Next Article in Journal
Stereotactic Positioning System: Towards a Mechanism Used in Thermal Ablation Therapy
Next Article in Special Issue
Large-Scale 3D Multi-Story Enterprise Layout Design in a New Type of Industrial Park in China
Previous Article in Journal
Estimating the Soil-Water Retention Curve of Arsenic-Contaminated Soil by Fitting Fuentes’ Model and Their Comparison with the Filter Paper Method
Previous Article in Special Issue
Model for Integrating the Electricity Cost Consumption and Power Demand into Aggregate Production Planning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

5G Digital Twin: A Study of Enabling Technologies

1
Department of Industrial Engineering and Management, National Taipei University of Technology, Taipei 106344, Taiwan
2
Industry 4.0 Implementation Center, National Taiwan University of Science and Technology, Taipei 106335, Taiwan
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(15), 7794; https://doi.org/10.3390/app12157794
Submission received: 27 June 2022 / Revised: 30 July 2022 / Accepted: 31 July 2022 / Published: 3 August 2022
(This article belongs to the Special Issue Advanced Manufacturing Technologies: Development and Prospect)

Abstract

:
5G networks require dynamic network monitoring and advanced security solutions. This work performs the essential steps to implement a basic 5G digital twin (DT) in a warehouse scenario. This study provides a paradigm of end-to-end connection and encryption to internet of things (IoT) devices. Network function virtualization (NFV) technologies are crucial to connecting and encrypting IoT devices. Innovative logistical scenarios are undergoing constant changes in logistics, and higher deployment of IoT devices in logistic scenarios, such as warehouses, demands better communication capabilities. The simulation tools enable digital twin network implementation in planning. Altair Feko (WinProp) simulates the radio behavior of a typical warehouse framework. The radio behavior can be exported as a radio simulation dataset file. This dataset file represents the virtual network’s payload. GNS3, an open-source network simulator, performs data payload transmission among clients to servers using custom NFV components. By transmitting data from client to server, we achieved end-to-end communication. Additionally, custom NFV components enable advanced encryption standard (AES) adoption. In summary, this work analyzes the round-trip time (RTT) and throughput of the payload data packages, in which two data packages, encrypted and non-encrypted, are observed.

1. Introduction

The quantity of user equipment (UE) devices connected to the internet has increased rapidly since 2007 due to the introduction of the iPhone, and the IoT “birth” during 2008 fueled this increase [1]. More and more connected devices require higher network capabilities. Ericsson responded to these needs and launched a white paper on the 5G concept to meet those demands in 2014 [2].
A definition of the main system architecture requirements is needed to provide a straightforward approach. The 3rd Generation Partnership Project (3GPP) performs a task in cooperation with the European Telecommunication Standard Institute (ETSI), which released details in 3GPP TS 23.501 Release 16 [3]. Based on this, radio access network (RAN), user equipment (UE), and access management function (AMF) are the minimum components. The introduction of network function virtualization (NFV) and software-defined network (SDN) allows additional network functions, creating a more feasible and even safer network.
Network function virtualization (NFV) is the virtualization of routers, firewalls, and advanced packet cores. These components can execute software applications and connect to the central infrastructure. Software-defined network (SDN) is an approach to networking that provides tools for programming, traffic control, or network slicing. These functions help to achieve higher network performance. The technologies above enable most use cases of 5G networks, and the primary use cases are enhanced mobile broadband capabilities (eMBB), ultra-reliable low-latency communications (URLLCs), and massive machine-type communications (mMTCs).
Industrial applications with a high density of devices need the implementation of mMTC solutions. There is an increasing demand for Smart logistic solutions such as tracking and fleet management. Supply chain and logistics companies are willing to adopt this kind of solution [4]. Smart logistics needs real-time data to track current operations, create predictions and increase the overall equipment efficiency (OEE). Migration from previous wireless networks to 5G meets this need. However, the adoption rate is still moderate due to the high complexity of the technologies involved.
5G test-beds are crucial to define, test, analyze and deploy solutions in different mobile network scenarios. Digital twin solutions allow the use of virtual equipment for its testing stage. Additionally, the digital environment can be connected to its physical counterpart. Adopters can test different networking or security settings in virtual environments by developing digital models.
5G hardware, software, and training methods are unfamiliar to most non-academic users contributing to the slow 5G adoption. The use of 5G digital twins can enable radio and network simulation to help adopters to justify investment decisions. Regarding network simulation, Network function virtualization (NFV) technologies represent a cost-effective approach. By simulating network equipment, adopters can estimate network performance and understand the amount of required equipment for their particular case [5]. Implementation of NFV solutions reduces the energy consumption and hardware cost of the network.
The academic community provides an extensive collection of frameworks, reviews, and surveys about digital twins in 5G scenarios. Our study complements the research method introduced by the previous research authors to provide a practical application of a basic digital twin in a 5G scenario with data information. The selected testing environment is a warehouse at the Industry 4.0 Implementation Center at the National Taiwan University of Science and Technology. The electromagnetic software, Altair Feko (WinProp), simulates radio coverage testing in the environment, generating a radio dataset in comma-separated values (.CSV). Later, the network transmission simulation used the radio dataset file as the network payload.
With an emphasis on end-to-end communication, this study conducted data transmission and security. GNS3, the selected network simulator in this study, contains Ubuntu NFV solutions for data transmission. Ubuntu virtual machines work as clients and servers. Wireshark, an open-source packet analyzer, has been selected to monitor the data transmission between client and server. In addition, cybersecurity encryption can be implemented in Ubuntu devices to avoid security risks.
Digital twin simulation allows basic testing of 5G technologies, and radio coverage graphics visualize the interaction between 5G radio and its surrounding environment. The combination of NFV technologies and additional modules allows end-to-end connection between client and server. Implementing this set of tools can help speed up the adoption process of 5G technologies for non-familiar adopters.

2. Related Work

Norbert Wiener, the author of the book “cybernetics”, suggested the combination of physical processes, computation, and communication, and he coined the term in 1948 [6]. The term evolved into cyber-physical systems (CPS), which expands the integration from process to complete systems. Its main goal is seamless integration between the practical world and its digital counterpart. In contrast, digital twins (DTs) are focused applications that allow providing high-fidelity virtual models. For this reason, DT can be understood as a focused application of CPS [7].
The origin of the digital twin (DT) concept began in the 1960s, and during this period, NASA developed “twinning” methods for its Apollo Space Program. Constant data connection provided telemetry data to an array of 15 simulators. This system could compute many simulated equipment failure scenarios or tested communication failures [8]. Nowadays, it is possible to define a DT as an advanced system that can provide high-fidelity models [9].
The connection between DT and its physical counterpart is crucial to generating high-fidelity models. The two-way data connection enables constant updates, and the main goal is to achieve a higher correlation between simulated and actual data tested in the field. Due to its modularity, digital twin solutions combine many technologies. As an example, Nvidia Omniverse combines telemetry data from sensors with augmented reality (AR) solutions.
Digital twin industrial applications are presented in manufacturing, energy, industrial assets, or architecture structures. Intelligent manufacturing solutions (CPS) are currently listed as the top priority in manufacturing of government-level strategies, such as Industrial Internet (US), Industry 4.0 (Germany), or Made in China 2025 (China), reflecting this priority [10]. Early adopters such as BMW, General Electric, Microsoft, or Siemens are developing their digital twin technologies.
The logistics sector needs signal monitoring systems to avoid unexpected disruptions [11]. The digital supply chain twin (DSCT) is a digital dynamic simulation model [12]. It has three scopes: network level, site level, and asset level.
Smart logistics belongs to the site level, covering warehouses and manufacturing scenarios. IoT solutions in ports [13], smart contracts for tracing supply chain parts [14], or new frameworks for next-generation ports and warehouses are examples of smart logistics applications [15].
The implementation of IoT solutions in ports requires the deployment of a massive number of devices. Therefore, the adoption of massive machine-type communication (mMTC) is required. Data encryption and end-to-end performance are required to test and validate mMTC applications. In this regard, 5G digital twins could perform network simulations for these two specific applications [16].
Digital twin integration with 5G technologies is gaining popularity among the research community. The research efforts from Dimitris et al. (2021) help to provide a generalized architecture of an IoT smart manufacturing scenario. In this case, the study highlights using digital twins to apply advanced technologies based on 5G wireless communications [17].
According to Qi et al. (2021), “Many researchers and participators in engineering are not clear which technologies and tools should be used”. Their work provided an extensive summary of enabling technologies for digital twins and established general research directions [18]. The definition of clear research directions is part of the work of Zao et al. (2022), where the authors proposed a framework for digitalized museums. Digitalized museums require combining digital twins, artificial intelligence (AI), and 5G technologies. The implementation of the proposed framework was simulated using MATLAB [19].
According to Hu et al. (2021), “There is a lack of consideration of the environmental coupling, which results in the inaccurate representation of the virtual components in existing DT models”. The authors suggested a strong focus on real-world data, including physical parameters [20].
Research from Zeb et al. (2022) provided the expected features beyond 5G/6G networks. The main list of features includes network services (eMBB, mMTC, and URLLC), network slicing (SDN, NFV), cloud-native deployments (Kubernetes, KubeFlow), federated learning (FL), age of information (AoI), and green communication (power saving, energy harvesting) [21].
Based on the previous considerations, our study provides the needed components to simulate and test a small-scale 5G digital twin. The study of enabling technologies provides a straightforward approach to using software tools. Our study considers the influence of real-world materials in the data generation section to obtain accurate radio representations. In addition, the use of NFV technologies in the data transmission section allows end-to-end communication between client and server. There is a need to provide an empirical analysis of the software tools to test and validate the previous list of features. This study’s result section analyzes package data size, TCP streams, round-trip time, average network throughput, and capture of data packages. The discussion and conclusion sections summarize the study and future research directions.

2.1. Available Test-Beds

To test and evaluate the performance of a 5G network, academic and corporate institutions use the 5G test-bed to research, develop, and predict its future implementation under a wide variety of scenarios [22].
Currently, many network test-bed solutions can fulfill network slice selection function (NSSF) needs. Norwegian University of Science and Technology researchers conducted an extensive review of a small-scale 5G test-bed in this regard. In the review, the team provided a valuable summary of a wide variety of test-bed for network slicing in 5G [23]. A common trend was combining SDN and NFV technologies (the BlueArch, shown in 19 of the 21 test-bed evaluated). On the other hand, radio access technologies (RATs) had a lower adoption rate (the SliceNet, shown in 13 of the 21 test-bed). RAT combines radio networks, Wi-Fi, long-term evolution (LTE), and 5G new radio). Radio propagation is sensitive to its physical environment. The presence of materials such as metal or brick can cause unexpected blind spots.
Radio datasets are the basis for distance estimation or location fingerprint techniques [24]. Smart logistic solutions such as fleet management and tracking solutions require distance estimation and location fingerprint. The use of simulators with data generation capabilities can provide customized radio datasets.
The lower adoption rate of RATs in the 5G small-scale test-beds review represents a research opportunity. Combining radio simulators with other technologies, such as NFV or SDN, could provide tools to test and validate essential 5G technologies for non-familiar adopters.

2.2. Additional Requirements

5G relies on the latest technology to perform equipment virtualization, network slicing, and traffic control that exposes the network to cyber-attacks [25]. The next-generation networks must include cybersecurity tools that can provide safe connections. Data encryption, blacklist listing, and machine learning network analysis are some examples of cybersecurity tools.

3. Materials and Methods

This section describes the materials and methods used in this study. When adopting new technologies, decision-makers want to evaluate the system before its acquisition. Using simulators helps estimate coverage and the main parameters of a 5G deployment scenario.
In general, physical objects affect the coverage of the 5G network in an industrial environment where heavy machinery, production lines, or compound materials are ubiquitously in working fields. Antenna position, frequency band, or transmitting power also affect radio coverage. Antenna position or transmitting power changes can improve or deteriorate the radio signal coverage. Radio simulators can provide visual representation features to understand the effect of these changes.
Additionally, network simulators allow data transmission and analysis with virtual equipment representing either a valid user or a non-authorized user. Virtual equipment can provide security measures to guarantee safety across the network, where the simulation of firewalls or encryption techniques can help to increase network security.
Using 5G digital twins allows radio and network behavior simulation to represent common issues about 5G technologies. This study aims to provide a practical application scenario of enabling 5G technologies, providing an initial testing approach to non-academic adopters.

3.1. Main Subjects of the 5G Digital Twin

This section describes the materials and methods used in the central parts of this study, data collection, transmission, and methods. Feko-WinProp (Altair) simulates a deterministic radio signal for data collection, and GNS3 represents the whole network and its data transmission. Finally, the method part depicts the step-by-step approach of this research. The main subjects conducted are listed in Table 1.

3.2. Radio Access Network (RAN)

Radio access network (RAN) is the implementation of both legacy and new radio technologies. New features such as multiple input, multiple output (MIMO), beamforming, and new dedicated radio bands (1–24 GHz) are available. These features enhance the radio performance of 5G. Due to its higher operating frequencies, 5G tends to be vulnerable to its environment. This issue is significant in warehouses or manufacturing sites, which tend to have higher penetration losses. To test the feasibility of a project, it is essential to study radio coverage analysis.
The set of bands available for 5G new radio (NR) has been defined in the technical specification 3GPP TS 38.101-1 Release 15 [26]. According to this technical specification, there are three major frequency bands: low (700 MHz), high (3.1–4.9 GHz), and very high (26 GHz). The use of each specific band depends on the geographical area. Table 2 represents Taiwan’s current 5G frequency bands for individuals and private users.
Frequency bands under 2.7 GHz have lower performance due to a higher concentration of cellular networks (3G and 4G) across the ultra-high-frequency band (UHF). In contrast, the C-band frequency range (3.4–3.6 GHz) is highly available. During the early phase of the 5G deployment in Taiwan, the central band provided at that time was N1. Nowadays, N78 is the most popular frequency band. N1 is the second most adopted frequency band in Taiwan.
Currently, the leading mobile network operators (MNOs) in Taiwan offer five frequency bands, as shown in Table 3. The current bands offered cover low- to high-frequency bands.
MNOs provide wireless network coverage maps to evaluate the service availability in a given location. However, this can differ from the network experience of each user. OpenSignal, a private analytics company, collects network parameters such as signal strength, available networks, or data speed of each application user. Thus, users can visualize the radio coverage map in their current location [27].
Radio coverage simulators are needed to predict the coverage of a custom wireless network. In the case of custom wireless networks, equipment parameters such as transmitting power or radiation patterns affect the result of the coverage. In this regard, VE2DBE is a free online radio simulator, merging the antenna parameters with location data from geographic databases such as OpenStreetMap, Bing Road, Bing Satellite, USGS Topo, USGS Sat, Open TopoMap, and OSM gray. The coverage file is a geo-referenced map of the antenna coverage in a selected area. This file contains multiple images, such as a radio coverage map (.PNG), terrain relief map (.JPG), land cover map (.PNG), and population density map (.PNG). VE2DBE can be used for radio coverage simulation in large-scale areas [28].
Physical obstacles and reflective materials affect the coverage of custom wireless networks notorious in environments such as warehouses or manufacturing scenarios. In these environments, accurate radio coverage requires both antenna parameters and obstacles’ material parameters. In this regard, advanced electromagnetic simulators such as Altair Feko (winProp) enable radio network planning for small and large-scale areas [29]. Small-scale areas include buildings, warehouses, or manufacturing sites. Large-scale areas include urban and rural environments.
The electromagnetic radio simulator provides a graphical representation of the radio coverage in a selected area with real-world physical data. In addition, the simulated radio coverage values can be exported as a comma-separated value (.CSV) file. The file contains the space coordinates and power values (expressed in dBm).
This work focuses on the 5G NR specification provided by the local MNO, Chunghwa Telecom, the largest telecommunications company in Taiwan. Using Altair, WinProp conducted the radio coverage analysis in a warehouse environment. By simulating the physical characteristics of the space, it is possible to estimate the maximum range of coverage of the radio signal. This helps to speed up the validation time of 5G use cases.

3.3. Testing Environment

The primary experiment environment includes a warehouse, outdoor space, and buildings as the testing ground for the DSCT Site Level. Figure 1A shows the layout of the testing ground in scale, which is the facilities of the Industry 4.0 Implementation Center at the National Taiwan University of Science and Technology. The layout space uses computer-aided design (CAD) to represent the geometric location of the building and antenna. The warehouse space is about 10 × 10 square meters, and the radio waves transmission range is about 30 × 40 m around the warehouse, peripheral space, and building. Figure 1B shows the location of the antenna at the testing site. The antenna sits at the top of the Industry 4.0 Implementation Center building, with a relative height of 5.3 m from the ground.
The testing environment layout allows radio coverage simulation using an electromagnetic radio simulator, an initial approach for radio coverage analysis and network deployment. The generated radio coverage simulation data can compare with practical signal measurements in a further plan. Acquiring dedicated hardware devices such as industrial boards with 5G capabilities or software-defined radio (SDR) modules is required to obtain practical measurements. The acquisition of dedicated hardware is currently under consideration and included in our future research development plan.

3.4. Data Generation

Chunghwa Telecom provides service for three frequency bands, N1, N3, and N78. N78 is located in the C-Band frequency range and has an operating frequency of 3500 MHz. The following radio coverage analysis focuses on implementing the N78 frequency band. Supported channel Bandwidths for the N78 band are divided into different channels (10–100 MHz). The most popular channel bandwidth for N78 is 100 MHz, the maximum supported channel bandwidth. Smaller channel widths are prevalent in early N78 deployment before spectrum auctions.
Regarding the location of the antenna, it sat at the top of the Industry 4.0 Implementation Center building, with a relative height of 5.3 m from the ground. The azimuth and down-tilt values of the antenna are 150° and 35°. Additionally, its transmitting power is 40 dBm (10 W). The height of the user equipment (UE or client) is assumed to be 1.5 m above the ground. Table 4 represents the 5G network coverage simulation parameters.
Material penetration losses are proportional to the frequency value. A slight frequency increment can generate different radio propagation results. Advanced electromagnetic radio simulators contain material libraries for accurate environment representation. In this study, these values are in the WinProp Material library, which includes an extensive catalog of common materials for indoor and outdoor spaces.
The radio coverage simulation utilizes deterministic software (WinProp, Altair Software Inc., Troy, MI, USA), which is in charge of data modeling. Figure 2 shows 5G radio signal coverage contours in the CAD file layout. This figure combines simulation parameters and test environment materials listed in Table 4 and Table 5. The WinProp software can export the data generated by the simulation process with the parameters we mentioned in the last subsections.
The generated data contains power and distance values (expressed in the cartesian coordinate system) and can be saved as a dataset that consists of 1283 samples, as Table 6 shown. The first column represents the horizontal plane (x plane), the second column represents the vertical plane (y plane), and the last column stores the power value expressed in dBm.
This data can be saved in a comma-separated values (.CSV) file. The generated radio simulation dataset represents the payload of the network. Payload transmission between client and server allows network performance analysis. The following section will study the different components required for data transmission.
Altair Feko (WinProp), as an electromagnetic simulator for wireless networks, generated the values in Table 6 and the radio coverage map in Figure 2. Please note that both antenna and receiver have been simulated with the parameters indicated in Table 4. Therefore, no hardware is implemented in this study except the antenna provided by the local MNO. For future research, the acquisition of hardware components, such as industrial boards with 5G capabilities or software-defined radio (SDR) modules, is currently under consideration.

3.5. Data Transmission

Network software programs allow the generation of virtual networks. This network uses different components such as routers, switches, or similar. By using said components, data transmission is possible. The data package selected for this task is the dataset generated before. The following points explain the different components of the data transmission part.

3.5.1. Network Management User Interface

Graphical Network Simulator-3 (GNS3) is an open-source network software written in Python that utilizes to present the network topology. GNS3 can host Docker containers, network switch, firewalls, or Ubuntu servers. A two-way data connection is possible via telnet. This combination of components allows the simulation of complex network environments [30].

3.5.2. Network Functionality Virtualization (NFV)

NFV is the total virtualization of multiple network functions, such as routers or firewalls. Networking hardware companies such as Cisco [31], Juniper [32], Huawei [33], or FortiNet [34] are providing kernel-based virtual machines (KVMs), which are digital versions of their equipment. For the implementation of user equipment (guest users), companies such as Canonical [35] also provide a collection of KVMs. KVM solutions provide similar functions to their physical counterparts, a feature highly valuable for equipment testing, which helps reduce the error rate during deployment. In addition, KVM enables the connection between the simulated environment and the natural world (two-way connection), providing a hybrid combination of hardware and software components.

3.5.3. Software-Defined Network (SDN)

Dynamic network control is necessary to achieve higher network performance. Improving routing processes and data flow requirements is possible with SDN [36]. SDN controllers can be present in both front-haul and back-haul links. In this regard, Ryu is an SDN controller with a well-defined API written in Python [37]. Located at the node level, Ryu can communicate with the Mininet controller.
Based on the study from NUST, there are over 21 test-beds currently available. Due to the vast offer and proven effectiveness, we did not plan to apply SDN solutions in this study.

3.5.4. Packet Analyzer (Wireshark)

Wireshark is an open-source packet analyzer used for data interception over computer networks. The software allows the graphical representation of data packets and supports many internet protocols, according to the internet protocol suite (TCP/IP model) [38]. Table 7 depicts a brief list of supported protocols used for IoT applications. We study the packet round-trip time (RTT) and throughput in this work.

3.5.5. AES Encryption

The use of the advanced encryption standard (AES) in this study aims to fulfill the additional requirements stated. AES is a block cipher encryption method, where all the data are encrypted in blocks, and the length of each block is 128 bits. In addition, it is a symmetric algorithm requiring the same key for encryption and decryption of data. The key size would determine how many rounds of encryption are required [39].
From a performance point of view, symmetric algorithms are less resource-intensive and faster than asymmetric algorithms. The radio simulation dataset is the selected payload to encrypt in this study.

3.6. Dynamic NFV Components

This study requires the adoption of dynamic components to perform data transmission and encryption. This type of component runs kernel modules. The OS modules allow script file implementation using Python3 as the programming language.

3.6.1. Ubuntu-Docker (NFV)

Ubuntu is the selected operating system (OS) to simulate the behavior of user equipment (client) and server. Using a container image-hosted operating system can decrease the setup time. Container images are standalone executable packages of software with essential components to run applications. Docker is an open-source container service. Linux command line interface (CLI) commands are needed to interact with the system. Default modules of the system can be updated at will. The extra modules in Table 8 are necessary for data transmission and encryption.

3.6.2. FortiGate (NFV)

FortiGate is a KVM solution provided by FortiNet. The software module includes a graphic user interface (GUI) and a CLI. The module setting allows the data transmission between client and server via ethernet port. For this reason, its behavior in this research can be passive, similar to an ethernet switch. Dynamic testing of FortiOS is under consideration for future work.

3.7. List of Network Components

Testing of 5G technologies included NFV and RAN technologies in the research. To summarize the previous points, Table 9 contains the list of components necessary to conduct data transmission. Physical equipment and its virtual counterpart are both listed. GNS3 allows the connection of the previous list of components to the virtual network via multiple protocols such as TCP or UDP [40]. The connection between the physical and virtual worlds can be considered for future work.

3.8. 5G Network Architecture

This study implements kernel-based virtual machines (KVMs), digital equipment versions. KVM solutions provide similar functions to their physical counterparts, a feature highly valuable for equipment testing. In this study, FortiGate 6.45 and Docker-Ubuntu are dynamic NFV components capable of emulating actual networking hardware activities. FortiGate KVM requires the acquisition of its physical hardware. Therefore, its use is limited to authorized users. In contrast, Ubuntu-Docker is an open-source container service.
A 5G network is composed of two sections: front-haul and back-haul. The front-haul section refers to the network’s wireless access (5G RAN) and establishes a radio connection between the user equipment (UbuntuDockerGuest-1) and the 5G Access Point. In contrast, back-haul access relies on a fiber to the X (FTTX) connection and connects the different network equipment components.
The network representation of the Industry 4.0 Implementation Center has been conducted with GNS3, as shown in Figure 3. Its architecture consists of public and private networks. The blue highlighted block (Figure 3, left) is the “known” part of the network (private). This part of the network uses NFV components to send data. The connection between Ericsson’s 5G access point (Small Cell) and L2 Switch (OSI Layer 2) relies on the FTTX connection. A firewall is after the L2 Switch to guarantee network security.
The red block on the right side of Figure 3 is the highlighted public network, which interconnects to private networks via the L3 switch (OSI Layer 3). The primary function of this part is to guarantee access to the internet.
Figure 3 represents the network layout of the private network. Therefore, the image represents a dynamic network simulator system rather than graphic icons. The components included in Figure 3 are KVM solutions (UbuntuDocker-1, UbuntuDocker-2, and FortiGate 6.4.5-1) and open-source NFV components (ethernet switch). Linux command line interface (CLI) commands are required to interact with the system to control each component.

3.9. Method

The radio parameters needed for simulation vary in each country. These 5G radio parameters are required for the deterministic radio simulator. In this case, the operating frequency band in this study is N78.
The simulator requires a CAD file representation to simulate radio coverage. A material library provided by WinProp allows material attributes to the CAD file. GNS3 is the network simulation host of the virtual network, and Ubuntu-Docker allows data transmission and encryption. The generated dataset contains cartesian coordinates and their predicted power value.
Data encryption relies on the AES algorithm, and it is an optional feature. To send data between the client (UbuntuDockerGuest-1) and server (UbuntuDockerGuest-2), Ubuntu-Docker uses TCP protocol. The selected port for data transmission is 21,880. After establishing a TCP connection, data transmission is possible. The packet analyzer (Wireshark) is required to observe data transmission. Figure 4 shows the workflow of the execution process of the 5G digital twin.

4. Results

Wireshark is the selected packet analyzer for this study, which provides a graphical representation of TCP streams, round-trip time (RTT), and throughput. The TCP protocol is executed in both client and server to establish communication. After the server-side data transmission port opens, the client sends data to the selected IP address and its respective port. The following points can explore the network performance differences between the data packages.

4.1. Data Size Comparison

In this study, two data packages are available: non-encrypted and encrypted packets, and both save in comma-separated value (.CSV) files. Non-encrypted package refers to the generated radio dataset containing raw data. Encrypted package refers to the generated dataset after encryption with the AES algorithm. After encryption, the new file is 34 percent larger than the non-encrypted dataset. Table 10 represents the difference in file size among these two data packages.

4.2. TCP Streams

The first step of establishing a TCP session is the client’s and server’s handshake. The data transmission begins after the connection is established. Figure 5 represents both handshake (green) and data transmission (red).

4.3. Round-Trip Time

The time between request and response from the client to server, measured in milliseconds, represents the round-trip time of the network. RTT can be affected by distance, transmission medium, number of network hops, traffic levels, or server response time.
In this study, the main difference between encrypted and non-encrypted file transmission is the size of the document. Figure 6 and Figure 7 represent the different RTT times of non-encrypted and encrypted files, respectively.

4.4. Average Network Throughput

Network throughput is the amount of data transmitted from client to server in a given period, and the measurement unit is the bit per second (bits/s). The horizontal axis represents the time in seconds for each data section. Enforced limitations, network congestion, latency or packet loss, and errors can be affected throughput.
Non-encrypted file requires 0.02 s to achieve its highest throughput, 260,000 (bits/s). In comparison, the encrypted file requires 0.025 s to achieve a higher throughput of 350,000 bits/s. Figure 8 and Figure 9 represent both non-encrypted and encrypted files.

4.5. Data Package Analyzer

Wireshark allows packet sniffing, capturing the data stream from client to server. After selecting the target package, Wireshark provides a representation in both HEX and UTF-8 values. Without data encryption, raw values are exposed to both white-hat and black-hat hackers. Figure 10 displays the compromised values on its right side, which are identical to the dataset obtained in Table 6.
The AES algorithm requires the use of the same key for encryption and decryption, and it can also provide excellent security if the key is not compromised. In contrast, Figure 11 represents the ciphertext values on its right side, which are extremely hard to decode.

5. Discussion

The implementation of the different technologies presented in this study facilitates the simulation of 5G digital twins. The network simulator (GNS3) allows the combination of NFV components and data transmission across a virtual network. The deterministic radio simulator provides a coverage map of the warehouse scenario. This data can be exported as a comma-separated value file (.CSV file), generating a 5G radio coverage dataset with cartesian coordinates and power values. The use of dynamic network components is required for sending data. In this regard, Ubuntu-Docker KVM is quite helpful. This component allows extra modules in a given scripting language (Python3). The TCP protocol enables client and server connection by denoting a specific port (21880). The selected transmission mode for this study is simplex. This communication mode is unidirectional between client to server. The transmission of files is individual. Wireshark is the software used to monitor data transmission.
Data security is a constant challenge in data communication networks. The packet analyzer allows the capture of packages across the network. Capturing data is known as packet sniffing, and it could represent a security risk when dealing with more sensitive data. The AES algorithm has been adopted in this study to hedge this risk.
This study compares the difference between encrypted and non-encrypted files across the network. RTT time between files is slightly different, ranging from 1.2 to 3 milliseconds. Throughput measures the amount of data transmitted from client to server in a given period. Therefore, when the data package increases, the throughput also tends to increase. In this case, the file size increases an extra 34 percent after encryption. The encrypted file takes an extra 0.005 s to achieve its maximum throughput, which is 90,000 bits/s higher than its counterpart. The extra 0.005 s represent a 25 percent increase in time. In other words, the extra size of the file significantly influences time and throughput.
Packet capture exposes the vulnerability of non-encrypted files. The raw data can be decoded and easily read by an attacker. In contrast, data encrypted with the AES algorithm can be captured but not easily decoded.

6. Conclusions

Three main issues are common when implementing a digital twin. To begin, digital twin needs a clear definition of tools and technologies. In addition, the applications need to consider real-world physical data. Finally, digital twins must adopt the expected features beyond 5G/6G networks. This study provides the following solutions to solve the main issues. Firstly, this study is a practical analysis of Altair Feko and GNS3 software tools. Secondly, our study considers the influence of real-world materials in the radio section. Finally, this study adopts network function virtualization (NFV) technologies for 5G networks.
In 5G scenarios, using simulation software for radio enables the adoption of essential digital twin technologies. The generated dataset represents the payload for transmission between client and server. Network monitoring and advanced security features depend on implementing NFV technologies. In this regard, communication between virtual network components has been achieved. This study adopted a specific encryption method (AES). This method solved packet sniffing issues by encrypting the dataset in this study.
Filtering mechanisms in firewalls can alter the network’s performance. FortiGate KVM functions can simulate virtual firewalls, which is a topic of further study. Finally, our future goal is to enable a two-way connection that allows telnet communication between hardware and software in the GNS3 platform. Two-way connections allow interaction between physical and digital environments. The acquisition of hardware components, such as industrial boards with 5G capabilities or software-defined radio (SDR) modules, is currently under consideration and included in our future research development plan.

Author Contributions

Methodology and software, R.R. and S.-H.L.; measurements and data curation, R.R.; and writing—original draft preparation, C.-Y.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by MOST 110-2218-E-011-011, the funded project of the Ministry of Science and Technology (MOST) of Taiwan. The experiment field and equipment support were mainly provided by the Center for Cyber-Physical System Innovation (CPSi), National Taiwan University of Science and Technology (NTUST), Taiwan.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to their use in future research activities.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dave, E. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything; White paper; Cisco Internet Business Solution Group: San Jose, CA, USA, 2011. [Google Scholar]
  2. ERICSSON. “5G: What Is it?”; White paper; ERICSSON: Kista, Stockholm, Sweden, 2014. [Google Scholar]
  3. 3GPP TS 23.501, 5G.; System Architecture for the 5G System (5GS) (3GPP TS 23.501 Version 16.6.0 Release 16). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144 (accessed on 13 June 2022).
  4. Godfrey, A.A.; Bruno, J.S.; Gerhard, P.H.; Adnan, M.A.-M. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges. IEEE Access 2018, 6, 3619–3647. [Google Scholar] [CrossRef]
  5. Hilary, F.; Carlos, C.-M.; Assis, K.D.R.; Shuangyi, Y.; Dimitra, S. Techno-Economic Analysis of 5G Non-Public Network Architectures. IEEE Access 2022, 10, 70204–70218. [Google Scholar] [CrossRef]
  6. Norbert, W. Cybernetics: Or Control and Communication in the Animal and the Machine, 2nd ed.; Hermann & Cie: Cambridge, MA, USA, 1961; MIT Press: Paris, France, 1948; ISBN 978-0-262-73009-9. [Google Scholar]
  7. Fei, T.; Meng, Z.; Nee, A.Y.C. Chapter 12—Digital twin, cyber-physical system, and internet of things. In Digital Twin Driven Smart Manufacturing (Science Direct); Academic Press: Cambridge, MA, USA, 2019; pp. 243–256. [Google Scholar] [CrossRef]
  8. Guo, J.; Lv, Z. Application of Digital Twins in multiple fields. Multimed. Tools Appl. 2022, 81, 26941–26967. [Google Scholar] [CrossRef] [PubMed]
  9. Michael, G.; John, V.; (Florida Institute of Technology, Melbourne, FL, USA). Origins of the Digital Twin Concept. Personal Communication, 2016. [Google Scholar] [CrossRef]
  10. Fei, T.; Qinglin, Q.; Ang, L.; Andrew, K. Data-driven smart manufacturing. Manuf. Syst. 2018, 48 Pt C, 157–169. [Google Scholar] [CrossRef]
  11. Jessica, O.A.; Alejandro, V.S. Supply Chain Resilience Roadmaps for Major Disruptions. Logistics 2021, 5, 78. [Google Scholar] [CrossRef]
  12. Gerlach, B.; Zarnitz, S.; Nitsche, B.; Straube, F. Digital Supply Chain Twins—Conceptual Clarification, Use Cases and Benefits. Logistics 2021, 5, 86. [Google Scholar] [CrossRef]
  13. Lars, H.; Jan, H.; Christian, R. Challenges of wifi-enabled and solar-powered sensors for smart ports. In Proceedings of the 4th International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems (ENSsys’16), New York, NY, USA, 14 November 2016; pp. 13–18. [Google Scholar] [CrossRef]
  14. Manoshi, D.T.; Mohammad, M.K.; Manjit, K.; Atef, Z. Smart Supply Chain Management Using the Blockchain and Smart Contract. Sci. Program. 2021, 2021, 6092792. [Google Scholar] [CrossRef]
  15. Haobin, L.; Xinhu, C.; Pankaj, S.; Loo, H.L.; Ek, P.C. Framework of O2DES.NET digital twins for next generation ports and warehouse solutions. In Proceedings of the Winter Simulation Conference (WSC), Orlando, FL, USA, 14 December 2020; pp. 3188–3199. [Google Scholar] [CrossRef]
  16. Huang, X.N.; Ramona, T.; Duc, T.; Mallik, T. Digital Twin for 5G and Beyond. IEEE Commun. Mag. 2021, 59, 10–15. [Google Scholar] [CrossRef]
  17. Mourtzis, D.; Angelopoulos, J.; Panopoulos, N. Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends. Electronics 2021, 10, 3175. [Google Scholar] [CrossRef]
  18. Qi, Q.; Tao, F.; Hu, T.; Answer, N.; Liu, A.; Wei, Y.; Wang, L.; Nee, A.Y.C. Enabling technologies and tools for digital twin. J. Manuf. Syst. 2021, 58, 3–21. [Google Scholar] [CrossRef]
  19. Jin, Z.; Lei, G.; Yueqiao, L. Application of Digital Twin Combined with Artificial Intelligence and 5G Technology in the Art Design of Digital Museums. Wirel. Commun. Mob. Comput. 2022, 2022, 8214514. [Google Scholar] [CrossRef]
  20. Hu, W.; Zhang, T.; Deng, X.; Liu, Z.; Tan, J. Digital twin: A state-of-the-art review of its enabling technologies, applications and challenges. J. Intell. Manuf. Spec. Equip. 2021, 2, 1–34. [Google Scholar] [CrossRef]
  21. Zeb, S.; Mahmood, A.; Hassan, S.A.; Piran, M.J.; Gidlund, M.; Guizani, M. Industrial digital twins at the nexus of nextG wireless networks and computational intelligence: A survey. J. Netw. Comput. Appl. 2022, 200, 103309. [Google Scholar] [CrossRef]
  22. Bjoern, H.; Arne, S.; Anders, E.; Ranvir, C.; Paulo, M.; Henrik, A. 5G NR test-bed 3.5 GHz coverage results. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3 June 2018; pp. 1–5. [Google Scholar] [CrossRef]
  23. Ali, E.; Katina, K. Small-Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review. Wirel. Commun. Mob.Comput. 2021, 2021, 665216. [Google Scholar] [CrossRef]
  24. Martin, K.W.; Dirk, P. A Bayesian approach for RF-based indoor localisation. In Proceedings of the 4th International Symposium on Wireless Communication Systems, Trondheim, Norway, 17 October 2007; pp. 133–137. [Google Scholar] [CrossRef]
  25. Stanislav, V.; Alberto, M.; Antonio, P.; Diego, R.L. A digital twin network for security training in 5G industrial environments. In Proceedings of the IEEE 1st International Conference on Digital Twins and Parallel Intelligence (DTPI), Beijing, China, 15 July 2021; pp. 395–398. [Google Scholar] [CrossRef]
  26. 3GPP TS 38.101-1, 5G NR.; User Equipment (UE) Radio Transmission and Reception Part 1: Range 1 Standalone (3GPP TS 38.101-1 version 15.5.0 Release 15). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3283 (accessed on 13 June 2022).
  27. OpenSignal. Available online: https://www.opensignal.com/apps#section-os-app (accessed on 21 July 2022).
  28. VE2DBE. Available online: https://www.ve2dbe.com/rmonline_s.asp (accessed on 21 July 2022).
  29. Altair Feko. Available online: https://www.altair.com/feko-applications (accessed on 21 July 2022).
  30. GNS3. Getting Started with GNS3. Available online: https://docs.gns3.com/docs/ (accessed on 22 June 2022).
  31. Cisco. Cisco UCS Manager Administration Management Guide 3.1 (KVM Console). Available online: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-manager/GUI-User-Guides/Admin-Management/3-1/b_Cisco_UCS_Admin_Mgmt_Guide_3_1/b_Cisco_UCSM_GUI_Admin_Mgmt_Guide_3_1_chapter_01111.html (accessed on 17 June 2022).
  32. vMX Getting Started Guide for KVM. Available online: https://www.juniper.net/documentation/us/en/software/vmx/vmx-getting-started/index.html (accessed on 17 June 2022).
  33. Architecture Kunpeng BoostKit for Virtualization (Technical White Paper, Virtualization Architecture). Available online: https://support.huaweicloud.com/intl/en-us/twp-kunpengcpfs/kunpengcpfs_19_0005.html (accessed on 17 June 2022).
  34. KVM Administration Guide. Available online: https://docs.fortinet.com/document/fortigate-private-cloud/6.4.0/kvm-administration-guide/706376/about-fortigate-vm-on-kvm (accessed on 17 June 2022).
  35. Ubuntu. KVM Hypervisor: A Beginners’ Guide. Available online: https://ubuntu.com/blog/kvm-hyphervisor (accessed on 17 June 2022).
  36. Afolabi, I.; Taleb, T.; Samdanis, K.; Ksentini, A.; Flinck, H. Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions. IEEE Commun. Surv. Tutor. 2018, 20, 2429–2453. [Google Scholar] [CrossRef]
  37. Lucas, N.T.; Cleverson, N.; Silvia, L.; Aldebaro, K. Middleware implementation for RYU SDN controller to manage switches in a C-RAN scenario. In Proceedings of the 48th Integrated Software and Hardware Seminar, Porto Alegre, Brazil, 23 July 2021. [Google Scholar] [CrossRef]
  38. Internet Protocol Family. Available online: https://wiki.wireshark.org/InternetProtocolFamily (accessed on 22 June 2022).
  39. Dworkin, M.; Barker, E.; Nechvatal, J.; Foti, J.; Bassham, L.; Roback, E.; Dray, J. Advanced Encryption Standard (AES), Federal Inf. Process. Stds. (NIST FIPS); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001; pp. 9–51. [Google Scholar] [CrossRef]
  40. Petrovic, R.; Simic, D.; Drajic, D.; Cica, Z.; Nikolic, D.; Peric, M. Designing Laboratory for IoT Communication Infrastructure Environment for Remote Maritime Surveillance in Equatorial Areas Based on the Gulf of Guinea Field Experiences. Sensors 2020, 20, 1349. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. Testing environment. (A) Layout (CAD file). (B) Antenna at the testing site.
Figure 1. Testing environment. (A) Layout (CAD file). (B) Antenna at the testing site.
Applsci 12 07794 g001
Figure 2. Predicted radio coverage on the test environment map.
Figure 2. Predicted radio coverage on the test environment map.
Applsci 12 07794 g002
Figure 3. 5G network architecture.
Figure 3. 5G network architecture.
Applsci 12 07794 g003
Figure 4. 5G digital twin workflow.
Figure 4. 5G digital twin workflow.
Applsci 12 07794 g004
Figure 5. TCP stream graph.
Figure 5. TCP stream graph.
Applsci 12 07794 g005
Figure 6. Non-encrypted file RTT.
Figure 6. Non-encrypted file RTT.
Applsci 12 07794 g006
Figure 7. Encrypted file RTT.
Figure 7. Encrypted file RTT.
Applsci 12 07794 g007
Figure 8. Non-encrypted file throughput.
Figure 8. Non-encrypted file throughput.
Applsci 12 07794 g008
Figure 9. Encrypted file throughput.
Figure 9. Encrypted file throughput.
Applsci 12 07794 g009
Figure 10. Non-encrypted data package capture.
Figure 10. Non-encrypted data package capture.
Applsci 12 07794 g010
Figure 11. Encrypted data package capture.
Figure 11. Encrypted data package capture.
Applsci 12 07794 g011
Table 1. The portions in the practice of the 5G digital twin.
Table 1. The portions in the practice of the 5G digital twin.
Data GenerationData TransmissionAnalysis Methods
List of radio parametersData encryptionRound-trip time (RTT)
Building CAD fileTCPThroughput
Data generation (.CSV)WiresharkPacket analyzer
Table 2. Commercially Available 5G Frequency Bands in Taiwan.
Table 2. Commercially Available 5G Frequency Bands in Taiwan.
Bandf (MHz)
N12100
N31800
N28700
N412500
N783500
N79 14700
1 N79 is a dedicated band for private users and requires special authorization.
Table 3. List of frequency bands available in Taiwan by MNO.
Table 3. List of frequency bands available in Taiwan by MNO.
Band/MNON1N3N28N41N78
Chunghwa Telecom
Taiwan Mobile
Far East Tone
T-Star Telecom
Asia Pacific Telecom
Table 4. 5G parameters for radio simulation.
Table 4. 5G parameters for radio simulation.
ParametersValue
Frequency bandN78
Operating frequency3500 MHz
Bandwidth100 MHz
BS antenna height5.3 m
Azimuth150°
Down-tilt35°
BS transmit power40 dBm
Receiver height1.5 m
Receiver power23 dBm
Table 5. Test environment material parameters.
Table 5. Test environment material parameters.
MaterialSize (mm)Transmission Loss (dB)Reflection Loss (dB)
Concrete30028.957.51
Brick30020.119.52
Wood1506.1811.43
Metal5750.20.05
Glass51.727.53
Table 6. Simulation values in WinProp.
Table 6. Simulation values in WinProp.
XYdBm
30,945.2694874.697−48.047
30,946.2694874.697−48.079
30,947.2694874.697−48.811
30,948.2694874.697−50.194
[…][…][…]
Table 7. Wireshark supported protocols.
Table 7. Wireshark supported protocols.
TCP/IPProtocol
ApplicationHTTP, MQTT, Telnet
TransportTCP, UDP
NetworkIPv4, IPv6
Network interfaceEthernet, 802.11 b/g/n (Wi-Fi), LTE
Table 8. Docker-Ubuntu extra modules for data transmission and encryption.
Table 8. Docker-Ubuntu extra modules for data transmission and encryption.
ModuleVersionDescription
socket3.8.13TCP socket
pycryptodome3.14.1AES
tqdm4.30.0Progress bar
Table 9. List of network components.
Table 9. List of network components.
TechnologyVirtual EquipmentPhysical EquipmentReference Name
NFVDocker-Ubuntu5G UEUbuntu-DockerGuest-1
NFV, RANEthernet SwitchEricsson 5G Small Cell5G AP
NFVEthernet SwitchCisco 2959XL2_Switch
NFVFortiGate 6.45FortiGate 81EFortiGate6.4.5-1
NFVEthernet SwitchCisco 3850L3_Switch
NFVDocker-UbuntuServerUbuntu-DockerGuest-2
Table 10. Size comparison between encrypted and non-encrypted data packages.
Table 10. Size comparison between encrypted and non-encrypted data packages.
Data PackageSize (kB)
Non-encrypted32.7
Encrypted43.7
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ramirez, R.; Huang, C.-Y.; Liang, S.-H. 5G Digital Twin: A Study of Enabling Technologies. Appl. Sci. 2022, 12, 7794. https://doi.org/10.3390/app12157794

AMA Style

Ramirez R, Huang C-Y, Liang S-H. 5G Digital Twin: A Study of Enabling Technologies. Applied Sciences. 2022; 12(15):7794. https://doi.org/10.3390/app12157794

Chicago/Turabian Style

Ramirez, Ramiro, Chien-Yi Huang, and Shu-Hao Liang. 2022. "5G Digital Twin: A Study of Enabling Technologies" Applied Sciences 12, no. 15: 7794. https://doi.org/10.3390/app12157794

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop