Page 118 - 5G Basics - Core Network Aspects
P. 118

1                                                Core network aspects


            An LINP operator may require that the software components be moved between multiple LINPs, depending
            on service status and end user demands.

            In an additional fundamental requirement, network virtualization should provide service continuity. This
            allows  the  LINP  operators  to  provide  the  services  to  end-users  without  service  downtime  regardless  of
            whether the services are running in a single LINP or are moved to another LINP.
            The requirements for the service mobility are as follows:
            –       The service mobility is recommended to allow the ongoing service to continue in a transparent
                    manner regardless of where it is moved.
            –       The service mobility is recommended to allow an LINP operator to establish connectivity among
                    multiple LINPs.
            –       The service mobility is recommended to allow an LINP operator to receive reports about service
                    status including virtual resource usage.
            –       The service mobility is recommended to maintain the consistency of the software component's
                    status during the mobility phase of the software components.
            –       The service mobility is recommended to provide LINP discovering capability which allows an LINP
                    operator to find an appropriate LINP that satisfies the demands of the service.


            8       Environmental considerations

            Network  virtualization  technology  changes  the  resource  (e.g.,  metal  or  fibre)  consumption  and  energy
            consumption of networks by changing the overall architecture of networks. Further details can be found in
            [ITU-T Y.3011].


            9       Security considerations

            Although network virtualization presents many benefits to both network operators and users, it also brings
            about security issues from different viewpoints than conventional ones. For example, it could be possible for
            a malicious user to monitor or control virtual resources even if these resources are not allocated to the
            malicious user. Thus, implementing malicious access identification and quarantine mechanisms, as well as
            AAA functions, is essential to the operation of LINPs. Coordinating relevant management functions so that
            they can effectively execute these mechanisms may address these issues.





































            108
   113   114   115   116   117   118   119   120   121   122   123