Professional Documents
Culture Documents
2018-1 Etr - Magazine - 2018 - 01
2018-1 Etr - Magazine - 2018 - 01
ERICSSON
TECHNOLOGY
MACHINE INTELLIGENCE
& INDUSTRIAL
AUTOMATION
5G NR
PHYSICAL LAYER
IOT SECURITY
MANAGEMENT
✱ XXXXXXXXXXX XXXXXXXXXX ✱
2 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 3
CONTENTS ✱
30
30 5G NETWORK PROGRAMMABILITY FOR MISSION-CRITICAL
APPLICATIONS
5G will make it possible for mobile network operators to support enterprises in a
wide range of industry segments by providing cellular connectivity to mission-critical
applications. The ability to expose policy control to enterprise verticals will create
significant new business opportunities for mobile network operators.
GW
GW
CU Core Core
RAN and mobile core networks, but also to the transport network, which links
all the pieces together. GW
GW GW
GW
ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 5
✱ EDITORIAL EDITORIAL ✱
address
TO PROFOUNDLY CHANGE THE WAY THAT MANY
Ericsson BUSINESSES AND INDUSTRIES OPERATE
REVOLUTION
se-164 83 Stockholm, Sweden
Phone: +46 8 719 00 00
publishing
All material and articles are published on the
Ericsson Technology Review website:
www.ericsson.com/ericsson-technology-review
■ we are publishing this magazine shortly after platform to support a wide range of applications, phones changed the way people interact both with
publisher the first release of 5G from 3GPP, which is significant including the mission critical applications that each other and with different applications. We will
Erik Ekudden because the first release of a completely new standard are required to support industrial automation. continue to explore the possibilities of 5G in future
editor
only happens every 10 years. Fittingly, many of the We have also included an article on the subject ETR articles.
Tanis Bestland (Nordic Morning)
articles in this issue relate to what we think is most of intelligent transport that describes a transport
tanis.bestland@nordicmorning.com important in 5G and how to address the new network solution that connects all the pieces of If you would like to see the contents of this
opportunities that 5G entails. the RAN and the mobile core network, and where magazine in digital form, you can find all of the
editorial board high levels of intelligence, flexibility and automation articles, along with those published in previous
Håkan Andersson, Anders Rosengren, Defining New Radio (NR) was a key focus in the first are used to provide optimal performance for a issues, at: www.ericsson.com/ericsson-
Mats Norin, Erik Westerberg,
Magnus Buhrgard, Gunnar Thrysin, release of 5G. While the development of the radio variety of different 5G scenarios. technology-review
Peter Öhman, Håkan Olofsson, Dan Fahrman, for a new generation has traditionally focused on
Robert Skog, Patrik Roseen, Jonas Högberg, the introduction of a new modulation and coding We know that the protection of both networks and
John Fornehed and Sara Kullman scheme, the main focus this time has been on data is a key requirement for any enterprise or industry
f e at u r e a r t i c l e flexibility to support a large range of devices and that uses LTE and 5G networks. We address this
Industrial automation enable by robotics, services with vastly different characteristics, topic in an article that looks specifically at end-to-
machine intelligence and 5G by Roberto different types of deployments and frequency end (E2E) security management for the Internet
Sabella, Andreas Thuelig, Maria Chiara allocations that range from below 1 GHz well up into of Things (IoT).
Carrozza and Massimo Ippolito
the mmWave bands. To support the expected
art director growth in data volumes, innovative technologies in We also know that video is sure to play in
Liselotte Eriksson (Nordic Morning) the area of massive antenna systems, beamforming important role in many 5G applications.
and energy efficiency have been introduced. With the increased consumption of video over
production leader
mobile networks, it is crucial to ensure a
Susanna O’Grady (Nordic Morning)
One of the key reasons for the flexibility provided in 5G high-quality viewing experience. In light of this,
l ay o u t is the desire to support industries to use connectivity, Ericsson has been part of standardizing a model
Liselotte Eriksson (Nordic Morning) virtualization, machine intelligence and other for measuring viewing quality, which we present
i l lu s t r at i o n s
technologies to change their processes and business here in an article about video QoE (Quality of
Nordic Morning Ukraine models as part of the next industrial revolution, Experience).
Industry 4.0. It is therefore a pleasure to be able to
chief subeditor include an article in this issue that we have co-written With the first 5G standard released and commercial
Ian Nicholson (Nordic Morning) with Comau and the Sant’Anna School of Advanced deployments starting this year, we are entering a
subeditors
Studies on the topic of industrial automation. new era of mobile communications with the potential ERIK EKUDDEN
Paul Eade and Penny Schröder-Smith
to profoundly change the way that many businesses SENIOR VICE PRESIDENT,
(Nordic Morning) In this issue we also cover the topic of 5G network and industries operate. This change may well be GROUP CTO AND
programmability, which allows the network similar to the way that the introduction of mobile HEAD OF TECHNOLOGY & ARCHITECTURE
issn: 0014-0171
Volume: 96, 2018
6 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 7
✱ VIDEO QUALITY OF EXPERIENCE VIDEO QUALITY OF EXPERIENCE ✱
Video QoE
delivery method used today. Their streaming ANALYSIS AS ACCURATE
servers provide several versions of the same video,
each separately encoded to offer varying levels of AND STRAIGHTFORWARD
quality. The streaming client in the user’s phone, AS POSSIBLE
tablet or PC dynamically switches between the
different versions during playout depending on how
much network bitrate is available. video according to their subjective perception of
If the available network bitrate is high, the client its quality, selecting one of the following scores:
will download the best-quality version. If the bitrate 5 (excellent), 4 (very good), 3 (good), 2 (fair) or 1
LEVERAGING STANDARDS suddenly drops, the client will switch to a lower-
quality version until conditions improve. The
(poor). Finally, the average score for each video
is calculated. This number is known as the mean
TO MEET RISING USER EXPECTATIONS purpose of this is to avoid stalling (when the client
stops playout intermittently to fill its video buffer) –
opinion score (MOS).
The video sequences are typically produced
which is known to annoy users. in a lab environment so that all types of
While the ability to switch intermittently between impairments can be included. High-quality
versions of a video significantly decreases the risk of sports, nature and news videos are used as a
‘How happy are our users with their video experience?’ has become a vital stalling, the quality variations that this leads to can starting point. Impairments (codec settings,
also be annoying for the user. Figure 1 provides an rate and resolution changes, initial buffering,
question for mobile network operators and media service providers alike. example of a worst-case scenario with both quality stalling and so on) are then emulated by varying
New standards for QoE testing have the potential to help them ensure that variations and a stalling event, which would result the bitrate over a certain range, for example,
in an overall low-quality experience for the user. or placing stalling events of different lengths at
they are able to meet user expectations for the service that will account for various points in the videos.
three-quarters of mobile network traffic in five years’ time. Subjective quality The tests are designed to make analysis as
ITU-T P.910 [3] is the recognized standard for accurate and straightforward as possible. Devising
performing subjective video quality tests. The subjective tests is a time consuming and expensive
In 2016, Ericsson ConsumerLab found that over a fixed connection can be difficult, doing so tests are carried out in a lab equipped with process, though, and lab tests can’t assess exactly
GUNNAR HEIKKILÄ ,
the average person watches 90 minutes wirelessly is a much more demanding undertaking. mobile phones, tablets, PCs or TVs, where what an MNO’s real users are experiencing. The
JÖRGEN GUSTAFSSON
more TV and video every day than they did Yet by 2022, 75 percent of all mobile data traffic is a number of videos are shown to a group of best way to overcome these challenges is by using
in 2012 [1]. While traditionally broadcast expected to come from video, according to the 2016 individuals. Each individual then grades each objective quality algorithms.
linear TV is still popular with many viewers, Ericsson Mobility Report [2].
internet-based TV and video delivery and At the same time, TV screens are getting
video on demand (VOD) services are all larger, which requires higher video resolution.
growing rapidly. In fact, 20 percent of video High definition (HD) is now the new baseline, Terms and abbreviations
consumption occurred on handheld devices and ultra high definition (UHD) is coming to APN – Access Point Name | AVC – advanced video coding | DASH – Dynamic Adaptive Streaming over HTTP |
in 2016 [1]. both fixed and mobile devices, demanding higher DM – device management | eNB – eNodeB (LTE base station) | ETSI – European Telecommunications Standards
bandwidth. To provide a consistently high QoE Institute | HD – high definition | HEVC – High Efficiency Video Coding | HLS – HTTP Live Streaming | HTTP – Hypertext
– particularly in wireless cases with significant Transfer Protocol | ITU-T – International Telecommunication Union Telecommunication Standardization Sector |
■ As users become more accustomed to video fluctuations in available bandwidth – both MSPs MNO – mobile network operator | MOS – mean opinion score | MPD – media presentation description | MSP – media
streaming services, their quality expectations and MNOs must have a clear understanding of service provider | OMA – Open Mobile Alliance | Pa – short-term audio predictor | Pq – long-term quality predictor |
rise, presenting a big challenge for media service which impairments their users are experiencing Pv – short-term video predictor | QoE – quality of experience | RRC – Radio Resource Control | SMS – short message
providers (MSPs) and mobile network operators and be able to accurately assess their perception service | UHD – ultra high definition | VOD – video on demand | VP9 – An open-source video format and codec
(MNOs). While delivering high-quality video of video quality.
8 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 9
✱ VIDEO QUALITY OF EXPERIENCE VIDEO QUALITY OF EXPERIENCE ✱
10 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 11
✱ VIDEO QUALITY OF EXPERIENCE VIDEO QUALITY OF EXPERIENCE ✱
12 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 13
✱ VIDEO QUALITY OF EXPERIENCE VIDEO QUALITY OF EXPERIENCE ✱
between MSPs.
RECOGNIZED BY 3GPP Raw player
Video QoE estimation service
Debian run time
Device Kafka Video QoE app App metrics
3GPP QoE reporting (Android, iOS, ...)
events
collection
transmitted Collected docker
Implementing a quality model The usefulness of having a standardized client over network Logging server
Video player Player events
Successful implementation of a quality model is feedback mechanism has been recognized by 3GPP,
dependent on access to the input data required by and its technical specification TS 26.247 describes Initiation and coordination Debian run time
Video QoE Metrics
the model itself. The most demanding models, such how this can be implemented for a DASH streaming generation
as full-reference variants, are usually implemented client [5]. The 3GPP concept is called QoE reporting, Ingestion profile Filebeat docker
close to the video streaming client, inside the device, as the metrics collected and reported are related
so that the complete received video can be compared specifically to the quality of the session. Sensitive or Media manager Video QoE calculation Load Debian run time
balancer
with the one sent. This is typically done for manual integrity-related data such as the user’s position and
testing scenarios, where a special test phone is used the content viewed cannot be reported. Logrotate docker
Video ingestion profiles
Tomcat
in which a quality model has been implemented. The basic concept is that the streaming client
This method is not feasible for passive can receive a QoE configuration that specifies the Debian run time Debian run time
measurements, where all or a large part of live video metrics to be collected, how often collection will
traffic is monitored, so model input data needs to occur, when reporting will be done and which entity
be collected in another way. For example, an MNO to report to. There are three ways to send a QoE CoreOS – guest operating system
that wants to gain a better understanding of its configuration to the client to facilitate different
overall perceived video streaming quality would deployment cases:
need to collect data from all streaming sessions.
One way of doing this would be to intercept the 1. Media presentation description Figure 3 Example of a video QoE microservice
traffic at certain network nodes and use the traffic In this case, the client downloads a media
content and pattern to try to infer which service is presentation description (MPD) when streaming
being used and the quality level being delivered. starts. The MPD specifies how the media is
This can be difficult, however, owing to the fact structured and how the client can access and
that many services are now encrypted, which download the media chunks. The MPD can also
significantly limits access to the data required to do contain a QoE configuration that makes it possible
a detailed quality estimation. to get feedback from the client. Since the MPD
One way to overcome this challenge is with the is usually controlled by the content or service
help of the streaming client, which has full knowledge provider, the QoE reports from the client are
of what is happening during the video session. A typically configured to go back to their servers and
feedback link from the streaming client can be used are not always visible to the MNO.
to report selected metrics to the network (or the
original streaming server) where the quality can be 2. Open Mobile Alliance Device Management
estimated. This technique is already used internally Open Mobile Alliance Device Management
for many streaming services. For example, when a (OMA-DM) has defined methods for how an
user clicks on a video link on the internet, the client MNO can configure certain aspects of connected
typically continuously measures different metrics devices such as APNs, SMS servers and so on.
and sends them to the server. Unfortunately for These methods also include an optional QoE
14 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 15
✱ VIDEO QUALITY OF EXPERIENCE VIDEO QUALITY OF EXPERIENCE ✱
configuration that activates QoE reporting from Gunnar Heikkilä for military defense radar
THE INPUT PARA-
the authors
the client. However, not all MNOs deploy OMA- ◆ is a senior specialist in systems, and with software
DM in their networks. METERS TO THE P.1203 machine intelligence at design for synchronous
Ericsson Research. Since digital hierarchy optical
3. Radio Resource Control ALGORITHM ARE TAKEN 1996, he has focused fiber transmission systems.
The Radio Resource Control (RRC) protocol [6] DIRECTLY FROM THE on user experience Heikkilä holds an M.Sc.
is used between the eNB and the mobile device quality assessment and in computer science
to control the communication in the RAN. The VIDEO CLIENT measurements, including from Luleå University of
possibility of including a QoE configuration was standardization in 3GPP, Technology, Sweden.
added in 3GPP rel-14, giving MNOs the ability to ETSI and ITU-T. He joined co-rapporteur of Question
use RRC to activate QoE reporting. As a result, video QoE calculation is then posted back into the Ericsson in 1987 and has Jörgen Gustafsson 14 in ITU-T Study Group
the QoE configuration can be handled like many stream processing system to be used for monitoring, previously worked with ◆ is a research manager at 12, where leading and
other types of RAN-related configurations and visualization, root cause analysis and other purposes. control system software Ericsson Research, heading global standards on
measurements. For an MNO, the standard architecture is to a research team in the areas parametric models and
The QoE metrics reported by the client in each install a probe inside the network – in the core of machine learning and tools for multimedia quality
of these three methods are well aligned with the network, for example. The probe monitors video QoE. The research is applied assessment are being
input requirements in P.1203. This means that, traffic using shallow or deep packet inspection to a number of areas, such as developed, including the
in principle, any of them would enable an MNO and gathers information that can be used as input media, operations support latest standards on quality
to gain a good overview of the video streaming to a QoE estimation algorithm (P.1203). If a video systems/business support assessment of adaptive
quality experienced by its users. Before this can service is not encrypted, the relevant metrics systems, the Internet of streaming. He holds an M.Sc.
happen, though, the new standards will need to and events from the video streams can often be Things and more. He joined in computer science from
be deployed both in the network and in the clients. measured or estimated. The task becomes more Ericsson in 1993. He is Linköping University, Sweden.
challenging if the video streams are encrypted, but
Deployment of video QoE estimation quality estimations of these video streams can still
The delivery of over-the-top video today most be done to some extent by using a combination of
commonly uses a cloud-based microservices probes and standardized and proprietary algorithms References:
platform with inbuilt video-quality estimation and models. However, the ability to report quality- 1. Ericsson ConsumerLab report, TV and Media 2016, available at: https://www.ericsson.com/networked-
features. The P.1203 algorithm for estimating video related metrics direct from the video clients enables society/trends-and-insights/consumerlab/consumer-insights/reports/tv-and-media-2016
quality is most suitable for implementation as a much more accurate estimation of quality.
microservice that estimates video quality (in terms 2. Ericsson Mobility Report, November 2016, available at: https://www.ericsson.com/en/mobility-report
of MOS) for all video streams and for all individual Conclusion
video streaming sessions. If the estimated video MNOs and MSPs stand to gain a great deal from 3. ITU-T P.910, April 2008, Subjective video quality assessment methods for multimedia applications, available at:
quality distribution shows that there is a quality developing a better understanding of how users http://www.itu.int/itu-t/recommendations/rec.aspx?rec=9317
issue, a root cause analysis can be carried out and the experience video quality, and the ITU-T P.1203
necessary measures can be taken to improve quality. and 3GPP TS 26.247 standards provides the 4. ITU-T P.1203, November 2016, Parametric bitstream-based quality assessment of progressive
When running a media service, and providing framework that is necessary to help them do so. download and adaptive audiovisual streaming services over reliable transport, available at:
the video client as part of the service, the input Implementation of these standards by MNOs, http://www.itu.int/itu-t/recommendations/rec.aspx?rec=13158
parameters to the P.1203 algorithm are taken directly MSPs and device manufacturers will enable
from the video client that has all the details about the efficient and accurate estimation of video 5. 3GPP TS 26.247, January 2015, Transparent end-to-end Packet-switched Streaming Service (PSS);
the playout of the stream and reported over the QoE required to meet continuously rising user Progressive Download and Dynamic Adaptive Streaming over HTTP (3GP-DASH), available at:
network to an analytics backend. Figure 3 outlines expectations. The standard’s smart handling of http://www.3gpp.org/DynaReport/26247.htm
an example of such an implementation, in which the effects of stalling events and quality adaptations
player events are reported to a stream processing makes it well suited to overcome the challenges 6. 3GPP TS 25.331, January 2016, Radio Resource Control (RRC); Protocol specification, available at:
system (Kafka) where the video QoE is calculated presented by VOD and by adaptive video http://www.3gpp.org/DynaReport/25331.htm
in a video QoE microservice. The output from the streaming in particular.
16 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 17
✱ 5G NR PHYSICAL LAYER DESIGN 5G NR PHYSICAL LAYER DESIGN ✱
Designing
networks and the addition of a new, globally THE NR PHYSICAL
standardized radio access technology known as
New Radio (NR). LAYER HAS A FLEXIBLE
Change to 5G New Radio
AND SCALABLE DESIGN
5G NR will operate in the frequency range TO SUPPORT DIVERSE
18 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 19
✱ 5G NR PHYSICAL LAYER DESIGN 5G NR PHYSICAL LAYER DESIGN ✱
20 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 21
✱ 5G NR PHYSICAL LAYER DESIGN 5G NR PHYSICAL LAYER DESIGN ✱
slot
30kHz 60kHz 15 x 2nkHz,
Subcarrier spacing 15kHz
(2 x 15kHz) (4 x 15kHz) (n = 3, 4, ...) UL-heavy transmission with DL control DL UL UL UL UL UL UL UL UL UL UL UL UL
slot
OFDM symbol
duration
66.67 µs 33.33 µs 16.67 µs 66.67/2n µs
DL-only transmission with late start due
to LBT or relaxed base station DL DL DL DL DL DL DL DL DL DL DL DL DL
slot
Number of OFDM
symbols per slot
7 or 14 7 or 14 7 or 14 14
Slot aggregation for DL-heavy transmission DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL UL
(for example, for eMBB)
slot slot
500 µs or 250 µs or 125 µs or
Slot duration 1,000/2n µs
1,000 µs 500 µs 250 µs Slot aggregation for UL-heavy transmission DL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL UL
(for example, for eMBB)
slot slot
Figure 2 Scalable OFDM numerology for NR Figure 3 TDD-based frame structure examples for eMBB, URLLC and operation in unlicensed spectrum using listen-before-talk (LBT)
22 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 23
✱ 5G NR PHYSICAL LAYER DESIGN 5G NR PHYSICAL LAYER DESIGN ✱
Frame structure In low-latency scenarios, transmission needs total number of ports, and orthogonality between
NR frame structure supports TDD and FDD to begin immediately without waiting for the start
NR HAS AN ULTRA- PTRS ports is achieved by means of FDM. PTRS
transmissions and operation in both licensed of a slot boundary (URLLC, for example). When LEAN DESIGN THAT is configurable depending on the quality of the
and unlicensed spectrum. It enables very low transmitting in unlicensed spectrum, it is beneficial oscillators, carrier frequency, OFDM subcarrier
latency, fast HARQ acknowledgements, dynamic to start transmission immediately after LBT. When
MINIMIZES ALWAYS-ON spacing, and modulation and coding schemes used
TDD, coexistence with LTE and transmissions transmitting in mmWave band, the large amount TRANSMISSIONS for transmission.
of variable length (for example, short duration of bandwidth available implies that the payload The SRS is transmitted in UL to perform
for URLLC and long duration for eMBB). The supported by a few OFDM symbols is large enough CSI measurements mainly for scheduling and
frame structure follows three key design principles for many of the packets. Figure 3 provides examples link adaptation. For NR, it is expected that the
to enhance forward compatibility and reduce of URLLC- and LBT-based transmission in signal (PTRS), sounding reference signal (SRS) and SRS will also be utilized for reciprocity-based
interactions between different features. unlicensed spectrum via mini-slots and illustrates channel-state information reference signal (CSI-RS). precoder design for massive MIMO and UL beam
The first principle is that transmissions are self- that multiple slots can be aggregated for services DMRS is used to estimate the radio channel management. It is likely that the SRS will have a
contained. Data in a slot and in a beam is decodable that do not require extremely low latency (eMBB, for demodulation. DMRS is UE-specific, can be modular and flexible design to support different
on its own without dependency on other slots and for example). Having a longer transmission duration beamformed, confined in a scheduled resource, procedures and UE capabilities. The approach for
beams. This implies that reference signals required helps to increase coverage or reduce the overhead and transmitted only when necessary, both in CSI-RS is similar.
for demodulation of data are included in a given slot due to switching (in TDD), transmission of reference DL and UL. To support multiple-layer MIMO
and a given beam. signals and control information. transmission, multiple orthogonal DMRS ports Multi-antenna transmissions
The second principle is that transmissions are The same frame structure can be used for can be scheduled, one for each layer. Orthogonality NR will employ different antenna solutions
well confined in time and frequency. Keeping FDD, by enabling simultaneous reception and is achieved by FDM (comb structure) and TDM and techniques depending on which part of the
transmissions together makes it easier to introduce transmission (that is, DL and UL can overlap in and CDM (with cyclic shift of the base sequence or spectrum is used for its operation. For lower
new types of transmissions in parallel with legacy time). This frame structure is also applicable to orthogonal cover codes). The basic DMRS pattern frequencies, a low to moderate number of active
transmissions in the future. NR frame structure D2D communications. In that case, the DL slot is front loaded, as the DMRS design takes into antennas (up to around 32 transmitter chains) is
avoids the mapping of control channels across full structure can be used by the device that is initiating account the early decoding requirement to support assumed and FDD operation is common. In this
system bandwidth. (or scheduling) the transmission, and the UL slot low-latency applications. For low-speed scenarios, case, the acquisition of CSI requires transmission
The third principle is to avoid static and/or structure can be used by the device responding to DMRS uses low density in the time domain. of CSI-RS in the DL and CSI reporting in the
strict timing relations across slots and across the transmission. However, for high-speed scenarios, the time UL. The limited bandwidths available in this
different transmission directions. For example, NR frame structure also allows for rapid density of DMRS is increased to track fast changes frequency region require high spectral efficiency
asynchronous HARQ is used instead of predefined HARQ acknowledgement, in which decoding is in the radio channel. enabled by multi-user MIMO (MU-MIMO)
retransmission time. performed during the reception of DL data and the PTRS is introduced in NR to enable and higher order spatial multiplexing, which is
As shown in Figure 2, a slot in NR comprises seven HARQ acknowledgement is prepared by the UE compensation of oscillator phase noise. Typically, achieved via higher resolution CSI reporting
or 14 OFDM symbols for ≤ 60kHz numerologies and during the guard period, when switching from DL phase noise increases as a function of oscillator compared with LTE.
14 OFDM symbols for ≥ 120kHz numerologies. A slot reception to UL transmission. carrier frequency. PTRS can therefore be utilized For higher frequencies, a larger number of
duration also scales with the chosen numerology since To obtain low latency, a slot (or a set of slots at high carrier frequencies (such as mmWave) to antennas can be employed in a given aperture,
the OFDM symbol duration is inversely proportional in case of slot aggregation) is front-loaded with mitigate phase noise. One of the main degradations which increases the capability for beamforming
to its subcarrier spacing. Figure 3 provides examples control signals and reference signals at the caused by phase noise in an OFDM signal is an and MU-MIMO. Here, the spectrum allocations
for TDD, with guard periods for UL/DL switching. beginning of the slot (or set of slots). identical phase rotation of all the subcarriers, are of TDD type and reciprocity-based operation
A slot can be complemented by mini-slots known as common phase error (CPE). PTRS is is assumed. In this case, high-resolution CSI in the
to support transmissions with a flexible start Reference signals designed so that it has low density in the frequency form of explicit channel estimations is acquired
position and a duration shorter than a regular slot NR has an ultra-lean design that minimizes always- domain and high density in the time domain, since by UL channel sounding. Such high-resolution
duration. A mini-slot can be as short as one OFDM on transmissions to enhance network energy the phase rotation produced by CPE is identical CSI enables sophisticated precoding algorithms
symbol and can start at any time. Mini-slots can efficiency and ensure forward compatibility. In for all subcarriers within an OFDM symbol, but to be employed at the BS. This makes it possible to
be useful in various scenarios, including low- contrast to the setup in LTE, the reference signals there is low correlation of phase noise across increase multi-user interference suppression, for
latency transmissions, transmissions in unlicensed in NR are transmitted only when necessary. The OFDM symbols. PTRS is UE-specific, confined example, but might require additional UE feedback
spectrum and transmissions in the millimeter wave four main reference signals are the demodulation in a scheduled resource and can be beamformed. of inter-cell interference or calibration information
spectrum (mmWave band). reference signal (DMRS), phase-tracking reference The number of PTRS ports can be lower than the if perfect reciprocity cannot be assumed.
24 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 25
✱ 5G NR PHYSICAL LAYER DESIGN 5G NR PHYSICAL LAYER DESIGN ✱
26 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 27
✱ 5G NR PHYSICAL LAYER DESIGN 5G NR PHYSICAL LAYER DESIGN ✱
Polar codes are a relatively recent invention, Conclusion Ali A. Zaidi access for 5G. He holds a from KTH Royal Institute of Valencia in Spain in 2016
the authors
introduced by Arıkan in 2008 [6]. They are the Flexibility, ultra-lean design and forward ◆ joined Ericsson in 2014, Dipl. Ing. and a Ph.D. from Technology in Stockholm, and joined Ericsson the
first class of codes shown to achieve the Shannon compatibility are the pillars on which all the 5G NR where he is currently a Sweden. same year. Since then he
capacity with reasonable decoding complexity for physical layer technology components (modulation senior researcher working has worked on concept
a wide variety of channels. schemes, waveform, frame structure, reference with concept development Sebastian Faxér development and 3GPP
By concatenating the polar code with an outer signals, multi-antenna transmission and channel and standardization of radio ◆ is a researcher at Ericsson standardization of reference
code and keeping track of the most likely values of coding) are being designed and built. The high level access technologies (NR Research. He received an signals for NR.
previously decoded bits at the decoder (the list), of flexibility and scalability in 5G NR will enable it to and LTE-Advanced Pro). M.Sc. in applied physics
good performance is achieved at shorter block meet the requirements of diverse use cases, including His research focuses on Zhao Wang
lengths, like those typically used for layer 1 and a wide range of carrier frequencies and deployment mmWave communications, ◆ is a researcher at Ericsson
layer 2 control signaling. By using a larger list size, options. Its built-in forward compatibility will indoor positioning, device- Research who joined the
error correction performance improves, at the cost ensure that 5G NR can easily evolve to support any to-device communications, company in 2015. He holds a
of higher complexity at the decoder. unforeseen requirements. and systems for intelligent the Technische Universität Ph.D. in telecommunications
Wien in Vienna, Austria. from KTH Royal Institute of
He received the Ericsson Technology in Stockholm,
Inventor of the Year award Sweden. His work currently
in 2010, and in 2014 he and
a group of colleagues were
nominated for the European and electrical engineering
Inventor Award. from Linköping University,
References: Sweden, in 2014 and joined
Mattias Andersson Ericsson the same year.
1. Ericsson Survey Report, 2016, Opportunities in 5G: the view from eight industries, available at: ◆ is an experienced Since then he has worked on
https://app-eu.clickdimensions.com/blob/ericssoncom-ar0ma/files/5g_industry_survey_report_final.pdf transportation and researcher who joined concept development and
networked control. He standardization of multi-
2. The 5G Infrastructure Public Private Partnership (5G-PPP) Technical Report, February 2016, holds an M.Sc. and a Ph.D. antenna technologies for LTE
5G empowering vertical industries, available at: https://5g-ppp.eu/wp-content/uploads/2016/02/ in telecommunications and NR. focuses on reference signal
BROCHURE_5PPP_BAT2_PL.pdf from KTH Royal Institute of design of NR for 3GPP
Technology in Stockholm, Vicent Molés-Cases standardizations.
3. 3GPP Technical Report TR38.913, ver. 14.2.0, Release 14, March 2017, Study on scenarios and requirements Sweden. Zaidi is currently ◆ is a researcher at Ericsson
for next generation access technologies, available at: https://portal.3gpp.org/desktopmodules/Specifications/ serving as a member of the Research. He received an
SpecificationDetails.aspx?specificationId=2996 Technology Intelligence M.Sc. in telecommunication
Group Radio and a member
4. IEEE Communications Magazine, vol. 54, no. 11, pp. 90-98, A. A. Zaidi, R. Baldemair, H. Tullberg, H. of the Young Advisory Board
Bjorkegren, L. Sundstrom, J. Medbo, C. Kilinc, and I. D. Silva, November 2016, Waveform and numerology to at Ericsson Research. Ericsson in 2014. His
support 5G services and requirements, available at: http://ieeexplore.ieee.org/document/7744816/ work focuses on concept
Robert Baldemair development and
5. IEEE Communications Standard Magazine (submitted), A. A. Zaidi, R. Baldemair, V. Molés-Cases, N. He, K. ◆ is a master researcher standardization of low-
Werner, and A. Cedergren, OFDM Numerology Design for 5G New Radio to Support IoT, eMBB, and MBSFN who joined Ericsson in 2000. latency communications,
He spent several years carrier aggregation and
6. IEEE Transactions on Information Theory, vol. 55, pp. 3051-3073, E. Arıkan, July 2009, Channel polarization: working with research and channel coding for LTE and
A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels, development of radio access NR. He holds both an M.Sc.
available at: http://ieeexplore.ieee.org/document/5075875/ technologies for LTE before in engineering physics and a engineering from the
shifting his focus to wireless Ph.D. in telecommunications Polytechnic University of
28 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 29
✱ 5G NETWORK PROGRAMMABILITY 5G NETWORK PROGRAMMABILITY ✱
5G network
Drivers of network programmability by using a software service orchestration function
The key drivers behind the creation of a instead of manual provisioning by engineers.
programmable network are the need to accelerate As orchestration will also be used for provisioning
time to market, and the desire to reduce operational connectivity services to mission-critical
programmability
costs and take advantage of the business applications, mobile networks need to support
opportunities presented by a new mission-critical QoS programmability.
service market. In a programmable network,
traditional network functions requiring specialized Mission-critical Intelligent
hardware are replaced with software functions Transportation System use cases
hosted on commercial off-the-shelf infrastructure. 5G will support a diverse range of use cases
Technologies such as software-defined networking in different industry sectors, each putting its own
FOR MISSION-CRITICAL APPLICATIONS and network functions virtualization are essential QoS requirements on the mobile network [1]. It is
to cutting operational and capital costs in mobile possible to use network programmability to realize
networks. mission-critical use cases with QoS requirements
5G will make it possible for mobile network operators to support Cloud-based services and applications are by creating highly specialized services tailored
enablers for programmability. Service provisioning to industrial needs and preferences.
enterprises in a wide range of industry segments by providing cellular in the cloud and managed access to the provisioned Features like lower latency (reaction times that
connectivity to mission-critical applications. The ability to expose policy services and applications are important. This are five times faster), higher throughput (10 to 100
requires collaboration between telecom and other times higher data rate) and an enormous increase in
control to enterprise verticals will create new business opportunities for industries (IT application and content providers, the number of connected devices (10 to 100 times
mobile network operators by enabling a new value chain through the and automotive original equipment manufacturers, more) can support the large-scale use of massive
for example). One way to simplify and accelerate the machine-type communication (mMTC) and
integration of telecom with other industries. deployment of services and applications from mission-critical MTC (MC-MTC) use cases for the
industry verticals is the automatic translation of first time. Further, a dedicated network slice would
industrial requirements to service requirements, meet the specific requirements of each use case.
R AFIA INAM ,
A key differentiator of 5G systems from a unique and personalized experience. and then on to resource-level requirements (in In mMTC use cases, a large number of sensors
ATHANASIOS previous generations will be a higher degree A number of use cases in mission-critical other words, network requirements). Network and actuators are connected using a short-range
K AR APANTEL AKIS, of programmability. Instead of a one-size-fits- scenarios can benefit from QoS programmability slicing provides a dedicated, virtualized mobile radio (capillary network) to a base station (eNodeB)
LEO N ID M O KRUSH IN , all mobile broadband service, 5G will provide because a cellular network’s connectivity network containing a set of network resources, and using a low protocol overhead to save the battery
ELENA FERSMAN the flexibility to tailor QoS to connectivity requirements – including latency, throughput, provides guaranteed QoS. The network slices are life of the devices.
services to meet the demands of enterprise service lifetime and cost – vary widely across not only beneficial but also critical to support many This requires a network slice with broad coverage,
customers. This enables a new range of different use cases. To support them all, we have applications in vertical industries. small data volumes from massive numbers of
mission-critical use cases, such as those developed an application programming interface New network communication services can also devices. MC-MTC use cases emphasize lower
involving connected cars, manufacturing (API) that allows third parties to specify and be provisioned programmatically; that is, latency (down to a level of milliseconds),
robots, remote surgery equipment, precision request network QoS. We have also demonstrated
agriculture equipment, and so on. the usefulness of this API on a test mobile network
using a transport-related use case.
As part of this use case, we have been collaborating Terms and abbreviations
AAR – Authentication Authorization Request | AF – application function | API – application programming interface
■ Network programmability can support rapid with commercial vehicle manufacturer Scania to
eNB – eNodeB | EPC – Evolved Packet Core | EPS – Evolved Packet System | HSS – Home Subscriber Server |
deployment of new use cases by combining develop the QoS requirements for teleoperation.
ITS – Intelligent Transportation System | MME – Mobility Management Entity | mMTC – massive machine-type
cloud-based services with mobile network Teleoperation is the remote operation of an
communication | MTC – machine-type communication | PCRF – policy and charging rules function | PDN – packet
infrastructure and taking advantage of new levels autonomous vehicle by a human operator in cases
data network | PGW – PDN gateway | QCI – QoS class identifier | Rx – radio receiver | SAPC – Service-Aware
of flexibility. Further, network programmability will where the vehicle encounters a situation that the
Policy Controller | SGW – service gateway | UDP – User Datagram Protocol | UE – user equipment
enable a greater number of enterprise customers to autonomous system cannot overcome by itself (a
use such services, and consumers will benefit from road obstacle or malfunction, for example).
30 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 31
✱ 5G NETWORK PROGRAMMABILITY 5G NETWORK PROGRAMMABILITY ✱
in mobile networks. However, the bandwidth support the volume and diversity of use cases Figure 2 illustrates the architecture of the system
WE ENVISION REALIZING requirements to make this possible are not with the current network management approach. on which we have implemented the API. In addition
THESE USE CASES WITH A excessive, as only vehicle control data needs to be They need a different means of managing the to deploying a standard EPC and LTE band-40 RAN,
communicated. This capability is expected in 5G. network to stay competitive. In our view, an AF is deployed on an OpenStack-managed cloud.
FLEXIBLE NETWORK developing an API is the logical first step toward This application functionality allows third parties
PROGRAMMABILITY Teleoperation of vehicles exposing a programmable network to the industry to set up QoS for their UEs through an API.
The ability to control a self-driving vehicle from a verticals. This approach will result in a solution that The AF consists of the following components:
TECHNIQUE distance is an important use case that is needed in is more responsive than rigid commercial offerings, a knowledge base module, an API endpoint module
robust transmission and multilevel diversity due public transportation when an onboard, autonomous such as preconfigured subscription packages. and a transformer.
to their mission-critical nature and, consequently, system faces a difficult situation, such as a traffic
need a network slice of very low latency, high accident, an unexpected demonstration, unscheduled Architecture of the Ericsson-Scania project Knowledge base module
reliability and availability (packet loss down to roadworks or flooding. These scenarios require the Teleoperating a bus requires data from sensors on This module maps domain-specific concepts
10-9). This is possible by creating a slice of very high planning of an alternate route, and an operator the bus, including a video feed from a camera at the to the generic concepts. The knowledge base is
priority. We envision realizing these use cases needs to drive the vehicle remotely for a short time. front that is streamed to a remote operations center implemented as a graph database, has a schema
with a flexible network programmability technique. Another case could be a mechanical malfunction or over LTE radio access with an evolved 5G core of general concepts and can be extended with
The current focus of our research is within the an injury on a bus that requires remote intervention network. The commands to drive the bus are sent additional domain concept documents that
Intelligent Transportation System (ITS) domain to mitigate the risk of danger to others. Network from the center to the bus using Scania’s command instantiate the general concept schema. The schema
and includes a few 5G use cases in mMTC and requirements for remote monitoring and control system. includes a basic vocabulary of general concepts that
MC-MTC, including transportation and logistics, include broad coverage, high data throughput and Figure 1 illustrates the data streams that need to model QoS requests. These concepts can be
autonomous cars and teleoperated vehicles. low latency to enable continuous video streaming be prioritized to meet QoS demands: sensor data, instantiated in domain concepts for a specific
and the ability to send commands between a remote the video feed originating from the vehicle user enterprise. In our case, the enterprise
Transportation and logistics operations center and a vehicle [2]. equipment (UE) and the commands to remotely is automotive.
The lower latency and high throughput of 5G drive the bus. Sending these data streams over Within the knowledge base module, an “agent”
will support multiple use cases related to connected Why an API? low-priority data traffic (like infotainment) is a string that is semantically related to the mobile
cars, transportation and retail logistics that To guarantee QoS for the three ITS cases described is a critical requirement. We used QOS class device for whic h QoS is requested. In our case, the
consist of fleets of connected/driverless vehicles above (and mission-critical use cases in general) identifier (QCI) bearers, as detailed in the agent is instantiated with the “vehicle” domain
transporting people and goods. The key network mobile network operators typically go through corresponding 3GPP standard, to enforce this concept. QoS class identifiers (QCIs) are indicators
requirements for mission-critical automotive manual network planning and configurations. prioritization. We assigned QCI class 5 and 2 to of network QoS for a given agent. The QCI concept
driving are high throughput and low latency up to Examples include configuring manual data routes video and sensor data respectively and lowest- was introduced in 3GPP TS 23.203 Release 8,
100ms. Failure is not an option in these cases. via different routers, configuring Differentiated priority QCI class 9 to infotainment. In our lab with additional classes being introduced in
There are also many potential sub-use cases. Services and allocating dedicated spectrum ranges environment, we have confirmed that the high- Release 12 and Release 14.
For example, a journey from A to B in a driverless to each use case. However, doing this is costly because priority streams (QCI 2 and 5) can be kept Every QCI class has an integer identifier, for
vehicle could involve vehicle-to-vehicle connections, it requires the configuration and deployment of regardless of the amount of low-priority example QCI1 or QCI2, and is mapped to a set of
connections between vehicles and street network equipment. Nor is it particularly feasible, background data traffic in the network [3, 4]. QoS metrics such as an indicator of priority of data
infrastructure for traffic management, and as this kind of configuration deployment cannot be The next step will be to test our testbed setup traffic, an upper ceiling for network latency and, in
high-speed reliable connectivity to support cloud done merely in parts of the transport network (such for the prioritized video stream in the presence some cases, guaranteed bit rate. In our case,
applications. as backhaul). If, on the other hand, the resources of the network load due to infotainment-type QCIs are instantiated with domain concepts for
were virtualized and there was software that could background traffic. real-time vehicle traffic domain concepts.
Autonomous vehicles set up these routes over the same physical network For example, QCI3 is instantiated as “vehicle_
The vision of fully autonomous vehicles aims to link, both of the limiting factors would be eliminated: How it works control_traffic” and QCI4 is instantiated as
reduce the risks associated with human error. the cost of configuration and the deployment of A cloud-hosted application function (AF) “vehicle_video_traffic.” For users browsing their
A system to achieve this vision would need to multiple routes. As a result, it would be both dynamically sets up virtual connections between mobile devices in the vehicles, we instantiate a
connect the cars and the road infrastructure with financially and technically feasible to support vehicles and the 5G Evolved Packet Core (EPC) low-priority class QCI9 as vehicle_web_browsing.”
1ms latency in all areas (100 percent coverage). these use cases concurrently. network, with specific QoS attributes, such as Data traffic descriptors are generic contents that
Unfortunately, 1ms latency is currently not possible It is clear that operators will not be able to designated latency levels and guaranteed throughput. can configure each QCI. The configuration
32 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 33
✱ 5G NETWORK PROGRAMMABILITY 5G NETWORK PROGRAMMABILITY ✱
HSS
Request to prioritize vehicle data traffic
Ericsson Cloud S6a
eNB eNB
S1-U S1-U
SGW
Scania Uu Uu Uu Uu
command S5/S8
Data traffic center
prioritization interface Remote UE UE PGW Gx SAPC UE UE
driver
EPC
Rx
(5G) core
network
Transformer
Knowledge
base
Domain Generic API
semantics call
API endpoint
Internet Domain
knowledge
definition
AF
Ericsson test
Scania bus network at Scania Ericsson
research
test track Control plane cloud QoS setup
Figure 1 Prioritized data streams to meet QoS demands Figure 2 Architecture for programmable QoS in existing an LTE EPC network
pertains to a characterization of the traffic in terms concept document, while each specific enterprise from any third party. These API calls get translated specified in 3GPP TS 29.214. The Rx requests are
of required throughput for both “uplink” and has more than one document. For example, in our into generic concept calls that are subsequently sent directly to the PCRF node in order to set up
“downlink,” the former being data traffic case, there is an “automotive/teleoperation” sent to the transformer module. Note that, in the “EPS bearer” (in other words, the data tunnel
transmitted from the agent and the latter being the document. However, other documents for addition to an API call for setup of specialized QoS, with the requested QoS). As is the case with the
opposite. Optionally, descriptors may also contain automotive can also exist, such as “automotive/ there is another API call for teardown of this QoS. endpoint module, the transformer module can also
the type of data packets exchanged (for example, autonomous drive” or “automotive/remote fleet For example, when a vehicle is decommissioned translate a teardown request to an Rx request to
UDP/IP or TCP/IP), as well as potentially the port management.” Because the data is stored as linked or does not need to be teleoperated, there can be revert to the lowest-priority default bearer
or port range. For example, in the case of data, concepts from one domain concept document a call to tear down the QoS tunnel, so network (in most cases, QCI9).
“vehicle_control_traffic,” the data traffic can be reused in another. resources can be allocated to UEs in other vehicles
descriptor identifies an uplink bandwidth or devices. Figure 3 provides an overview of
of 1Mbps and a downlink bandwidth of 1Kbps. API endpoint module domain-specific and generic requests.
CONCEPTS FROM
A combination of agents, QCIs and their This module composes API specifications from ONE DOMAIN CONCEPT
associated data traffic descriptors are stored every domain concept document in the knowledge Transformer module
in the knowledge base as a domain concept base. This API specification is RESTful, uses The transformer module translates generic requests
DOCUMENT CAN BE REUSED
document. Every use case has its own domain symmetric encryption (HTTPS) and can be called for QoS to Rx AAR requests, as these requests are IN ANOTHER
34 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 35
✱ 5G NETWORK PROGRAMMABILITY 5G NETWORK PROGRAMMABILITY ✱
100.000
Domain specific request Generic request Description of the request 50.7720697 45.764087 47.333316
Color interpretation
GET /vehicle GET /agent Retrieve QoS information <= 0.08% packet loss: unnoticeable in video
for all UEs 10.000
>0.08 – 0.5%: ghosting effect
5.086253 0.5% – 1%: artificial movement/dropped frames
1% – 5%: long pauses
GET /vehicle/<IP> GET /agent/<IP> Retrieve QoS information 5%+ impossible to follow
1.3418724
for one UE, based on its IP 1.000
address
bearer setup
0.010
36 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 37
✱ 5G NETWORK PROGRAMMABILITY 5G NETWORK PROGRAMMABILITY ✱
the authors
in 2015. She works as a paper award in 2015. in the area of cognitive
senior researcher in the technologies. His current
area of machine intelligence focus is on investigating
and automation, and her what technological
research interests include opportunities artificial
5G management, service intelligence may bring to
modeling, virtualization Ericsson by creating and
of resources, reusability prototyping innovative
of real-time software and concepts in the context Elena Fersman
ITSs. Inam received her M.S. of new industrial and ◆ is head of machine
from Chalmers University of telco use cases. He joined intelligence and automation
Technology in Gothenburg, Ericsson Research in 2007 at Ericsson Research and
Sweden, in 2010. She Athanasios after postgraduate studies an adjunct professor in
received her Licentiate Karapantelakis at Uppsala University in cyber-physical systems
and doctoral degrees from ◆ joined Ericsson in Sweden. He holds an M.Sc. at KTH Royal Institute of
Mälardalen University in 2007 and currently works in software engineering Technology in Stockholm.
drop requirements from empirical observations Conclusion Västerås, Sweden in 2012 as a master research from Peter the Great St. She holds a Ph.D. in
during test driving. We took a total of 160 5G attributes such as network slicing and low engineer in the area of computer science from
measurements for each experiment and plotted latency will soon make mission-critical use cases machine intelligence and Uppsala University in
the graphs based on the respective average value. such as safe, autonomous public transport a reality. automation. He holds a B.Sc. Sweden and did post-
Measurements from the 5G-network testbed Automated network resource prioritization via a in computer science from doctoral research at École
show that resource prioritization can assure programmable API can support network QoS for the University of Crete in normale supérieure Paris-
The authors
predefined QoS levels for mission-critical diverse use cases with different connectivity Greece and an M.Sc. and Saclay, France, before
would like to
applications, regardless of background traffic. requirements on the cellular network. By developing acknowledge
Licentiate of Engineering starting her industrial
Figure 4 illustrates guaranteed uplink packet loss an API that allows a third party to request network the work of
in communication systems career. Her current research
for a critical application, in which the acceptable resources and implementing it on a test mobile Keven (Qi) Wang
from KTH Royal Institute of interests are in the areas of
packet loss of less than or equal to 0.08 percent is network, we have demonstrated how the technology on this project Technology in Stockholm, modeling and analysis and of
unnoticeable in the video stream. This is true even works in an urban transport-related use case with during his stay at and 2014 respectively. Her Sweden. His background is software- and knowledge-
with extreme background traffic when the system is Scania. The initial results show that throughput and Ericsson. paper, “Towards automated in software engineering. Petersburg Polytechnic intensive intelligent systems
congested – the critical traffic is still served with no latency are maintained for high-priority streams service-oriented lifecycle University. applied to 5G and IoT.
performance degradation. regardless of the network load.
However, as Figure 4 also illustrates, for the
non-prioritized infotainment traffic (QCI9) the References
packet loss increases heavily with the increase Further reading 1. IEEE, International Conference on Intelligent Transportation Systems (November 2016) – Feasibility
in the background traffic, introducing long pauses 〉〉 YouTube, Remote bus driving over 5G, Assessment to Realise Vehicle Teleoperation using Cellular Networks – Rafia Inam, Nicolas Schrammar, Keven
and making teleoperation impossible even for a November 2016: https://www.youtube.com/ Wang, Athanasios Karapantelakis, Leonid Mokrushin, Aneta Vulgarakis Feljan and Elena Fersman, available at:
lower level of congestion. watch?v=lPyzGTD5FtM http://ieeexplore.ieee.org/document/7795920/
When we measured the uplink delay, we found 〉〉 Ericsson Research blog, 5G teleoperated 2. IEEE, International Conference on Future Internet of Things and Cloud (August 2016) – DevOps for IoT
that it is preserved (remaining at less than 34ms) vehicles for future public transport, June Applications Using Cellular Networks and Cloud – Athanasios Karapantelakis, Hongxin Liang, Keven Wang,
for the critical video traffic even when the system 8, 2017, Berggren, V; Fersman, E; Inam, R; Konstantinos Vandikas, Rafia Inam, Elena Fersman, Ignacio Mulas-Viela, Nicolas Seyvet and Vasileios
exhibits congestion. For the non-prioritized traffic, Karapantelakis, A; Mokrushin, L; Schrammar, Giannokostas, available at: http://ieeexplore.ieee.org/document/7575883/
the delay reaches up to 600ms during congestion. N; Vulgarakis, A; Wang, K: https://www. 3. Ericsson Mobility Report, Improving Public Transport with 5G, November 2015, available at: https://www.
The next step is to develop the concept for a ericsson.com/research-blog/5g/5g-teleoperated- ericsson.com/res/docs/2015/mobility-report/emr-nov-2015-improving-public-transport-with-5g.pdf
self-service portal where network customers vehicles-future-public-transport/
4. IEEE, Conference on Emerging Technologies and Factory Automation (September 2015) – Towards automated
could specify QoS requirements on their own terms; 〉〉 Ericsson Mobility Report, June 2017:
service-oriented lifecycle management for 5G networks (Best Paper) – Rafia Inam, Athanasios Karapantelakis,
for example, to prioritize 4K video traffic for https://www.ericsson.com/assets/local/mobility-
Konstantinos Vandikas, Leonid Mokrushin, Aneta Vulgarakis Feljan, and Elena Fersman, available at: http://
40 buses in an urban scenario. The software would report/documents/2017/ericsson-mobility-report-
ieeexplore.ieee.org/document/7301660/
then translate this specification into instructions june-2017.pdf
for network resource prioritization.
38 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 39
✱ FEATURE ARTICLE FEATURE ARTICLE ✱
Industrial
automation
enabled by
ROBOTICS, MACHINE INTELLIGENCE AND 5G
The emergent “fourth industrial revolution” will have a profound impact on implementing breathtakingly innovative concepts to create value in entirely new ways. These cyber-
as a result. For example, the 2017 Hannover physical production lines are cutting-edge today, but
both industry and society in the years ahead. Robotics, machine intelligence Industry Fair showcased several innovations such will be the standard of tomorrow. By the end of 2017,
as collaborative robots, smart materials, adaptive Industry 4.0 had grown into a truly international
and 5G networks in particular will play major roles in this revolution by enabling production, and self-learning systems, which were initiative with contributors and users all over
ever higher levels of automation for production processes. on their way out of labs and onto real production the globe, changing the basis of competition in
shop floors. German industry is committed to production automation for good.
making Industry 4.0 the new benchmark in Guaranteed real-time communication between
The combination of robotics, machine all their building blocks. As a leader in 5G production efficiency, with plans to invest EUR 40 humans, robots, factory logistics and products
ROBERTO SABELLA infrastructure – including cloud technologies, big billion annually until 2020. is a fundamental prerequisite of the Industry 4.0
(ERICSSON), intelligence and 5G networks will provide a
wealth of opportunities for cooperation data analytics and IT capabilities – Ericsson is The strength of the Industry 4.0 initiative lies in concept. Real-time data will generate transparency
ANDREAS THUELIG
between robots and humans that can improve well placed to take a leading role in this the fact that it has been a joint effort of government, and actionable insights, while edge analytics will
(ERICSSON),
productivity and speed up the delivery of transformation and partner with industries to universities and industries since day one. Together help reap maximum machine value and optimize
MARIA CHIAR A
CARROZZA services for citizens. develop solutions that are tailored to fit their they foster growth, using fewer resources, reducing production. All of the above concepts clearly
(SANT’ANNA SCHOOL needs. Our fruitful collaboration with Comau, a risk and boosting productivity and flexibility. The require standardization and (data) security. With
OF ADVANCED world leader in industrial automation, and the initiative has developed many groundbreaking its standardized networking capabilities, built-in
STUDIES), ■ Most analysts agree that smart manufacturing Sant’Anna School of Advanced Studies, a highly concepts that have resulted in a quantum leap in security, guaranteed grades of service, as well as
MASSIMO IPPOLITO is likely to represent the biggest portion of market regarded academic center of excellence in the networking of humans, machines, robots and distributed cloud and network slicing concepts, 5G
(COMAU) revenues for the Internet of Things (IoT) in the robotics, is the first step. products. Manufacturing leaders are combining is a perfect tool for advanced industries that want to
near future. Smart manufacturing is dependent on information technology and operations technology take advantage of digital transformation.
industrial automation, which relies heavily on the Understanding Industry 4.0
use of robots and machine intelligence. The The German government launched the Industry
factory of the future will be realized through the 4.0 initiative in 2011 to foster the competitiveness Terms and abbreviations
digitization of the manufacturing process and of its industries for the decades to come. Seven IoT – Internet of Things | OEM – original equipment manufacturer | PLC – programmable logic controller |
plants, which will be enabled by 5G networks and years later, we can see that leading industries are PoC – proof of concept
40 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 41
✱ FEATURE ARTICLE FEATURE ARTICLE ✱
1994
Why is it happening? Mass
Personalized
“Understanding” SH customization
production
PU L
What is happening? L
“Seeing” PU
1913
1 2 3 4 5 6
Product variety
Figure 1: The Industry 4.0 maturity index Figure 2: Evolution of the production paradigm toward Industry 4.0
Figure 1 shows the development path that allows the end of the 18th century led to the advent of automotive industry, the principle applied to any and scalable customization.
industries to evolve step-by-step toward the full mechanization, industrial production remained at kind of manufacturing process. The trend for “personal” product customization
Industry 4.0 transformation process [1]. It consists an artisanal level until the 20th century, when true In recent decades, there has been an increasing is growing, along with a preference for online
of six stages with each building on the previous mass production began with automotive need for customization to allow manufacturers to purchasing. Therefore, current processes need to be
one. Each stage includes a description of the manufacturing. Assembly-line production differentiate from competitors and broaden their adapted to be more flexible and customizable, while
necessary capabilities and the consequent benefit became a paradigm for mass production and had product offerings. In a way, the product variety still protecting initial investments in the production
for companies. Connectivity is the second stage, far-reaching impacts on society. In fact, what is stimulates the consumer market, provided that line. High speed wireless infrastructure such as 5G
immediately after computerization, and it enables called “Fordism” in social science describes an manufacturing costs are kept low enough to have networks can facilitate the modification (required
the ones that follow. economic and social system based on sustainable margins. The final step of the trend is by customized products) of OEM machines with
industrialized, standardized mass production and “personalized production.” Based on the Industry minimal impact.
The transformation of manufacturing mass consumption. The key concept is the 4.0 paradigm and leveraging on new technologies The digitization of factory operations enabled
The transformation of the manufacturing industry manufacturing of standardized products in huge across the complete value chain from suppliers to by IoT technologies promises to make that happen.
[2] from mass production to mass customization volumes, using special-purpose machinery and, at customers, it is possible to significantly increase Digital tools will be able to monitor and control all
through digitized factory operations is illustrated that time, unskilled labor. Although Fordism was a the flexibility of the production line, and shorten tools of production, collecting data from thousands
in Figure 2. Although the industrial revolution at method used to improve productivity in the production lead times. This leads to more affordable of sensors to create a digital image of the product
42 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 43
✱ FEATURE ARTICLE FEATURE ARTICLE ✱
being realized, usually referred to as a “digital Virtual commissioning involves a virtual plant and the manufacturing system. cloud computing.
shadow.” Once a digital shadow has been created and a real controller. The simulated plant model The factory of the future could consist of flexible Big data and analytics systems are therefore
for a physical product and bears its specific DNA, has to be fully defined at the level of sensors and production islands, able to realize different types of essential in the digital factory. Eventually, a cyber-
it is possible to manufacture that product more actuators. A major benefit of this is that it replaces building blocks, without the rigidity of conveyors physical system will be needed to handle the
efficiently and with a higher degree of quality in the need for real commissioning with real plants and with truly standard robotized working stations. complex production process, consisting of IT
the digitized production facility. In this way, it is and controllers, which is very expensive and time As a result, agile shuttling robots are needed to systems built around machines, storage systems and
possible to optimize the manufacturing process, consuming. Instead, virtual commissioning allows transfer assembled blocks from one production supplies. All the above leads to further efficiencies
detect quality issues early to prevent defects at the for the identification of possible design defects and island to another without the need for physical in the factory, by allowing preventive and predictive
end of the production line and make continuous operational mistakes before investments are made in or virtual rails. maintenance that reduces the time the plant is off-
improvements. It is also possible to carry out physical plant infrastructure. The digitization of the service, minimizing production delays and avoiding
predictive and preventive maintenance. manufacturing plant allows its designers to enhance Digital factory elements and the role of 5G faults. One interesting effect of the efficiency
The combination of wireless sensors and high- the efficiency of the production process, increase The virtual plant concept makes it possible to boost is the reduced energy consumption. Process
capacity communication networks such as 4G and the automation density and optimize the handling of carry out global system design, simulation, reengineering is something that will be done at a
5G plays a key role in this context, by enabling data materials necessary to realize the products. verification and physical mapping at a much lower lower cost than today.
collection from shop-floor level (production lines) Digitization allows the introduction of the cost than what is possible with a physical plant. To
and data transfer to cloud systems for continuous “just in sequence” concept, where components do so, however, the virtual plant requires new The challenge of connecting robots
monitoring and control. and parts arrive at a production line according to kinds of robots with the ability to increase the A previous article in Ericsson Technology Review
Virtual controllers that combine control, data schedule, right in time for assembly. In addition, it flexibility of the global production system. These [3] explained the benefit of cloud robotics for
logging and alarms into a cloud platform also help can enable a truly lean enterprise, allowing for a robots need to be multipurpose and intelligent various areas of industry (manufacturing,
the process of digitization and save costs, panel much richer understanding of the customer demand enough to adapt, communicate and interact with agriculture and transportation) in different
space and maintenance activities compared to and the immediate sharing of the demand data each other and with humans, based on a remote logistics contexts such as harbors and hospitals.
traditional systems. They can control a wide variety throughout complex supply chains and networks. control that can globally manage a complete set of The rising level of intelligence in robots allows
of production tools and are also a solution for Smart factories can produce at a faster rate with less robot systems. them to adapt to changing conditions, which is
remotely located machines and portable systems waste. Industry 4.0 enables a much quicker flow of High-quality wireless connectivity is essential positive for development but significantly
that can run standalone. customized products. It has the potential to radically to the virtual plant concept. Wired connectivity, increases their complexity. Connecting robots and
reduce inventories throughout the supply chain. with its complex cabling, would not be feasible in placing this complexity (intelligence) in a cloud
Key automation trends Finally, it is important to highlight the “zero- this type of ever-changing environment due to the will make it possible for affordable, minimal-
Making good products is important for the defect” concept. In some cases, relevant percentages fact that cable upgrading entails high operational infrastructure smart robot systems with unlimited
success of a manufacturer, but it is not enough to of production can end up as scrap because of expenditure. The wireless connectivity must computing capacity to evolve. As partners in the
be profitable and to sustain business. Production manufacturing defects. A “zero-defect” process connect all physical elements of a production plant “5G for Italy” program, Ericsson, the Sant’Anna
costs must be low enough for a suitable margin. requires automatic monitoring of the entire with machine (computing) elements that are able School of Advanced Studies, Comau and
This can be achieved by increasingly improving manufacturing process, from the quality of raw to collect and process huge amounts of data and/or Zucchetti Centro Sistemi have been carrying out
the efficiency of a manufacturing system. materials entering the production line to variances with a cloud that is responsible for those operations. research together in these areas for the past three
Automation is vital for that. Manufacturing in tools and processes during each production Communications among all these elements must years.
systems require heavy investments and must be run. As a closed-loop system, controllers are work in a challenging environment characterized by The current industrial control systems
designed so that they remain profitable for the immediately alerted to any defects, and changes electromagnetic interferences, and distributed over architecture has provided a stable, secure, and
long term. If manufacturers are to remain can be made immediately to eliminate the source a large area that could span several buildings. While robust platform for the past 25 years. But these
competitive in an ever-changing marketplace, of the problem. The approach has the potential to LTE connectivity is robust and capable enough to legacy systems are reaching end of life in many
they must continuously improve both products dramatically reduce scrap by detecting production cope with that environment today, stringent latency industrial applications such as robotized cells, and
and the production systems. Virtual errors instantly, eliminating the propagation of requirements will soon demand 5G connectivity. ongoing maintenance, and updates are becoming
commissioning is therefore necessary to defects along the process stages. The manufacturing Once a huge amount of data has been collected complicated and expensive. In addition, legacy
continuously upgrade a production system with system could include knowledge-based loops, through the wireless connectivity, it is necessary to equipment was not built to ensure effective data
reasonable incremental investments. This providing information and feedback to other levels use new methods to handle, process and transform access within these systems, which severely limits
requires a virtual (computer-based) environment of the manufacturing chain, to minimize failures via it into a format that can be used by humans or their potential for remote monitoring and control.
that can simulate a manufacturing plant. continuous optimization of the production process machines or both, and to tap into the potential of High-speed communication networks, wireless
44 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 45
✱ FEATURE ARTICLE FEATURE ARTICLE ✱
We used an indoor LTE network installation to control features, avoiding the need for new PLC
connect the elements of the working cell with the hardware when new actuators are deployed, and
cloud server, which was possible because the LTE permitting the deployment of a different level of
connectivity ensures a few tens of milliseconds of control functions on the same platform: factory, cell,
round trip latency. As shown in Figure 4, the next actuator level. Cooperative device control is also
step will be to move the control functionalities that possible.
reside in each robot controller – the task planner,
trajectory planner and inverse kinematics – to the Cooperation between humans and robots
cloud as well. That step, requiring a latency of the One of the most interesting aspects of the fourth
order of 5ms, requires 5G technology. The last step industrial revolution is the emergence of human-
would be to move the control loop of the robot into robot cooperation. The present and future
the cloud as well. challenge is to develop robots that can support
This PoC represents a key element of the factory human workers in a meaningful way to perform
of the future, allowing easier implementation of new manipulation and assembly tasks according to a
46 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 47
✱ FEATURE ARTICLE FEATURE ARTICLE ✱
48 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 49
✱ FEATURE ARTICLE FEATURE ARTICLE ✱
the authors
◆ joined Ericsson in 1988 organizations and in product of the Italian National
after having graduated in management and solution Bioengineering Group since
Electronics Engineering at management. 2016 and became a member
the University of Rome “La of the Agency for Digital
Sapienza” the year before. Italy’s task force on Artificial
He is manager of the Italian Intelligence in 2017.
branch of Ericsson Research
and leader of the Innovation Massimo Ippolito
with Industries in Tuscany ◆ contributed to this article
initiative related to the 5G for in his role as innovation
Italy program in cooperation manager at Comau, a
with TIM. His expertise multinational company
covers several areas of specializing in industrial
telecom networks, such as He holds an M.Sc. in automation, where he has
electrical engineering from worked since 2012. He
the RWTH Aachen University holds a Ph.D. in industrial
in Germany. production engineering from
Parma University and an
Maria Chiara M.Sc. in computer science
Carrozza from the University of Milan.
◆ contributed to this article He has extensive experience
in her role as coordinator
of the neuro-robotics area
in the BioRobotics Institute
packet-optical transport at the Sant’Anna School of
networks, transport Advanced Studies in Pisa,
solutions for mobile Italy. She is also a partner in
backhaul and fronthaul, and IUVO, a startup in wearable
photonics technologies for robotics that was founded
radio and data centers. He in 2015 as a spinoff from
has authored more than the institute. She served as
150 papers for international rector of Sant’Anna from in methodologies and tools
journals, magazines and for product and production
conferences, as well as system design. Since
The authors wish
two books on optical 2000, he has been involved
to acknowledge
communications, and holds in various international
Marzio Puleri and
more than 30 patents. research projects in
Giulio Bottari
the product design and
at Ericsson
Research and
Andreas Thuelig manufacturing area, ranging
◆ joined Ericsson in 1991. from methodologies
Guido Rumiano
He is currently responsible for product design for
and Pietro
Cultrona at for the 5G for Europe manufacturing to process
Comau for program, which focuses 2007 to 2013, when she design for energy efficiency.
their valuable on the relevance of 5G for was elected to the Italian From 2007 to 2012, he was
contributions to industries and Industry 4.0. national parliament and was responsible for a Fiat Group
this article. During his time at Ericsson, appointed to the Foreign and innovation research program
he has held leading positions European Affairs Committee. on manufacturing purpose.
50 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 51
✱ INTELLIGENT TRANSPORT IN 5G INTELLIGENT TRANSPORT IN 5G ✱
ENABLING intelligent
transport IN 5G
NETWORKS At a high level, it is clear that network operators
need to continuously look into new revenue
ENHANCED AUTOMATION
streams, faster deployment of required CAPABILITIES IN THE OPERA
transport connectivity and new consumer TIONS AND MANAGEMENT
STEFAN DAHLFORT, The evolution toward 5G mobile networks is driven by the diverse services to lower total cost of ownership
DOMAIN REPRESENT A KEY
(TCO). Together with RAN and mobile core
ANTONIO DE
GREGORIO, GIOVANNI
requirements of a multitude of new use cases in the areas of enhanced networks, transport networks need to evolve REQUIREMENT
FIASCHI, SHAHRYAR mobile broadband (eMBB), ultra-reliable low-latency communication (URLLC) to provide the desired level of flexibility in
KHAN, JONAS ROSEN service offerings, simple and agile service
BERG, TOMAS THYNI and massive machine-type communications. Along with a demand for lower configurations, and support for new operations and packet processing parts in Figure 1), where the
latency and synchronization requirements are very
costs, these drivers have led to the development of split architectures for the models and cross-domain orchestration that
challenging. Enhanced automation capabilities in
are expected in 5G.
RAN to support multiple deployment models. Since the transport network’s the operations and management domain represent a
■ New revenue streams are always difficult to key requirement to meet these challenges.
role is to connect all the pieces of the RAN and the mobile core network, predict, but greater automation can reduce opex,
optimal performance in 5G scenarios will require high levels of intelligence, particularly if it enables more intelligent interaction Transport network solution for 5G:
between the RAN, the transport network and the architectures and protocols
flexibility and automation in the transport network. mobile core. Network slices that are supported in 5G RAN’s deployment flexibility and service
a well-coordinated way across RAN, mobile core requirements demand much greater control and
and transport networks will be able to provide knowledge of the transport network resources and
improved life cycle management of services on an characteristics compared to previous generations.
Terms and abbreviations end-to-end basis [1]. This is particularly relevant for The increasingly flexible and dynamic behavior in
BBU – baseband unit | BPF – baseband processing functions | BSC – base station controller | CO – central office | 5G, but valuable for 3G and 4G networks as well. Elastic and virtualized RAN also requires the ability
CPRI – Common Public Radio Interface | CU – centralized unit | DU – distributed unit | DWDM – dense wavelength The latest demands on the transport network to dynamically add or remove transport connectivity.
division multiplexing | eCPRI – evolved CPRI | eMBB – enhanced mobile broadband | ERAN – Elastic RAN | come from areas such as increasing RAN and mobile This is important in the mobile-centric access
GW – gateway | Obs – observability | O&M – operations and maintenance | ONAP – Open Network Automation broadband service capacity, new 5G-enabled aggregation part of the network to maintain and
Platform | PE – provider edge (router) | QoE – quality of experience | RBS – radio base station | RESTCONF – services (such as those in the use cases presented improve RAN performance. It is also important for
Representational State Transfer Configuration | RF – radio functions | RNC – radio network controller | RRU – remote below), and the dynamic deployment flexibility user services, where the positioning of the mobile core
radio unit | RRU-BF – remote radio unit beam forming | RU – radio unit | SBH – self backhauling | SDN – software-defined of the 5G RAN split architecture, with its tight becomes critical, or when a new service is launched
networking | SDNc – SDN controller | SLA – Service Level Agreement | SW – switch | SW/R – switch/router | transport characteristics. These characteristics using mobile core resources at a different site.
TCO – total cost of ownership | TIF – transport intelligent function | URLLC – ultra-reliable low-latency communication | are especially manifested in the fronthaul portion The need for flexibility and the above
µW – microwave | VPN – Virtual Private Network | VRAN – virtualized RAN of RAN transport (in other words, from the DU to requirements will be a major opex driver in the
other DUs and to the centralized unit (CU) control transport network unless it is fully automated.
52 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 53
✱ INTELLIGENT TRANSPORT IN 5G INTELLIGENT TRANSPORT IN 5G ✱
Switch/
Switch/
Router
router
means of a network operations person inserting unique building blocks from the RAN and transport
router
router
Switch/ regional RNC
CU
aggregation backbone
router aggregation
commands or using graphical user interfaces. interaction perspective [3]. Defining a transport Switch/
Router
5G-SBH Router
While this has been doable (though not always so automation framework is an important step. DU
router
CU
S1
DWDM Mobile
efficient) in earlier generations, the increased ability An automation application framework provides the BBU Switch/ ERAN
VRAN
Switch/
Router
core
router router Router
to configure and optimize in 5G will make manual required flexibility of connectivity in the various RAN DU
operations inviable going forward. The use cases deployment scenarios. This framework defines the eCPRI
below further illustrate this point. platform for lightweight applications to be developed RRU-BF Switch/ DU
router ERAN ERAN
Our optimal 5G transport network is built as on top. The following key components are used: Switch/
router VRAN Overlay VRAN DU/ Mobile
a self-contained infrastructure underlay with an DU S1 S1 CU core
SDN-controlled overlay for a variety of RAN and 〉〉 cross-domain communication for real-time notifications/
Underlay
user services. The distributed control plane in the events and service request Switch/
router
Switch/
router
underlay maintains the basic infrastructure and 〉〉 network and service observability function
handles redundancy and quick restoration in case 〉〉 performance-aware topology manager
of network failures. The service and characteristics- 〉〉 path computation and optimization function
aware overlay is handled by the SDN controller with 〉〉 network and service logic
the TIF application, and this creates a dynamically 〉〉 interfaces to control layer (SDN controller, for example) Figure 1 Transport network architecture. The color coding indicates the four different domains: RAN, Transport, Mobile core, Control and observability,
and Management and orchestration. TIF represents a cross-domain function between RAN and Transport (the latter via the Transport control and
controlled and orchestrated transport network that and to management and orchestration system
observability).
requires minimum manual interaction. In other 〉〉 interface to network observability aggregator function
words, the underlay network described here handles
the infrastructure connectivity and the network It should be noted that some of these components
overlay handles the services running on top of the are not exclusively used by the TIF. While the
underlay. architectural details are outside the scope of this
The automation focus of the overlay relates to the article, it is worth mentioning that the automation
establishment of initial and dynamic connectivity framework outlined here has been designed with
and is based on requests from the TIF, which the Open Network Automation Platform (ONAP)
is a RAN-aware application [2]. It is also the in mind.
responsibility of the TIF application to collect and
ensure appropriate transport characteristics for Transport intelligent function
different RAN connections as well as user services. While the control layer provides an abstract view of the
transport network and enables its programmability, the
Automation application framework intelligence to decide how to optimize/reconfigure the
Network automation in the context of transport is network is provided by the TIF. The TIF utilizes the
a broad area that includes concepts like zero-touch network programmability features offered by the
54 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 55
✱ INTELLIGENT TRANSPORT IN 5G INTELLIGENT TRANSPORT IN 5G ✱
56 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 57
✱ INTELLIGENT TRANSPORT IN 5G INTELLIGENT TRANSPORT IN 5G ✱
Core
(2), the TIF acquires the RAN topology directly from can be used to provide much more advanced service GW
GW
the RAN. It then integrates it with the transport level guarantees. For example, congestion in a
topology to build the entire network topology certain part of the transport network would result
Access Metro National
RF SW
view. During RAN connection setup request (3), in detection of all impacted overlay services. This eMBB
URLLC
RAN sends connectivity requests to the TIF when could then trigger optimization of various transport GW
DU
GW
GW
needed, including endpoint information along with resources to protect SLAs for the impacted overlay CU Core
GW
GW
Core
constraints such as maximum allowed latency and services. The process of detecting SLA violation and GW GW
expected bandwidth usage. doing a correlation and an impact analysis makes GW GW
58 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 59
✱ INTELLIGENT TRANSPORT IN 5G INTELLIGENT TRANSPORT IN 5G ✱
services. The TIF plays an important role in providing to the level of visibility and inherent inter-domain then he has been responsible software for cross-domain
the authors
the capability to track the SLAs of all the overlay communication capabilities. for the strategy and automation and assurance
services. Furthermore, with the TIF in place, run time technology units of different solutions in mobile networks.
impact analysis of changes in the underlay network Conclusion product development He works as a leader
characteristics like bandwidth, latency or packet loss The transport network tends to get less attention organizations in Europe for the mobile transport
is carried out in conjunction with the overlay SLA than RAN and mobile core networks in discussions and in Silicon Valley in the technology area and is
requirements, and the necessary corrective action is about 5G, but as the vital link between all the US. He currently heads the responsible for Transport
taken. One such example of corrective action might pieces, it too requires significant enhancement to Technical Management O&M within Development
be dynamically moving the flows of an overlay service support the diverse set of services and deployment organization in Genoa, Italy Unit Networks. Rosenberg
to an alternate path computed with minimal or no models expected in 5G. Intelligent, automated Stefan Dahlfort within Development Unit Shahryar Khan joined Ericsson in 2000 and
impact on the other overlay services. coordination between RAN, transport and mobile ◆ has worked in the tele Network Management. He ◆ has nearly two decades of holds an M.Sc. in electrical
Global orchestration and optimization of all core networks will undoubtedly be a key part of a com industry for 22 years. holds an M.Sc. in electronic experience in architecture engineering from KTH Royal
network level resources is another important robust 5G solution, because without automation it He founded a start-up engineering from the design and integration Institute of Technology in
consideration in the auto-optimization process. We will not be possible to achieve the required levels before joining Ericsson in University of Salerno, Italy. for multiservice IP and Stockholm, Sweden.
are currently studying this aspect, as we believe it of flexibility and observability. The TIF solution 2007 as a manager for fiber transport networks for
will take network automation to a whole new level. provides the requisite intelligence and acts as a to the x research. Having telecom operators and
Domain-specific intelligent functions such as TIF catalyst for automation, enabling operators to meet held different management large enterprises. Khan held
for transport are set to play a critical role in the the 5G requirements of multiple use cases while positions in Research and several roles within Ericsson
global and/or cross-domain optimization owing simultaneously reducing opex. Systems & Technology in during the period 2005-2017,
the transport area, he is most recently serving as an
now based in Santa Clara in expert and chief architect in
References Silicon Valley as a product multiservice IP and transport
development leader. He networks in Development
1. Ericsson Technology Review, February 2016, A vision of the 5G core: flexibility for new business holds an M.Sc.in electrical Unit Networks in Kista,
opportunities, available at: https://www.ericsson.com/en/ericsson-technology-review/archive/2016/a-vision-of- engineering and a Ph.D. in Sweden. He holds a B.Sc.
the-5g-core-flexibility-for-new-business-opportunities optical networking from KTH Giovanni Fiaschi in electrical engineering Tomas Thyni
Royal Institute of Technology ◆ joined the company from the University of ◆ is an expert in the area of
2. Ericsson Review, July 2015, Radio access and transport network interaction – a concept for improving in Stockholm, Sweden. in 2005 when Marconi, Engineering and Technology IP and transport networks.
QoE and resource utilization, available at: https://www.ericsson.com/en/news/2015/7/radio-access-and- his employer since 1990, in Lahore, Pakistan. A telecommunication
transport-network-interaction--a-concept-for-improving-qoe-and-resource-utilization was acquired by Ericsson. and network engineer, he
He has been working in joined Ericsson in 2000
3. Ericsson Technology Review, December 2016, Fixed wireless access on a massive scale with 5G, available at: telecommunications for more and has worked within the
https://www.ericsson.com/en/ericsson-technology-review/archive/2016/fixed-wireless-access-on-a-massive- than 25 years, specializing IP, broadband and optical
scale-with-5g mostly in control functions networks areas. Today, Thyni
for transport networks. works as a chief architect on
4. Ericsson Technology Review, July 2016, 4G/5G RAN architecture: how a split can make the difference, Fiaschi currently works at new concepts for transport
available at: https://www.ericsson.com/en/ericsson-technology-review/archive/2016/4g5g-ran-architecture- Development Unit Networks, in RAN at Development Unit
how-a-split-can-make-the-difference Systems and Technology, Networks; one such concept
Antonio De Gregorio focusing on mobile transport area is RAN and transport
◆ has 23 years of experience network simulations and Jonas Rosenberg interaction. Prior to joining
in the telecom industry. control solutions. He is also ◆ is a senior specialist Ericsson, he accumulated
Further reading
He joined Ericsson in active in the IPR and security in network architecture 15 years of experience as an
〉〉 https://www.ericsson.com/en/networks/trending/hot-topics 1997, initially working areas. He holds an M.Sc. in and solutions whose IP and transport network
〉〉 https://www.ericsson.com/en/networks/offerings/network-intelligence-and-automation in the Operations and computer science from the main area of expertise is designer with various
Maintenance area. Since University of Pisa, Italy. within technologies and network operators.
60 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 61
✱ IoT SECURITY MANAGEMENT IoT SECURITY MANAGEMENT ✱
END-TO-END
Security
Threat
intelligence
Management
management
Domain security and Domain security and Domain security and Domain security and
identity management M identity management M identity management M identity management M
for devices and GWs for access and network for apps and cloud for users
Access Apps
SW
and cloud
SW
Legend:
Industries everywhere are digitizing, which is creating a multitude of new Security and identity Security and identity
M management functions Trust anchoring
security requirements for the Internet of Things (IoT). End-to-end (E2E)
security management will be essential to ensuring security and privacy
in the IoT, while simultaneously building strong identities and maintaining trust. Figure 1 E2E approach to security and identity
As the diversity of IoT services and the number and identity that highlights three key aspects: the IoT service provider, and the devices that of it. A fully trusted application does not help if
KEIJ O M O N O N EN ,
of connected devices continue to increase, security and identity management, security and enable the provision of the IoT service. The the communication cannot be trusted. An E2E
PATRIK TEPPO,
the threats to IoT systems are changing and identity functions, and trust anchoring. supporting actors are the IoT platform service approach is therefore essential to ensure trust
TIM O SUIH KO
provider, whose role is to provide the IoT platform among all actors across the system.
growing even faster. IoT actors and trust for the IoT service provider, and the connectivity
■ To cope with these threats, the ICT industry IoT systems support new business models service provider, whose role is to provide E2E IoT security architecture
needs a comprehensive IoT security and identity that involve new actors in conjunction with connectivity for the IoT devices and service. The purpose of an E2E IoT security architecture
management solution that is able to manage and traditional telecommunication services. Aside The trustworthiness of services and service is to ensure the security and privacy of IoT services,
orchestrate the IoT components horizontally (from from consumers and mobile network operators, use depends on how the actors govern identities protect the IoT system itself and prevent IoT
device to service and service user) and vertically enterprises, verticals, partnerships, infrastructure, and data, security and privacy, and the degree to devices from becoming a source of attacks – a
(from hardware to application). In addition to this, and services play increasingly vital roles. All of which they comply with the agreed policies and Distributed Denial of Service (DDoS) attack, for
the ability to address both security and identity these actors affect trust. regulations. The combination of the security and example – against other systems.
from the IoT device all the way across the complete Figure 2 presents the main and supporting IoT identity functions is important for defining the Figure 3 illustrates Ericsson’s view of how
service life cycle will also be essential. actors and their trust relationships. The three main trust level. For example, hardware-based trust security can be managed and deployed in an
Figure 1 illustrates an E2E approach to security actors in an IoT solution are the IoT service user, does not help if the application does not make use E2E manner throughout IoT domains to monitor
62 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 63
✱ IoT SECURITY MANAGEMENT IoT SECURITY MANAGEMENT ✱
64 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 65
✱ IoT SECURITY MANAGEMENT IoT SECURITY MANAGEMENT ✱
The level of trust in the device identity depends on the with and adapt to external identity and access
strength of authentication both at the connectivity management systems. On top of identification
(for example, 3GPP, Wi-Fi and fixed) and application and authentication, there must also be access
M E2E security and identity management layers. For device identity to be trusted, strong control for users so that only the permitted
authentication and follow-up of the device integrity services are authorized.
Threat
Access and IoT app, – with the help of hardware-based root of trust in the
intelligence
M IoT device M IoT gateway M network M platform M IoT user device, for example – would be needed. Threat intelligence
connectivity and cloud
A device will have different identifiers depending Threat intelligence is built and shared in
on where it is in its life cycle. Life cycle management communities. Therefore, a centralized threat
of device identities is part of the security manage intelligence solution must be able to interface
IoT device IoT app, platform
and cloud
IoT service user ment layer. More than one security management with different threat intelligence sources to learn
domain is involved when provisioning identities. about existing and new threats. Consolidation and
Connectivity and IoT service provider could be correlation of security audit feeds from different
Application Application Application
different players where each player takes care of its domains are necessary to provide a clear view of
IoT gateway Access and own identity life cycle management. threat insights across all IoT domains.
network
When a device is manufactured, the vendor will Automation and machine learning can be
Connectivity Connectivity Connectivity Connectivity give it an identifier that could have different trust used to great advantage in threat intelligence,
levels. Vendor credentials could be protected in to create and share indicators of compromise
hardware (preferred) or they could be nothing more that are actionable, timely, accurate and relevant
than a serial number printed on the device. The device to support strategic decision-making and to
Device Gateway Network Cloud
platform platform infrastructure infrastructure has to be authenticated by the IoT system, and newly understand business risks in detail. Targeted
given identifiers and credentials (bootstrap process) threat intelligence feeds are a great way to
will be used for connectivity and application accesses. generate customer-specific threat intelligence.
Legend:
Identifiers and credentials can be changed
Security and identity Security and identity
M management functions Trust anchoring during the device life cycle depending on different Two IoT use cases
triggers such as expiration of credentials, change of Two concrete examples of how an E2E security
service provider and so on. Connectivity identities management solution can help address IoT
Figure 3 E2E approach to security and identity are dependent on the connectivity type and have challenges are provided below.
different life cycle management processes. For
example, 3GPP access is based on SIM identities DDoS detection and prevention
(IMSI and AKA credentials). SIMs are either In October 2016, the Mirai botnet exploited a
and accurate information for evaluating potential Identity management physically removable ones or SIMs (i.e. eUICC) vulnerability in IoT devices to launch a DDoS
risks and helps to direct efforts in protecting the The main purpose of identity management is to that can be remotely provisioned [1]. attack against a critical DNS server that disrupted a
most exposed critical assets. A high degree of manage the life cycle of identities and provide The user identities are needed to identify the number of the internet’s biggest websites, including
automation is necessary to ensure a swift response identification, authentication and access control users of the services within the applications and PayPal, Spotify and Twitter.
to any identified threats and anomalies. services for identities. There are various identities that cloud domain. There may be several different Mirai was designed to exploit the security
Since not all security breaches and attacks serve different purposes in the IoT approach, but the ways to verify (authenticate) the user identities weaknesses of many IoT devices. It continuously
can be prevented, it is crucial to have an efficient main ones are for device and user identification. The such as single- or multi-factor authentication, scans for IoT devices that are accessible over the
security incident management process that others are used for management of devices, functions federated authentication, or authentication internet and are protected by factory default or
ensures rapid response and recovery. Real-time and services. Identifiers and keys are also used to tokens. Each of these provides a certain level hardcoded user names and passwords. When it finds
insights and audit trails from tools such as security sign data, including software and firmware. These of authentication strength. them, Mirai infects the devices with malware that
monitoring, analytics and log management help different device identities are needed to identify the Due to layered security management architecture forces them to report to a central control server, turning
to find the root cause of an incident. The same devices for connectivity within the access and network and the involvement of several actors (including them into bots that can be used in DDoS attacks.
information can be also used as the evidence in domains, and to identify device applications in the IoT industries) in the IoT, any identity and access Strong detection and prevention mechanisms
digital forensic investigations. platform and cloud domain. management solution must be able to cooperate are needed against DDoS attacks that attempt
66 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 67
✱ IoT SECURITY MANAGEMENT IoT SECURITY MANAGEMENT ✱
to saturate the network by exhausting the band and fair data processing practices. When actual Keijo Mononen science and engineering B.Sc. in software engineering
the authors
width capacity of the attacked site, the server personal data might be exposed, additional privacy ◆ is general manager from Chalmers University of from Blekinge Institute of
resources or service availability. In our view, an protective measures will be applied such as data of Security Solutions at Technology in Gothenburg, Technology, Sweden.
optimal outbound DDoS (botnet) detection and encryption and data anonymization. Ericsson. In this role he is Sweden.
mitigation solution includes remote attestation Another focus area in the IoT security domain responsible for end-to- Timo Suihko
to verify device trustworthiness and detect is the privacy breach response. Dedicated privacy endsecurity management ◆ joined Ericsson in 1992
malware, monitoring of outbound traffic, anomaly logging and audit trail functionality can be used to solutions including security and is currently working as a
detection, infected entities isolation or blocking improve the ability to prevent, detect and respond automation and analytics. senior security specialist in the
and setting of traffic limit policies. Optimal to privacy breaches in a more prompt and flexible Mononen joined Ericsson in Ericsson Network Security,
inbound DDoS detection and mitigation includes way. Such capabilities will be essential to respond 1990 and for the past 15 years Security Technologies team,
monitoring of inbound traffic, anomaly detection, to privacy breaches swiftly (within 72 hours, as he has held leading positions which belongs to Group
setting of traffic limit policies and redirecting prescribed by the GDPR). in professional security
malicious traffic to a botnet sinkhole. Implementing a GDPR compliance tool in the services and in security
The security management layer plays a critical security management layer makes it easier to meet
role in detecting and mitigating DDoS attacks. GDPR requirements. To do its job right, it must Patrik Teppo
In our framework, DDoS attacks are detected by be able to provide identification and classification ◆ joined Ericsson in 1995
the security monitoring and analytics functions of personal data, enforcement of data privacy and is currently working
through the observation of device and network policies according to the GDPR, demonstration of as a security architect
behavior and identification of anomalies. Once an compliance to the GDPR, and detection, response with the CTO Office,
anomaly is detected, immediate mitigation actions and recovery from privacy incidents. Architecture and Portfolio
can be triggered. team. He is responsible
Conclusion for the security part of the Function Technology and
GDPR compliance The IoT offers a wealth of new opportunities for Ericsson architecture and Emerging Business. He
There is a legitimate expectation in society that IoT service providers. Those who want to capitalize on technology development. leads Ericsson’s IoT security holds an M.Sc. from Helsinki
solutions will be designed with privacy in mind. This them without taking undue risks need a security He holds an M.Sc. in computer architecture work. He holds a University of Technology.
is becoming especially evident in certain jurisdictions: solution that provides continuous monitoring of
for example, in the European Union with the new threats, vulnerabilities, risks and compliance, along
General Data Protection Regulation (GDPR) [2]. with automated remediation. Ericsson’s E2E IoT References
Data integrity, data confidentiality, accountability security and identity management architecture
1. GSMA Remote SIM Provisioning Specifications, available at: https://www.gsma.com/rsp/
and privacy by design are all fundamental to the is designed with this in mind, managing and
protection of sensitive personal data. Such data orchestrating the IoT domains both horizontally 2. Official Journal of the European Union, May 2016, Regulation (EU) 2016/679, General Data
can be protected via appropriate privacy controls. and vertically, and addressing both security and Protection Regulation (GDPR), available at: http://eur-lex.europa.eu/legal-content/EN/TXT/
These controls include personal data identification identity from the IoT device throughout the service PDF/?uri=CELEX:32016R0679&qid=1490179745294&from=en
and classification, personal data management life cycle.
Further reading
〉〉 Ericsson white paper, February 2017, IoT Security – Protecting the Networked Society, available at:
https://www.ericsson.com/en/publications/white-papers/iot-security-protecting-the-networked-society
Terms and abbreviations
〉〉 Ericsson, Security Management, available at: https://www.ericsson.com/en/in-focus/security
AKA – Authentication and Key Agreement | CIS – Center for Internet Security | CSA – Cloud Security Alliance |
/security-management
DDoS – Distributed Denial of Service | DNS – Domain Name System | E2E – end-to-end | eUICC – embedded Universal
〉〉 Ericsson, Identity Management, available at: https://www.ericsson.com/en/in-focus/security/identity-management
Integrated Circuit Card | GDPR – General Data Protection Regulation | GW – gateway | IMSI – International Mobile
〉〉 ETSI GS NFV-SEC 013, V3.1.1, February 2017, Network Functions Virtualisation (NFV) Release 3;
Subscriber Identity | IoT – Internet of Things | ISO – International Organization for Standardization | NIST – National
Security; Security Management and Monitoring specification, available at: http://www.etsi.org/deliver
Institute of Standards and Technology | SIM – Subscriber Identity Module | SW – software
/etsi_gs/NFV-SEC/001_099/013/03.01.01_60/gs_NFV-SEC013v030101p.pdf
68 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 69
✱ XXXXXXXXXXX XXXXXXXXXX ✱
70 ERICSSON TECH NOLOGY REVIEW ✱ #01 2018 #01 2018 ✱ ERICSSON TECHNOLOGY REVIEW 71
ISSN 0014-0171
284 23-3321 | Uen
© Ericsson AB 2018
Ericsson
SE-164 83 Stockholm, Sweden
Phone: +46 10 719 0000