018                [Page 29]

Internet-Draft            Netslicing use cases              October 2017


   [I-D.pularikkal-virtual-cpe]
              Pularikkal, B., Fu, Q., Hui, D., Sundaram, G., and S.
              Gundavelli, "Virtual CPE Deployment Considerations",
              draft-pularikkal-virtual-cpe-02 (work in progress),
              February 2017.

   [I-D.qiang-netslices-gap-analysis]
              Qiang, L., Martinez-Julia, P., 67, 4., Dong, J.,
              kiran.makhijani@huawei.com, k., Galis, A., Hares, S., and
              S. Slawomir, "Gap Analysis for Transport Network Slicing",
              draft-qiang-netslices-gap-analysis-01 (work in progress),
              July 2017.

   [RFC8049]  Litkowski, S., Tomotaki, L., and K. Ogaki, "YANG Data
              Model for L3VPN Service Delivery", RFC 8049,
              DOI 10.17487/RFC8049, February 2017,
              <https://www.rfc-editor.org/info/rfc8049>.

13.2.  Informative References

   [_5GICN_]  IEEE Communication, "Delivering ICN Services in 5G using
              Network Slicing.  'Asit Chakraborti, Syed Obaid Amin,
              Aytac Azgin, Ravi Ravindran, G.Q.Wang'", May 2017,
              <https://arxiv.org/abs/1610.01182>.

   [ICNRG]    IRTF, "ICN Routing Group", November 2016,
              <https://irtf.org/icnrg>.

   [Tactile-Internet]
              ITU-T, "Technology Watch Report, The Tactile Internet",
              August 2014, <https://www.itu.int/oth/T2301000023/en>.

   [TR_3GPP.33.899]
              3GPP, "Study on the security aspects of the next
              generation system", 3GPP TR 33.899 0.6.0, November 2016,
              <http://www.3gpp.org/ftp/Specs/html-info/33899.htm>.

   [TR_3GPP.38.801]
              3GPP, "Study on new radio access technology Radio access
              architecture and interfaces", 3GPP TR 38.801 1.0.0, March
              2017, <http://www.3gpp.org/ftp/Specs/html-info/38801.htm>.

   [TR_3GPP_38.913]
              3GPP, "Study on scenarios and requirements for next
              generation access technologies", 3GPP TR 38.913 14.2.0,
              March 2017,
              <http://www.3gpp.org/ftp/Specs/archive/38_series/38.913>.




Makhijani, ed, et al.    Expires April 21, 2018                [Page 30]

Internet-Draft            Netslicing use cases              October 2017


   [TS_3GPP.23.501]
              3GPP, "System Architecture for the 5G System", 3GPP
              TS 23.501 0.2.0, February 2017,
              <http://www.3gpp.org/ftp/Specs/html-info/23501.htm>.

   [TS_3GPP.23.502]
              3GPP, "Procedures for the 5G System", 3GPP TS 23.502
              0.2.0, February 2017,
              <http://www.3gpp.org/ftp/Specs/html-info/23502.htm>.

   [TS_3GPP.28.500]
              3GPP, "Telecommunication management; Management concept,
              architecture and requirements for mobile networks that
              include virtualized network functions", 3GPP TS 28.500
              1.3.0, 11 2016,
              <http://www.3gpp.org/ftp/Specs/html-info/28500.htm>.

   [VCPEBBF]  Broadband Forum, "TR-345 Broadband Network Gateway and
              Network Function Virtualization", Dec 2016,
              <https://www.broadband-forum.org/technical/download/
              TR-345.pdf>.

Authors' Addresses

   Kiran Makhijani
   Huawei Technologies
   2890 Central Expressway
   Santa Clara  CA 95050
   USA

   Email: kiran.makhijani@huawei.com


   Jun Qin
   Huawei Technologies
   Huawei Campus, No. 156 Beiqing Rd.
   Beijing   100095

   Email: qinjun4@huawei.com


   Ravi Ravindran
   Huawei Technologies
   2890 Central Expressway
   Santa Clara  CA 95050
   USA

   Email: ravi.ravindran@huawei.com



Makhijani, ed, et al.    Expires April 21, 2018                [Page 31]

Internet-Draft            Netslicing use cases              October 2017


   Liang Geng
   China Mobile
   Beijing   100095
   China

   Email: gengliang@chinamobile.com


   Li Qiang
   Huawei Technologies
   Huawei Campus, No. 156 Beiqing Rd.
   Beijing   100095
   China

   Email: qiangli3@huawei.com


   Shuping Peng
   Huawei Technologies
   Huawei Campus, No. 156 Beiqing Rd.
   Beijing   100095
   China

   Email: pengshuping@huawei.com


   Xavier de Foy
   InterDigital Inc.
   1000 Sherbrooke West
   Montreal
   Canada

   Email: Xavier.Defoy@InterDigital.com


   Akbar Rahman
   InterDigital Inc.
   1000 Sherbrooke West
   Montreal
   Canada

   Email: Akbar.Rahman@InterDigital.com









Makhijani, ed, et al.    Expires April 21, 2018                [Page 32]

Internet-Draft            Netslicing use cases              October 2017


   Alex Galis
   University College London
   London
   U.K.

   Email: a.galis@ucl.ac.uk


   Giuseppe Fioccola
   Telecom Italia
   Italy

   Email: giuseppe.fioccola@telecomitalia.it






































Makhijani, ed, et al.    Expires April 21, 2018                [Page 33]