Next Article in Journal
Deep Reinforcement Learning for UAV-Based SDWSN Data Collection
Previous Article in Journal
Predicting the Duration of Forest Fires Using Machine Learning Methods
Previous Article in Special Issue
Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units

1
Institute of Computer Science and Telecommunications, Peoples’ Friendship University of Russia Named after Patrice Lumumba (RUDN University), 6 Miklukho-Maklaya St, 117198 Moscow, Russia
2
Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, 44-2 Vavilov St, 119333 Moscow, Russia
*
Authors to whom correspondence should be addressed.
Future Internet 2024, 16(11), 397; https://doi.org/10.3390/fi16110397
Submission received: 24 August 2024 / Revised: 7 October 2024 / Accepted: 11 October 2024 / Published: 30 October 2024
(This article belongs to the Special Issue Performance and QoS Issues of 5G Wireless Networks and Beyond)

Abstract

:
Researchers of 5G-sliced Wireless Networks are faced with the task of achieving, at the same time, (i) mandatory isolation among network slices and (ii) the effective utilization of resource at Fifth Generation Base Station (gNB). This article proposes the second version of the Preemption-based service Prioritization (PP2) scheme that merges the capabilities of the classical Resource Reservation (RR) and Service Prioritization (SP) schemes and realizes the coexistence of non-TCP streaming and TCP elastic traffic at gNB. Analytical methods are given for Dynamic Resource Sharing (DRS) and Dynamic Resource Reallocation (DRR) with data rate reduction and service preemption. As main results, under some baseline scenario, the PP2 scheme, in comparison with RR, does increase the admission probability up to 99.999% at the system while ensuring 100% in system capacity utilization.

1. Introduction

Four years after the Network Slicing (NS) official launch alongside other technologies (by far not the least important creations for Fifth Generation Base Stations (gNBs) [1,2,3,4,5,6,7,8]), major advances in the wireless telecommunication industry have been achieved with NS at the core, harboring features such as the inherently flexible Resource Reservation (RR) and/or Service Prioritization (SP) access scheme [1,2,4,6,8,9,10,11,12,13,14]. Unfortunately, these schemes do not completely enable NS’s capabilities at the gNB: the RR proves especially inefficient during network outages, and the SP does not ensure NS’s utmost important property—the slices’ effective isolation. For the review, we refer the reader to [10].
The NS concept, standardized by Third Generation Partnership Project (3GPP) and implemented by Docomo and Ericsson, aims at efficient resource utilization while meeting the slices’ aggregated Quality of Service (QoS) requirements [1,3,4,5,6,7]. To achieve its goal, NS first needs to overcome the above-mentioned RR and SP inefficiencies. An obvious solution, and by far the simplest, seems to be to just interconnect the RR isolation capability and SP efficient resource utilization in a Preemption-based service Prioritization (PP) scheme, so-called by research [10]. The setback at this point is that the PP scheme performs the expected job exclusively among slices, with each slice providing customers with non-TCP streaming service at a gNB.
The current research aimed to develop the second version of the PP (PP2) scheme—an improvement or adaptation of the PP scheme in order to allow the simultaneous provision of non-TCP streaming and TCP elastic services at a gNB. Thus, the remainder of this paper is outlined as follows. First, the system model, together with the optimization problem and solution, is presented in Section 2. Next, the mathematical model is constructed, and the relevant system Key Performance Indicators (KPIs) are described in Section 3. Then, an accurate comparison of the PP2 scheme with the widely utilized RR is conducted in Section 4. Finally, this paper is concluded in Section 5.

2. System Model

Let us consider the coexistence of multiple slices at one Fifth Generation Base Station (gNB), each providing either non-TCP streaming or TCP elastic service (non-TCP streaming or TCP elastic slice) to customers (Figure 1). Thus, we consider a system model with a <<service-type-based slice>> [3,4,9]. We denote the following notation:
  • C , 0 < C < —the total system capacity;
  • K = 1 , , K —the finite set of slices in the system;
  • K s K , | K s | = K s —the subset of non-TCP streaming slices;
  • K e K , K s K e = , K s K e = K , | K e | = K e —the subset of TCP elastic slices;
  • C k , 0 < C k C , i = 1 K C i C , k K —the overall capacity of slice k;
  • Q k , 0 Q k C k , i = 1 K Q i C —the guaranteed capacity of slice k.
We note that the model is built at the top level of abstraction, without particular attention paid to the configuration details at the lower layers of the OSI/ISO model. Thus, we consider the bitrate (one bit per second) as the resource unit (r.u.) since the Quality of Service (QoS) requirements for services are primarily specified in terms of bitrate. From this point of view, the slice capacity is measured in r.u.
Let the customer flow at a slice k K be a Poisson flow with intensity λ k customers time units ( t . u . ) . We assume that a customer flow k s K s is characterized by the service time with intensity μ k s customers t . u . and constant data rate b k s r . u . customer , while a customer flow k e K e denotes an exponentially distributed random size of the transmitted data block with parameter μ k e 1 size units ( s . u . ) and minimum data rate b k e r . u . customer . Let us note that r.u. are expressed in s.u. per t.u. s . u . t . u . . Table 1 groups the characteristics of the flows in the system.
Let us denote the following:
  • D k = C b k 1 , 0 < D k < , k K —the maximum number of customers in slice k, given that equality C k = C holds;
  • M k = C k b k 1 , 0 < M k D k —the maximum number of customers in slice k;
  • N k = Q k b k 1 , 0 < N k M k —the guaranteed number of customers in slice k;
  • n k , 0 n k M k —the number of customers in slice k;
  • n : = n 1 , , n K T , n Ω —the gNB state, with the state space
    Ω = n N 0 K : k = 1 K n k b k C , z + = z , z > 0 ; 0 , z 0 ;
  • c k n , 0 c k n C k —the capacity share of slice k;
  • x k n = n k 1 c k n , n k > 0 —the data rate allocated to each customer in slice k (with this, we assume the uniform allocation of the capacity share of slice k).
According to [15], the state space Ω = Ω max Ω opt , where Ω max denotes the feasible states that all customers can be allocated the maximum data rates:
Ω max = n Ω : k s K s n k s b k s + k e K e n k e C k e C ;
and Ω opt = Ω Ω max denotes all other feasible states.
We note that two essential slicing features are illustrated in the states of Ω opt :
  • The total system capacity is occupied, which ensures that an r.u. is not idle if it can be used to provide services with the highest quality;
  • The optimization of r.u. utilization can be performed while ensuring slice isolation for guaranteed QoS.
We denote K v n K , n Ω as the subset of slices violating the mandatory isolation among the slices (slice violators) in an arbitrary system state n . Thus, a slice violator is a slice (non-TCP streaming or TCP elastic slice) that uses r.u. guaranteed to another slice (slice owner—also non-TCP streaming or TCP elastic slice) during time intervals when those r.u. are not required/claimed by the other slice due to a lack of customers.
We assume that the guaranteed capacity of a slice k o K (slice owner) could be utilized by slices violators k v K v n in arbitrary system state n . With this feature, QoS management and isolation among slices can be a problem in the system. Therefore, we propose an analytical solution method—the Dynamic Resource Reallocation (DRR). Through capacity share reduction, DRR can preempt customers’ service in slices violators k v , whenever required for a customer admission to slice owner k o . We assume that DRR starts its job from slice violator k v with the lowest Priority Level (PL) and keeps up until the required capacity is gathered [10,11]. To gather capacity shares of non-TCP streaming slices violators ( k v K s ), DRR utilizes service preemption [10], while for TCP elastic slices violators ( k v K e ), it does so after reducing the data rate allocated to each customer in TCP elastic slices violators k v down to the minimum [11,15]. The DRR method is analytically described in Definition 2.
A depiction of the considered K-dimensional Queueing System (QS) is given by the scheme model in Figure 1.
Let us assume that in arbitrary system state n Ω , K + n = k K : n k > 0 and K e + n = k e K e : n k e > 0 .
Note that each non-TCP streaming slice can be seen as ‘TCP elastic-friendly’ [16], meaning that the minimum data rate allocated to one customer equals the maximum, which makes it constant. Thus, following [11], we consider the next optimization problem with a utility function of the log type that was proposed by Kelly [17] for proportionally fair Dynamic Resource Sharing (DRS), which, in our case, coincides with max–min fairness ([18], pp. 111–204):
k K + n W k n k n k ln x k max ,
subject to k K + n x k n k = C ,
over x P = x = x 1 , , x K T : k K + n b k x k C k ,
where W k n k = 1 , n k N k ; n k 1 N k , n k > N k . , k K , denotes the weight functions [15].
We propose an analytical DRS solution method, allocating a data rate to each customer in the considered system.
Definition 1.
The DRS method is described by the following recursive sequence of numbers:
w k ( 0 ) n = n k b k , k K s , min n k b k , Q k , k K e , k = 1 , K ¯ ,
w k ( l ) n = w k ( l 1 ) n r k ( l 1 ) n , k K s , min C k , w k ( l 1 ) n + C i = 1 K w i ( l 1 ) n + r k ( l 1 ) n , k K e , l = 1 , K e + 1 ¯ ,
where
r k ( 0 ) n = 1 , k K s , n k I i = 1 K n i N i + = 0 j K e n j + n k N k + I i = 1 K n i N i + > 0 j K e n j N j + + , k K e ,
r k ( l ) n = 1 , k K s , n k j K e n j I C j w j ( l ) n > 0 + , k K e ,
given I event A = 1 , if A occurs , 0 , otherwise , , which is the indicator function. Let us denote the following:
  • c k n : = w k ( K e + 1 ) n —the capacity share of slice k in arbitrary system state n Ω ;
  • k = 1 K c k n = c 1 n + + c K n —the allocated capacity of the system;
  • C k = 1 K c k n —the unallocated capacity of the system.
Explanations for Definition 1 are given by the illustrations in Figure 2.
Let us denote e k , k K as the k-th row of a K × K identity matrix.
Given the above DRS method, we organize the Radio Admission Control (RAC) scheme in such a way that, upon a customer’s arrival at a slice k K in arbitrary system state n Ω , three paths are available:
  • Admission via preemption—when the data rate allocated to each customer in any of the TCP elastic slices will be less than the minimum, and the number of customers in the slice k is less than guaranteed.
  • Blocking (or rejection) in two cases:
    (a)
    When the data rate allocated to each customer in any of the TCP elastic slices will be less than the minimum, and the number of customers in the slice k will be more than that guaranteed.
    (b)
    When the number of customers in the slice k is equal to the maximum.
  • Direct admission (no preemption)—when the data rate allocated to each customer in each TCP elastic slice will be equal or more than the minimum, and the number of customers in the slice k is less than the maximum.
A depiction of the RAC scheme for accessing a slice k K is given in Figure 3.
Let us assume that in arbitrary system state n , K v n = k v K : n k v > N k v .
We analytically describe the DRR method governing the preemption for a customer admission to a slice owner k o K in arbitrary system state n Ω . We denote the following:
  • u k o k v n , k v K v n —the capacity share of slice violator k v to reallocate for a customer admission to slice owner k o ;
  • m k o k v n —the corresponding number of customers to preempt.
Definition 2.
The DRR method is based on the following sequence of numbers in arbitrary system state n Ω :
u k o K n = min c K n Q K + , δ k o n C + , k o K ,
u k o l n = min c l n Q l + , δ k o n j = l + 1 K u k o j n C + , l = K 1 , 1 ¯ ,
with δ k o n = j = 1 K c j n + b k o means that we require capacity b k o . Therefore, we obtain
m k o k n = n k c k n u k o k n b k + , k K .
Using the DRR method for a customer admission to a slice owner k o K in an arbitrary system state n Ω , one may note the following:
  • 0 u k o k v n C k v Q k v , 0 m k o k v n M k v N k v , k v K v n —the capacity share of slice violator k v to reallocate cannot exceed C k v Q k v , which means that the corresponding number of customers to preempt cannot exceed M k v N k v ;
  • 0 j = 1 K u k o j n b k o —the total capacity to reallocate cannot exceed the data rate b k o .
Explanations for Definition 2 are given by the illustrations in Figure 4.
Given the above-described RAC scheme and the analytical DRS and DRR methods as fundaments of the second version of the Preemption-based service Prioritization (PP2), we can move to the mathematical model construction in the next section.

3. Mathematical Model

According to the Radio Admission Control (RAC) scheme given in Section 2 and considering the Poisson flows of customers, the system behavior can be described by the K-dimensional Markov process X t = X 1 t , , X K t , t > 0 T , where X k t , k K , is the number of customers in slice k at time t over the system state space
S = n Ω : k e K e + n x k e n b k e , k = 1 K n k M k + = 0 , k = 1 K c k n C .
We note that system state space S contains several subspaces ([19], pp. 66–100), ([20], pp. 2–14). For a slice k K , we denote the following:
  • S k ( 1 ) —the state subspace for a direct admission (no preemption) of a customer;
  • S k ( 2 ) —the state subspace for an admission via preemption;
  • S ¯ k —the state subspace for blocking (or rejection):
    S k ( 1 ) = n S : k e K e + n + e k x k e n + e k b k e , n k < M k ,
    S k ( 2 ) = n S : k e K e + n + e k x k e n + e k < b k e , n k < N k ,
    S ¯ k = n S : k e K e + n + e k x k e n + e k < b k e , n k + 1 > N k n k = M k ,
    S = S k ( 1 ) S k ( 2 ) S ¯ k .
Given the above-defined state space S and its subspaces, the RAC function for the customers flow k K can be described as f k n = 1 , n S k ( 1 ) S k ( 2 ) , 0 , otherwise ( n S ¯ k ) , , n S .
Let m k n : = m k 1 n , , m k K n T , k K , n S .
A depiction of the system state transition diagram between n S and all its neighbors n + e k , n e k , n + e k m k n , n e k + m k n is provided in Figure 5.
Let p T : = p n n S denote the stationary probability distribution of the Markov process X t , with p n , n S , denoting the stationary probability that the system is in state n . We can describe p T using a system of equilibrium equations:
p n k = 1 K n k μ k I k K s + x k n I k K e + k = 1 K λ k I n S k ( 1 ) + k = 1 K λ k I n S k ( 2 ) = = k = 1 K p n e k λ k I n e k S k ( 1 ) + k = 1 K p n e k + m k n λ k I n e k + m k n S k ( 2 ) + + k = 1 K p n + e k n k + 1 μ k I k K s + x k n + e k I k K e I n S k ( 1 ) ,
with the intrinsic normalization condition n S p n = 1 .
Due to the implementation of the Dynamic Resource Reallocation (DRR) method with service preemption, the Markov process X t is not reversible. Therefore, we can numerically compute the stationary probability distribution p T using an iterative method ([21], pp. 103–204) ([22], pp. 106–179) [23,24,25] to solve Equation (18) rewritten as p T A = 0 T , p T 1 = 1 , where A = a n , s n , s S is the infinitesimal matrix (the matrix of transition intensities):
a n , s = λ k , s = n + e k , n S k ( 1 ) , k = 1 , K ¯ , λ k , s = n + e k m k n , n S k ( 2 ) , k = 1 , K ¯ , n k μ k I k K s + x k n I k K e , s = n e k , k = 1 , K ¯ , k = 1 K λ k I n S k ( 1 ) k = 1 K λ k I n S k ( 2 ) k = 1 K n k μ k I k K s + x k n I k K e , s = n , 0 , otherwise .
Once the stationary probability distribution p T is obtained, one can compute the system Key Performance Indicators (KPIs) using expressions in analytic form. We analyze the system functioning in terms of the utilization and accessibility KPIs [3]. Let us denote the following:
  • N k , k K —the mean number of customers in slice k;
  • N —the mean number of customers in the system;
  • P k —the admission probability at slice k (the probability of an event S k ( 1 ) S k ( 2 ) );
  • P —the admission probability at the system;
  • ϕ Q k —the guaranteed capacity utilization in slice k;
  • ϕ b k e , k e K e —the minimum data rate utilization in TCP elastic slice k e ;
  • ϕ C —the total system capacity utilization:
    N k = n S p n n k , k K ,
    N = n S p n k = 1 K n k = k = 1 K N k ,
    P k = n S k ( 1 ) S k ( 2 ) p n = n S S ¯ k p n ,
    P = n S k = 1 K S ¯ k p n ,
    ϕ Q k = 1 Q k n S p n c k n ,
    ϕ b k e = 1 b k e n S p n x k e n , k e K e ,
    ϕ C = 1 C n S p n k = 1 K c k n .
Once the KPI are computed, one can move to their analysis in the next section.

4. Numerical Analysis

In this section, we provide a comparative analysis of the model developed in Section 2 and Section 3, which is the second version of the Preemption-based service Prioritization (PP2) scheme, versus the Resource Reservation (RR) [10]. We use the expression Δ : = KPI PP 2 KPI RR KPI RR × 100 % to denote the relative gain or loss in terms of a given KPI.
Let us consider a case example of three slices coexisting in a system ( K = 3 ). Let C = 100 resource units (r.u.). For simplicity, we assume C k , Q k , b k , k = 1 , 2 , 3 , are expressed in percentages of number C [26,27]. Let us regroup the input parameters in Table 2.
As one can guess from Table 2, we compared the classical RR scheme (Complete Partitioning, where C k = Q k , k = 1 , 2 , 3 , with C 1 + C 2 + C 3 = 100 % of C ) [5,6,8] and the PP2 scheme with an overlap of 5% of C for each non-TCP streaming slice 1 , 2 and 45% of C for TCP elastic slice 3. The Priority Levels (PLs) were set as shown in the first column of Table 1 to make non-TCP streaming slices 1 , 2 gain the most from the Dynamic Resource Reallocation (DRR) method with data rate reduction (Definition 2). Note that the PLs are used only under PP2. The comparison results for the utilization and accessibility KPIs described in Equations (20)–(26) are depicted in Figure 6, Figure 7 and Figure 8.
The main results of the comparative analysis are summarized as follows. The PP2 scheme application under the baseline parameters in Table 2 shows several gains (✓) and one loss (✗) in terms of utilization and accessibility KPI:
  • ✓ The mean number of customers in non-TCP streaming slice 1 can increase up to 28% (Figure 6a);
  • ✓ The mean number of customers in non-TCP streaming slice 2 can increase up to 19.75% (Figure 6b);
  • ✓ The mean number of customers in TCP elastic slice 3 can decrease down to 40% (Figure 6c);
  • ✓ The mean number of customers in system can increase up to 9% (Figure 6d);
  • ✓ The admission probability of customers at non-TCP streaming slice 1 can increase up to 17.5% (Figure 7a);
  • ✓ The admission probability of customers at non-TCP streaming slice 2 can increase up to 15% (Figure 7b);
  • ✓ The admission probability of customers at TCP elastic slice 3 can increase up to 99.999% (Figure 7c);
  • ✓ The admission probability of customers at the system can increase up to 99.999% (Figure 7d);
  • ✓ The guaranteed capacity utilization in non-TCP streaming slice 1 can increase up to 28% (Figure 8a);
  • ✓ The guaranteed capacity utilization in non-TCP streaming slice 2 can increase up to 19.75% (Figure 8b);
  • ✗ The guaranteed capacity utilization in TCP elastic slice 3 can decrease down to 30% (Figure 8c);
  • ✓ The minimum data rate utilization in TCP elastic slice 3 can increase up to 52% (Figure 8d);
  • ✓ The total system capacity utilization can increase up to 13% (Figure 8e).
The obtained results are analyzed as follows. Under the PP2 scheme, non-TCP streaming slices 1 , 2 can service more customers than guaranteed—shown by the PP2 utilization curve above the horizontal unit in Figure 8a,b, which is corroborated by the PP2 curve above the RR curve in Figure 6a,b. This is due to the DRR method reducing (down toward the minimum data rate) the data rate of each customer in TCP elastic slice 3—shown by the PP2 utilization curve below the horizontal unit in Figure 8c. Even with this, as expected by allowing an overlap of 45% of C for TCP elastic slice 3 (Table 2), each of its customers can be allocated almost the double of the minimum data rate—shown by the PP2 utilization curve above the horizontal unit and above the RR utilization curve in Figure 8d, which leads to fast service—shown by the PP2 curve below the RR curve in Figure 6c. At last, the system capacity is constantly 100% utilized—shown by the PP2 utilization curve remaining at the horizontal unit in Figure 8e.

5. Conclusions

The current research developed the second version of the Preemption-based service Prioritization (PP2) scheme—an improvement of the previous PP [10]. Unlike PP, which optimizes resource utilization among slices, with each providing non-TCP streaming service (non-TCP streaming slice), PP2 realizes the same among slices, each providing either non-TCP streaming or TCP elastic service (TCP elastic slice). PP2 is based on analytically described Dynamic Resource Sharing (DRS) and Dynamic Resource Reallocation (DRR) methods—DRS ensures fair resource allocation, while DRR reduces the capacity share of the slices violating the mandatory isolation among the slices (slice violators). The main feature of PP2 is the mutual utilization of the guaranteed capacity of all slices. Given some baseline scenario, the comparison of PP2 versus the classical Resource Reservation (RR) shows (i) an increase up to 99.999% in the admission probability at the system and (ii) a constant system capacity utilization at 100%.
As a next research topic, one can consider the application of Service Prioritization (SP) schemes and Priority Levels (PLs) on all TCP elastic slices in system capacity utilization. As another interesting subject, one can research the benefits of introducing the maximum data rate of customers with less than the overall capacity into all TCP elastic slices.
In general, unlike the previous PP scheme, PP2 can be used at various levels in smart cities, farms, and buildings to efficiently manage or supply available water, energy, etc.

Author Contributions

Conceptualization, Y.A., E.M. and Y.G.; methodology, Y.A., E.M. and Y.G.; software, Y.A.; validation, Y.A.; formal analysis, Y.A.; investigation, Y.A.; resources, Y.A.; data curation, Y.A.; writing—original draft preparation, Y.A.; writing—review and editing, Y.A., E.M. and Y.G.; visualization, Y.A. and E.M.; supervision, Y.A., E.M. and Y.G.; project administration, Y.A., E.M. and Y.G.; funding acquisition, E.M. and Y.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Russian Science Foundation, project no. 22-79-10053 (https://rscf.ru/en/project/22-79-10053/, accessed on 24 August 2024) (recipient Markova, Section 2 and Section 3). This publication has been supported by the RUDN University Scientific Projects Grant System, project no. 021937-2-000 (recipient Gaidamaka, Section 1 and Section 4).

Data Availability Statement

The generated research data are publicly available from FigShare at https://doi.org/10.6084/m9.figshare.c.7404859.v1 (accessed on 10 October 2024).

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
3GPPThird Generation Partnership Project
DRRDynamic Resource Reallocation
DRSDynamic Resource Sharing
gNBFifth Generation Base Station
KPIKey Performance Indicator
NSNetwork Slicing
PLPriority Level
PPPreemption-based service Prioritization
PP2second version of the PP
QoSQuality of Service
r.u.resource units
RAC  Radio Admission Control
RRResource Reservation
s.u.size units
SPService Prioritization
t.u.time units

References

  1. Chandramouli, D.; Pope, M. 5G; System architecture for the 5G System (5GS) (3GPP TS 23.501 version 17.9.0 Release 17). Available online: https://www.etsi.org/deliver/etsi_ts/123500_123599/123501/17.09.00_60/ts_123501v170900p.pdf (accessed on 10 October 2024).
  2. Sultan, A.; Pope, M. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; Release 16 Description; Summary of Rel-16 Work Items (3GPP TR 21.916 version 16.2.0 Release 16). Available online: https://www.etsi.org/deliver/etsi_tr/121900_121999/121916/16.00.01_60/tr_121916v160001p.pdf (accessed on 10 October 2024).
  3. Sun, X.; Soveri, M.C. 5G; Management and orchestration; 5G end to end Key Performance Indicators (KPI) (3GPP TS 28.554 version 17.10.0 Release 17). Available online: https://www.etsi.org/deliver/etsi_ts/128500_128599/128554/17.10.00_60/ts_128554v171000p.pdf (accessed on 10 October 2024).
  4. Li, A.; Sultan, A. 5G; Service requirements for the 5G system (3GPP TS 22.261 version 17.11.0 Release 17). Available online: https://www.etsi.org/deliver/etsi_ts/122200_122299/122261/17.11.00_60/ts_122261v171100p.pdf (accessed on 10 October 2024).
  5. Vila, I.; Sallent, O.; Umbert, A.; Perez-Romero, J. An Analytical Model for Multi-Tenant Radio Access Networks Supporting Guaranteed Bit Rate Services. IEEE Access 2019, 7, 57651–57662. [Google Scholar] [CrossRef]
  6. Banchs, A.; de Veciana, G.; Sciancalepore, V.; Costa-Perez, X. Resource Allocation for Network Slicing in Mobile Networks. IEEE Access 2020, 8, 214696–214706. [Google Scholar] [CrossRef]
  7. Narmanlioglu, O.; Zeydan, E.; Arslan, S.S. Service-Aware Multi-Resource Allocation in Software-Defined Next Generation Cellular Networks. IEEE Access 2018, 6, 20348–20363. [Google Scholar] [CrossRef]
  8. Fu, X.; Shen, Q.; Wang, W.; Hou, H.; Gao, X. Slice Merging/Spliting Operations and Tenant Profit Optimization Across 5G Base Stations. IEEE Access 2021, 9, 9706–9718. [Google Scholar] [CrossRef]
  9. Zhou, X.; Kim, D. 5G; 5G System; Session Management Policy Control Service; Stage 3 (3GPP TS 29.512 version 17.11.0 Release 17). Available online: https://cdn.standards.iteh.ai/samples/68674/5f5cb7045e6c4dbcac881e022b0a43d2/ETSI-TS-129-512-V17-11-0-2023-07-.pdf (accessed on 10 October 2024).
  10. Adou, Y.; Markova, E.; Gaidamaka, Y. Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework. Future Internet 2022, 14, 299. [Google Scholar] [CrossRef]
  11. Yarkina, N.; Gaidamaka, Y.; Correia, L.M.; Samouylov, K. An analytical model for 5G network resource sharing with flexible SLA-oriented slice isolation. Mathematics 2020, 8, 1177. [Google Scholar] [CrossRef]
  12. Gonçalves, D.M.; Bittencourt, L.F.; Madeira, E.R. Overhead and Performance of Dynamic Network Slice Allocation for Mobile Users. Future Gener. Comput. Syst. 2024, 160, 739–751. [Google Scholar] [CrossRef]
  13. Camargo, J.S.; Coronado, E.; Ramirez, W.; Camps, D.; Deutsch, S.S.; Pérez-Romero, J.; Antonopoulos, A.; Trullols-Cruces, O.; Gonzalez-Diaz, S.; Otura, B.; et al. Dynamic slicing reconfiguration for virtualized 5G networks using ML forecasting of computing capacity. Comput. Netw. 2023, 236, 110001. [Google Scholar] [CrossRef]
  14. Khodapanah, B.; Awada, A.; Viering, I.; Francis, J.; Simsek, M.; Fettweis, G.P. Radio Resource Management in context of Network Slicing: What is Missing in Existing Mechanisms? In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–7. [Google Scholar] [CrossRef]
  15. Yarkina, N.; Correia, L.M.; Moltchanov, D.; Gaidamaka, Y.; Samouylov, K. Multi-tenant resource sharing with equitable-priority-based performance isolation of slices for 5G cellular systems. Comput. Commun. 2022, 188, 39–51. [Google Scholar] [CrossRef]
  16. Key, P.; Massoulié, L.; Bain, A.; Kelly, F. A network flow model for mixtures of file transfers and streaming traffic. In Teletraffic Science and Engineering; Elsevier: Amsterdam, The Netherlands, 2003; pp. 1021–1030. [Google Scholar] [CrossRef]
  17. Kelly, F. Charging and rate control for elastic traffic. Eur. Trans. Telecommun. 1997, 8, 33–37. [Google Scholar] [CrossRef]
  18. Bertsekas, D.P.; Gallager, R.G. Data Networks, 2nd ed.; Pearson: Upper Saddle River, NJ, USA, 1992; p. 576. [Google Scholar]
  19. Devlin, K. The Joy of Sets; Springer: New York, NY, USA, 1993; p. 194. [Google Scholar] [CrossRef]
  20. Bagaria, J. Set Theory. Available online: https://plato.stanford.edu/archives/spr2023/entries/set-theory/ (accessed on 24 August 2024).
  21. Bocharov, P.P.; D’Apice, C.; Pechinkin, A.V. Queueing Theory; De Gruyter: Berlin, Germany, 2003; p. 446. [Google Scholar] [CrossRef]
  22. Stepanov, S.N. Teoriya Teletrafika: Kontseptsii, Modeli, Prilozheniya (Teletraffic Theory: Concepts, Models, Applications); Goryachaya Liniya—Telekom: Moscow, Russia, 2015; p. 868. [Google Scholar]
  23. Basharin, G.P.; Gaidamaka, Y.V.; Samouylov, K.E. Mathematical theory of teletraffic and its application to the analysis of multiservice communication of next generation networks. Autom. Control Comput. Sci. 2013, 47, 62–69. [Google Scholar] [CrossRef]
  24. Basharin, G.P.; Tolmachev, A.L. Theory of queuing networks and its applications to the analysis of information-computing systems. J. Math. Sci. 1985, 29, 951–1050. [Google Scholar] [CrossRef]
  25. Basharin, G.P.; Samouylov, K.E.; Yarkina, N.V.; Gudkova, I.A. A new stage in mathematical teletraffic theory. Autom. Remote Control 2009, 70, 1954–1964. [Google Scholar] [CrossRef]
  26. Standaert, G.; Uitto, T. Nokia and Proximus Deliver 5G Network Slicing Innovation to Support Demanding Network Conditions. Available online: https://www.nokia.com/about-us/news/releases/2022/06/28/nokia-and-proximus-deliver-5g-network-slicing-innovation-to-support-demanding-network-conditions/ (accessed on 24 August 2024).
  27. Kynäslahti, A. Nokia and Google Trial Innovative Slicing Solution for Android Devices and 4G/5G Networks. Available online: https://www.nokia.com/about-us/news/releases/2022/08/25/nokia-and-google-trial-innovative-slicing-solution-for-android-devices-and-4g5g-networks/ (accessed on 24 August 2024).
Figure 1. K-dimensional QS with customer blocking and service preemption.
Figure 1. K-dimensional QS with customer blocking and service preemption.
Futureinternet 16 00397 g001
Figure 2. Explanations for Definition 1 (Dynamic Resource Sharing (DRS)). (a) Details about Equation (7); (b) Details about Equation (8); (c) Details about Equation (9).
Figure 2. Explanations for Definition 1 (Dynamic Resource Sharing (DRS)). (a) Details about Equation (7); (b) Details about Equation (8); (c) Details about Equation (9).
Futureinternet 16 00397 g002
Figure 3. Formalization of the rac scheme for accessing a slice k K in the system.
Figure 3. Formalization of the rac scheme for accessing a slice k K in the system.
Futureinternet 16 00397 g003
Figure 4. Explanations for Definition 2 (Dynamic Resource Reallocation (DRR)). (a) Details about Equations (10) and (11); (b) Details about Equation (12).
Figure 4. Explanations for Definition 2 (Dynamic Resource Reallocation (DRR)). (a) Details about Equations (10) and (11); (b) Details about Equation (12).
Futureinternet 16 00397 g004
Figure 5. State transition diagram between n S and its neighbors n ± e k , n ± e k ± m k n .
Figure 5. State transition diagram between n S and its neighbors n ± e k , n ± e k ± m k n .
Futureinternet 16 00397 g005
Figure 6. The numerical results of a case example of three slices in a system ( K = 3 ) for the mean number of customers vs. the offered load. (a) The mean number of customers in non-TCP streaming slice 1; (b) The mean number of customers in non-TCP streaming slice 2; (c) The mean number of customers in TCP elastic slice 3; (d) The mean number of customers in the system.
Figure 6. The numerical results of a case example of three slices in a system ( K = 3 ) for the mean number of customers vs. the offered load. (a) The mean number of customers in non-TCP streaming slice 1; (b) The mean number of customers in non-TCP streaming slice 2; (c) The mean number of customers in TCP elastic slice 3; (d) The mean number of customers in the system.
Futureinternet 16 00397 g006
Figure 7. The numerical results of a case example of three slices in a system ( K = 3 ) for the admission probability of customers vs. the offered load. (a) The admission probability of customers at non-TCP streaming slice 1; (b) The admission probability of customers at non-TCP streaming slice 2; (c) The admission probability of customers at TCP elastic slice 3; (d) The admission probability of customers at the system.
Figure 7. The numerical results of a case example of three slices in a system ( K = 3 ) for the admission probability of customers vs. the offered load. (a) The admission probability of customers at non-TCP streaming slice 1; (b) The admission probability of customers at non-TCP streaming slice 2; (c) The admission probability of customers at TCP elastic slice 3; (d) The admission probability of customers at the system.
Futureinternet 16 00397 g007
Figure 8. The numerical results of a case example of three slices in a system ( K = 3 ) for the capacity utilization vs. the offered load. (a) The guaranteed capacity utilization in non-TCP streaming slice 1; (b) The guaranteed capacity utilization in non-TCP streaming slice 2; (c) The guaranteed capacity utilization in TCP elastic slice 3; (d) The minimum data rate utilization in TCP elastic slice 3; (e) The total system capacity utilization.
Figure 8. The numerical results of a case example of three slices in a system ( K = 3 ) for the capacity utilization vs. the offered load. (a) The guaranteed capacity utilization in non-TCP streaming slice 1; (b) The guaranteed capacity utilization in non-TCP streaming slice 2; (c) The guaranteed capacity utilization in TCP elastic slice 3; (d) The minimum data rate utilization in TCP elastic slice 3; (e) The total system capacity utilization.
Futureinternet 16 00397 g008
Table 1. The characteristics of a customer flow k K .
Table 1. The characteristics of a customer flow k K .
Flow k λ k , 0 < λ k < μ k 1 , 0 < μ k 1 < b k , 0 < b k C k ρ k , 0 < ρ k <
k K s
(Streaming service)
Intensity of the
customers’ arrival
Mean service time
of one customer
Constant data rate
of one customer
Offered load
λ k μ k 1
k K e
(Elastic service)
Intensity of the
data blocks’ arrival
Mean size of
one data block
Minimum data rate
of one customer
Offered load
λ k μ k 1
Table 2. Input data for KPI analysis, given the uniform offered loads ρ k = ρ = 1 , 300 ¯ , k = 1 , 2 , 3 .
Table 2. Input data for KPI analysis, given the uniform offered loads ρ k = ρ = 1 , 300 ¯ , k = 1 , 2 , 3 .
Slice (Traffic)ParameterValue RR SchemeValue PP2 SchemeUnit
1, 2 (Streaming)  C 1 , Q 1 , b 1 , C 2 , Q 2 , b 2   35 , 35 , 4 , 35 , 35 , 3   40 , 35 , 4 , 40 , 35 , 3 % of C
  μ 1 , μ 2 , λ 1 , λ 2 60 , 30 , ρ μ 1 , ρ μ 2 customers/time units (t.u.)
3 (Elastic)  C 3 , Q 3 , b 3   30 , 30 , 5   75 , 30 , 5 % of C
  μ 3 1 10size units (s.u.)
  λ 3 ρ μ 1 customers/t.u.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Adou, Y.; Markova, E.; Gaidamaka, Y. Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units. Future Internet 2024, 16, 397. https://doi.org/10.3390/fi16110397

AMA Style

Adou Y, Markova E, Gaidamaka Y. Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units. Future Internet. 2024; 16(11):397. https://doi.org/10.3390/fi16110397

Chicago/Turabian Style

Adou, Yves, Ekaterina Markova, and Yuliya Gaidamaka. 2024. "Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units" Future Internet 16, no. 11: 397. https://doi.org/10.3390/fi16110397

APA Style

Adou, Y., Markova, E., & Gaidamaka, Y. (2024). Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units. Future Internet, 16(11), 397. https://doi.org/10.3390/fi16110397

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop