Keywords

1 Introduction

The heterogeneous requirements of Internet users have posed a challenge to the network service providers in meeting the quality of service parameters (QoS) [1]. The different use cases like video streaming, online gaming, remote surgery, and augmented and virtual reality have different resource and network and requirements. The popularity of Internet access through wireless infrastructures makes network operators build on the Radio Access Network (RAN). Compared to 4G, 5G provides extremely low-latency capability and twenty times faster peak speed. The autonomous driving requires reliable and low-latency communications. The remote robotic surgery in medical field requires machine-to-machine (M2M) communication. The immersive online gaming requires high mobile broadband for data transfer between the applications. These diverse applications make the available infrastructure insufficient.

Thus Network Slicing comes to an aid to optimally utilize the infrastructure. RAN allows to connect various user equipment (UE) to the core network. The network contains forwarding nodes, base stations, and radio network controllers which take signal input from UE, process it and sends to the core network. RAN’s key benefits are its UE-centric, beamforming MM-Waves, small cells, multipoint, and coordinated transmission [2]. MM-Waves have a band spectrum with the wavelength in the range 30 GHz to 300 GHz. The small cells coverage in a range 10 m to few kms, and operate in licensed or unlicensed spectrum with low power radio nodes [3]. The benefits of RAN are its agility, flexibility, cost reduction, and real-time responsiveness. RAN slicing enables forming of multiple logical networks that satisfy various user requirements over the common physical infrastructure [2].

RAN slicing is a solution for the growing network traffic needs and enables a reduction in cost, and improves capacity that minimizes operational expenditure (OPEX) [4]. It provides isolation between network slices and optimizes resource utilization. RAN slicing helps create network slices that enables mobile network operators (MNO) to ensure bandwidth guarantee to the enterprise networks [5]. The radio resources are managed by the RAN, composed of radio, and processing units. The radio unit aids in data transmission or reception in the presence of a transceiver antenna. The processing unit performs precoding, resource-sharing encryption, and radio management.

A major transformation is observed in the telecommunication sector with the evolving 5G networks [6] in data rate. Trillions of sensors and network devices connect intelligently to the core network based on the compute and delay sensitivity needs in 5G networks.

2 Related Work

In [7] the method used for ran slicing is toward operator-to-waveform 5G RAN slicing. It is used to control a maximum number of users and MNO’s selection of base station the architecture used for this operator-to-waveform method is three tiers ran slicing framework. The author’s main objective in using this method is to improve signal interference and noise ratio (SINR) by up to 120% compared to other approaches and to provide waveform-level scheduling of resource blocks to a maximum number of users. The simulation results show that RAN slicing leads to 95% of available Base Stations performing 5G transmission technologies which allows for fulfilling the required objective.

RAN should be able to support the following efficient traffic management mechanism, minimizing of inter-slice effects, efficient management of infrastructure, and maximizing the utilization of RAN resources [8]. The radio resources can be shared in two types, dedicated and dynamic manner. The above requirements will impact protocol architecture, the design of Network Functions (NFs), and network management. To achieve the protocol architecture, selection of NFs per slice, slice awareness for QoS framework [9], and slice-tailored NFs optimization must be supported by RAN architecture. The radio NFs are impacted due to inefficient use of radio and transport network resources and inadequate sharing of RAN resources among different slices [10]. Radio NFs of one slice is dependent on another slice. The network management is impacted due to performance monitoring and sharing of HW/SW platforms. To achieve maximum efficiency, one slice should be able to utilize the full bandwidth if the other slices are traffic free [11].

Evaluation of virtualized RAN (vRAN) experimentally using passive optical network (PON) in Fronthaul, which reduces network costs. 5G has enabled Internet connectivity and connection of multiple devices through IoT. C-RAN which is a centralized cloud computing-based architecture [12] for RAN which allows supports to 2G, 3G, and 4G, and in the present generation, it will support 5G wireless communications. Some of the available 5G Core(5GC) Network slicing approaches are: (1) Static slicing approach—Network slicing gives dimension to physical networks, which can be used as few physical resources whenever new user requests for resources, thus its will query network providers for requirements [13]. Thus physical resources can be checked, which is equal to the process of solving virtual network mapping problems. (2) Dynamic slicing approach—Network slicing is performed dynamically based on user requirements [3]. The user requirements could vary regarding bandwidth or network functions such as load balancing and firewall services. The benefit compared to static slicing is the resources are allocated on demand by the user at that instance of time. RAN achieves huge flexibility and scalability through a model architecture by using SDN and NFV, which can create multiple slices for different service types such as eMBB, uRLLC, and Mmtc [14,15,16]. Evaluation of bandwidth usage in midhaul, the effect of its delay, latency, and isolation across slices, concludes that slices have specific benefits [14] for all types of services, which can create services in common infrastructure with variations [4].

Network slicing uses a slice configuration algorithm to balance the load of all slices in 5G and 5G RAN [11, 17]. The present scenario of network slicing imposes restrictions on resource optimization techniques in RAN, which can heavily load the slices affecting the QoS of telecasting services [18]. The weights of nodes present in the topology are poorer than the nodes with uniform structure but have a good rate of performance which indicates that the system can increase its resource utilization rate [3]. The goal of 5G RAN network slicing is to reduce the dimension of the network such that it can be allocated within a few physical networks.

The authors in [19, 20] present dynamic network slicing using Software Defined Network (SDN). The customized network service is provided using the Ryu Controller with an example of an electronic Fence application. The network slices are formed dynamically based on the type of application. The network slices are created and adapted according to the service requirement of the user. The resource configuration is adjusted dynamically as the user demand change. The virtual network resources are formed dynamically by applying the network slicing algorithm at the controller using the underlying physical infrastructure. The anomaly detection application is taken to demonstrate network slicing where high bandwidth is allocated when an abnormal event is detected.

In [21], authors proposed a radio resource partitioning algorithm for satisfying the pre-service requirements. The three requirements taken for slicing are resource type, abstraction, and structure. The resource type is taken in the form of the data rate requirement of the user. In resource abstraction, the mapping of the requested resource to the underlying physical infrastructure is performed. The differentiation is provided during resource allocation based on whether it is a downlink or uplink service. The five different prioritization of slices is performed, namely optimal, random, greedy, granularity, and combined granularity-greedy algorithms.

In [10], it discusses the challenges faced by mobile operators in 5G networks. The challenge is defining a slice that contains both the user information and individual service needs. Spectrum sharing, tiling, puncturing, and slice mapping are the concepts used for scheduling network resources. Based on the service latency requirements, the differentiation is provided by the slice manager. The challenges in network resource slicing are, achieving fair allocation of resources, prioritization, and resource reservation. Over-provisioning needs to be eliminated in case of resource reservation to satisfy the user Service Level Agreements (SLAs).

3 Required Tools and Software

These are few necessary requirements that needs to be considered for the tool to function. These requirements are as:

Monitoring of Services—slicing of network needs to be monitored by the tool and should look after the security aspects [21] of slicing the networks which is a unique task of monitoring each of the independent slices. Service Representation—Services offered to applications are to be maintained and managed by the service providers provided by the tool. Network Modeling—Deployment of all issues such as fronthaul, midhaul, backhaul on the common infrastructure, and virtual network is provided by network modeling. Adaptability and Reusability—Services must be reusable and clearly understood by the new users for making the system more efficient. Service Reconfigurability—Implementation of services on a virtual network should have the ability to modify the resources for system modules. Computation Modeling—The system requires the processing of applications near the data source and destination. Should also allow representation of virtual network function and virtualized computational resources like RAN. Slicing Abstraction—The emulation of virtual resources needs to be isolated and abstracted to deploy multiple services over a common infrastructure [2] without a slice knowing the resources that are allocated the other slices.

Few tools like EdgeCloudSim, Netsim3, VLSP, Fogbed, and Mininet lack in providing all the requirements simultaneously which fails the system to function accurately leading to the failure of emulating the networks. Keeping in mind about all these restrictions, all these tools were replaced by open-source software emulation tools eXP-RAN which can perform all the modules and provide the services effectively which helps in increasing the quality level when the failure occurs. The eXP-RAN is one of the open-source available emulators which is comparably more advantageous than its contemporary available tools. Basic requirements that are compulsory to function all services are available in this software emulation tools which primarily concentrate on the functioning of modules of the system present. Xen Hypervisor of the eXP-RAN emulator allows to efficiently help in bringing virtualization.

4 Architecture

The eXP-RAN Emulator has a three-layered architecture, as explained below (Fig. 1):

Fig. 1
An illustration has 3 E X P-R A N layers. The service layer on top has autonomous cars, augmented or virtual reality, automation, and v R A N. The middle layer is the slicing layer. The infrastructure layer at the bottom has an M E C host, base station, F w d node, and links.

EXP-RAN layers

  1. (1)

    Infrastructure Layer: Virtual resources creation and emulation of physical resources [22] are done by this layer. This layer will emulate network components like forwarding nodes, base station nodes, edge computing resources, and links. Forwarding nodes helps in forwarding the traffic. Cell towers or cell sites are represented by the base station nodes. Cell tower needs to perform emulation of signal processing as done by RAN, and these have a very limited computing capacity. Multi-access Edge Computing (MEC) hosts are the processing powerhouse of the RAN since they have a higher computing capacity [23].

  2. (2)

    Slicing Layer: Virtual resources are partitioned and isolated by this layer by slicing the allocated resources [24], thus emulating the slices created upon the common infrastructure. Virtual resources are emulated with the help of containers and links through eXP-RAN. Services of eXP-RAN are done by Virtualized Network Functions (VNFs) present in the containers.

  3. (3)

    Service Layer: The services created inside the network are emulated by this layer which is present as a set of network functions. The service layer performs virtual network functions with specific configurations inside the dockers, which helps them to serve as a whole unit of service.

eXP-RAN emulation tool allows us to use three different approaches to interacting with the user with the system [21]. The first method is the eXP-RAN tool can be used to perform an analysis of optimization model output. The second-way approach of the system is with the help of a Topology Generator which generates random network topologies on its own with RAN, EC, or as modified by the user by modifying the number of nodes, links, services, and the type of each node. This is beneficial for those users who have minimum knowledge of RAN slicing, slice abstraction, and isolation [2]. The third way of approach allows users to create their own infrastructure and services JSON file. It allows the user with freedom of moderation of describing the infrastructure file and service file by updating JSON files following eXP-RAN modules. This method is most advantageous, allowing the user to interact with the system and its services. The benchmarker module ensures predictable performance by modifying the tool according to the user’s hardware. The eXP-RAN emulator comprises of various system modules that are (Fig. 2).

Fig. 2
A workflow process for a system module. It flows as follows. User-defined model, model adapter module, infrastructure and service description files with user and benchmarker, infrastructure and service manager module, and a system monitor module.

EXP-RAN system modules and workflow process

Model Adapter: This module deals with processing the outcome of the optimization model and converting them into description files for working of eXP-RAN.

Topology Generator: It is used to create random RAN network topology. In creating new logical networks, this module takes the help of factors such as a variety of nodes, topology graphs, services, links. And when the network is ready, nodes are classified as per the following ratios forwarding nodes, base stations, MEC host nodes, and in a 65:30:5 ratio [23], respectively. Now the final topology created is given as input into the infrastructure description file, where users can modify by providing their own topologies by mentioning JSON file. This file enables users to modify the contents like number of nodes, links, services, etc.

Infrastructure Manager: This module receives the input of the infrastructure description file from the model adapter module or topology generation module or given by users themselves. Thus, creating the nature of system service that emulates the created infrastructure accordingly. There arises the issue of network traffic between two modules and their routing. Thus, the eXP-RAN emulation tool includes controller, which gives freedom to the users to create multiple ways in the network so that it becomes easy to route the network traffic and create restrictions [19]. This network controller allows the users to use network rules that manage the network traffic on each virtual switch and establish a virtual machine inside the containers present.

Service Manager: This module runs after infrastructure is created by the infrastructure manager module. This module applies the service-specific configuration required by some services to operate properly.

System Monitor: Setting of observation standards in relation to infrastructure description file and service description file are designed by this module [25, 26]. The final results of system services are stored in the document and can easily be used for better analysis and research by plotting conclusions graphically.

Benchmarker Module: Finally, this module is an important built-in feature in software emulation tools which is a unique module found and is not relatable to any other tools. This module assures the necessary productive prerequisites used in altering the software relative to the hardware constraints of the system where it is running. As a result, this helps the users to decide the method of emulating the service.

4.1 Implementation of Network Nodes

This section describes how the MEC host, base station, and forwarding nodes are implemented, which are needed for emulating the network topology (Fig. 3).

Fig. 3
A flow process for network node implementation. 3 blocks with a v switch are featured and labeled forwarding node, the base station node, and the M E C host. The base station includes T o r, V M 1, V M 2, and M E C includes T o R, V M 1, V M N, and V M N + 1.

Implementation of forwarding nodes, base station, and MEC host

Forwarding Node: They are implemented to initiate the network traffic in a forward manner. In addition to this, they have a controller created by OpenvSwitch (OvS) and modified by using Linux traffic control (LTC) and applying OpenFlow rules. Network traffic between links of a node is restricted, which is emulated by LTC by changing key performance factors of dynamic slicing of network signal. Also, OpenFlow rules are used for specifying the path in order to route the service traffic. Therefore the network traffic can be done by using low computational capacity.

Base Station Node: This node consists of virtual machines to showcase the restricted computing capacity and many virtual switches. The initial switch behaves like a packet forwarder, similar to what was discussed above. The next switch establishes a connection between Virtual Machines (VMs) present inside the base station node. Tools such as OvS, LTC, and OpenFlow are also used for packet forwarding, where we use Xen VMs for the representation of the server and the container to depict virtual resources present in the network.

MEC Host: These nodes are prioritized over other nodes because of their huge computational capability, which includes multiple switches and VMs which work similarly to the base station switches context. MEC hosts are of high computational capacity node which includes the number of VMs and containers. More virtual machines add to the computational capacity of the node, which performs the task of forwarding, managing, and routing the traffic.

4.2 Importance of Benchmarker Module

The majority of users utilize hardware resources that are insufficient to emulate topologies and networks. Which requires the usage of more than a hundred nodes which in turn requires multiple CPU core systems to perform the process of generating huge throughput, and our system will not be able to sustain these emulation requirements [7]. So this benchmark module was implemented keeping this restriction in consideration which alters the tool such that EXP-RAN consumes only those resources required by the user while performing an emulation. This requires high throughput and minimum packet loss to achieve the requirements.

5 Emulation and Evaluation

5.1 VRAN Emulation

In a virtualized RAN, the functions of cell stations are executed as VNFs, where initialization is based on the functional split, which defines what all VNFs can be operated on a Remote Unit (RU) and the remaining on a Central Unit (CU) [24, 27]. VNFs have particular needs for their latency and capacity, therefore it requires proper positioning of the VNFs. The issue with RAN creation is the packet loss generation from the transmitter when throughput exceeds the threshold value. Then packet loss definition becomes negligible in the context of evaluation, like 0.1% considered as the maximum accepted packet loss [23] that is going to be used as input for the benchmarker module. It is smart to select a scale factor lower than benchmarker’s recommended value.

Emulation tool eXP-RAN used for testing the model by varying several different parameters. The aim was to minimize the cost of the network operator [28] and simultaneously meet the customer’s requirement. Emulation scenarios were constructed using the model adapter for evaluation captioned from A to F where emulations were done in randomly generated topology as shown in Fig. 4. Blue colored node represents CU. The green node represent the forwarding nodes and finally the black colored node are the base stations. There are six vRAN services since there are six base stations as shown in Fig. 4.

Fig. 4
An illustration of a network. 3 types of shaded, circled nodes are connected to form a pattern representing an emulated topology.

Emulated topology randomly generated

All scenario emulates the same six vRAN services, along with that scenarios from B to F also emulate one additional MEC service deployed in the CU. In scenario A, there are only six vRAN services that were optimally deployed. This scenario confirmed the expected performance derived from the benchmarker module, i.e., the packet loss was negligible in all vRAN services by applying the proper scale factor [23].

Figure 5 concludes that vRAN services get affected only in scenario D. The solution for this effect is to use different routes for vRAN services by bringing minor changes in splits based on the function.

Fig. 5
A grouped bar graph of packet loss in percentage versus test scenarios. Scenario E has the highest data for v R A N 2. Scenario D has the highest data for split v R A N and M E C.

Effect due to MEC service used by 10 users

The impact on the vRAN service increases as the number of MEC users increases [29]. As services are utilized by 100 users, keeping the same configuration. All cases of emulation are affected by huge packet loss with MEC service, and all the vRAN services suffer from a minimum of one scenario. ‘vRAN 2’ is less affected comparatively, while scenario B and scenario C have the highest packet loss.

In Fig. 6 we tried to analysis the effect of MEC service after an optimal allocation of vRAN services [30].

Fig. 6
A grouped bar graph of packet loss in percentage versus test scenarios. The highest values are as follows. Scenario C for v R A N 1. Scenario B for M E C. Scenario E for v R A N 2. Scenarios D for split v R A N.

Effect due to MEC services used by 100 users

5.2 Video Streaming Service Emulation

Before 2025, most of the network traffic will be videographic type applications which will be produced from mobile devices. Slicing of the network assures proper network utilization to help by providing virtualized infrastructure to the users and allow users to modify as per their specifications.

Here, we demonstrate that eXP-RAN emulates two slices for different video service providers having different QoS requirements and needs. The topology used for the emulation is shown in Fig. 7. We observe how they are related as the load of the work on them varies.

Fig. 7
A multiline graph of quality of service percentage versus 10-second time windows. 6 lines are plotted. 5 lines follow a downward trend with fluctuations. One line moves horizontally at the top.

Video streaming services results

An illustration of a network. 3 types of shaded, circled nodes are connected to form a pattern. The circled nodes indicate the M E C host, base station, and forwarding node.

Taking two slices into consideration, the first one is slice X which is taken by video service provider A, and the second one is slice Y, allocated to service provider B. Video service provider A offers video services to those users who are ready to be charged more in return for the content having extremely good quality, whereas video service provider B offers the service at a low price, but with a content whose the video quality gets affected due to other load from other users present on the same network. Therefore, video service provider A offers a high definition service to clients, whereas video service provider B provides standard definition service to clients. The assumption is made that both service providers are taking network slices from the common infrastructure.

The result of this experiment is shown in Fig. 7. The horizontal axis depicts the time window, where the length of each time window is 10 s. The vertical axis depicts the QoS received by each user. High QoS ensures stable performance from the applications having very limited network capacity. Thus allowing organizations to modify their network traffic by prioritizing high-performance applications.

We thus conclude that the QoS of the slices that are provided to the users gets affected due to the workload present on the slices. In this experiment, when workload starts to increase, QoS being given to user belonging to ‘High Definition’ remains unchanged, whereas for the user belonging to ‘Standard Definition’, the QoS starts to decrease, as the workload increases. Therefore, the created slices are able to meet their expected results.

6 Conclusion

The paper showcases the working eXP-RAN emulator that can emulate RANs and EC infrastructures. It supports network resource slicing and evaluation of the performance of services that are running in those slices dynamically [6, 20]. The paper analyzed the vRAN emulation and video streaming service emulation on two different network slices, i.e., high definition client slice and standard definition client slice. There is further scope of work that can be done, such as addition of more use cases, allowing more number of network slices in accordance with 3GPP and enabling combination of network slicing and placement of vRAN network functions [23] over the network, and also improving the existing support for automating the service deployment and the system monitoring [23].