Page 82 - 5G Basics - Core Network Aspects
P. 82

1                                                Core network aspects


            if the nodes have several network interfaces between them. Since different types of access networks have
            different scopes in terms of coverage, one link failure due to movement outside the link coverage can be
            compensated for by another link that is still connected to the other network.
            Furthermore,  application  developers  can  benefit  from  DAN  because  of  easy  programming  for  network
            application because they are not required to worry about the specification of network interfaces.

            7.10    Traffic engineering of DAN
            This  service  scenario  takes  advantage  of  the  awareness  feature  of  DAN,  which  inherently  enables  DAN
            elements to identify not only individual flows of data objects on the network level, but also their features
            such as the size or the service requirements of data objects. Thus, flows of data objects can be treated
            differently  by  forwarding  them  through  different  paths  depending  on  their  service  requirements.  In  IP
            networks,  an  additional  system  component,  e.g.,  deep  packet  inspection,  is  required  to  support  such  a
            function. For instance, the problem of mice and elephant flows is well known: mice flows are short-lived data
            flows such as emails, web pages, and data requests; on the other hand, elephant flows are long lived, such
            as video streaming and data migrations, which significantly impact on network bandwidth and performance.

            For dynamic operation of the service scenario when confronted with substantial data flow, DAN can be
            managed  in  a  centralized  manner.  A  central  management  unit  of  DAN  recognizes  substantial  data  flow
            coming into the network and dynamically sets up routes for the flow. For this reason, DAN elements are
            deployed by operators for efficient use of network resources and fine control over user traffic.
            Figure  7-19  depicts  a  sample  scenario  for  DAN  traffic  engineering.  This  scenario  assumes  two  types  of
            application: making phone calls; and downloading files. From the quality of service point of view, a phone
            call service has higher priority than a file download service, since the phone call service requires minimum
            packet loss and latency. To optimize data flows in this scenario, the two data flows are identified with their
            names including labels specifying their service requirements: "Phone" for phone calling; and "FDS" for file
            downloading.

            1)      User A requests User B for a telephone call. By the label "Phone" in the request message, e.g.,
                    "/Phone/UserA" and "/Phone/UserB", DAN elements are aware that the traffic is delay sensitive and
                    so forward the request message following the shortest path.
            2)      User B responds to the request and forwards the voice data objects to the DAN network. The voice
                    data objects are routed through the path that minimizes the delay. The caching function of DAN
                    elements on the path is disabled since it is a phone service.
            3)      During the phone conversation, User A requests an NDO from its file downloading service provider
                    with its name "/FDS/NDO", which represents delay insensitive traffic.

            4)      The service provider responds to the request and forwards the NDO to the DAN element. By the
                    name of "/FDS/NDO", the DAN element identifies that this is delay insensitive traffic flow and routes
                    it to the path that is not overlapped with the path taken by the voice data traffic flow, and that is
                    possibly having wider broadband. The cache function of the DAN elements on the path is enabled
                    to cache the NDO.


















                                     Figure 7-19 – Traffic engineering of DAN data flows



            72
   77   78   79   80   81   82   83   84   85   86   87