Machine Learning-Based Network Sub-Slicing Framework in a Sustainable 5G Environment
Abstract
:1. Introduction
- We propose the Machine Learning-based Network Sub-slicing Framework in a sustainable 5G environment where the SVM algorithm is used for feature selection based on IoT devices. The K-Means algorithm is utilized to assign the group based on similar types of application services, such as application-based, platform-based, and infrastructure-based services.
- Network Sub-slicing and related studies are described in detail to mitigate the problems of resource allocation in a sustainable 5G environment of the network. The key requirements and security threats for a Network Sub-slicing framework are identified to achieve the optimum allocation of resources or services.
- We present an overview and the detailed methodology of the proposed Machine Learning-based Network Sub-slicing Framework for enabling the efficient, optimal usage of network resources.
- Finally, we conduct an evaluation and an experimental analysis to demonstrate the effectiveness of the proposed network sub-slicing framework compared to existing research.
2. Related Work
2.1. Seminal Contributions
2.2. Key Considerations for 5G Network Sub-Slicing
- Latency: This is one of the Network Slicing concepts used in 5G for utilizing IoT applications such as smart parking, smart roads, and smart manufacturing. One network slice is sufficient to handle one IoT application. However, as one application is not a small part of one network slice, service latency will be high in one IoT application for 5G Networks. This then is the main consideration in the sustainable 5G network environment for IoT applications. To mitigate this problem, we used the concept of network sub-slicing in 5G. We show the evaluation of the latency graph with the number of services and running time parameters and compare them to the existing framework of research.
- Load balancing: Load balancing entails efficiently distributing incoming network traffic across a group of backend servers, also known as a server pool. By spreading the work evenly, load balancing improves the availability of applications. It is also the main consideration here because one network slice cannot handle the load of one IoT application, in a sustainable 5G environment. In the virtualized environment of 5G networks, the control and management of various applications such as smart healthcare and smart vehicles are handled by dynamic network slices. Therefore, load balancing is an issue in network slices. Nonetheless, these applications have multiple network services (application-based, infrastructure-based, and platform-based) that cannot be managed by one network slice, including load balancing issues. Thus, we divided one network slice into various network sub-slices. These network sub-slice mechanisms provide a particular service to IoT applications through the decentralized setting of point of presence (PoP). Each PoP has knowledge of the aggregate workload generated by the slice and users accessing it.
- Heterogeneity: 5G wireless network applications generate high demand for data rates to utilize all IoT applications. Thus, every network is divided into various network slices according to the requirements for IoT applications. It is called a “heterogeneous network”. Still, all network slices are unable to handle all the needs of a particular IoT application. Thus, the IoT application features are divided into subparts according to services such as application-based, infrastructure-based, and platform-based services. For example, if we have one IoT application for smart healthcare, it has various features such as IP address, types of networks, types of protocols, and the number of packets for sending data, among others. These features are classified according to application-based, infrastructure-based, and platform-based services.
- Power efficiency: Power efficiency refers to the ratio of power divided into the input power according to the requirement. Advanced IoT applications have dynamic bandwidth requirements. Thus, the proposed framework allocates the spectrum based on the varying demands of the process of application services such as application-based (ABS), platform-based (PBS), and infrastructure-based services (IBS) (Amazon web services, Google App Services, DropBox, and others). These services may be software-based or hardware-based. A sustainable 5G environment is then provided for advanced applications with the help of network sub-slicing. Power efficiency is a major requirement for both network service providers and end users. The higher data rate consumption in 5G networks results in faster battery consumption for users and higher operating costs for service providers; hence the need for energy-efficient solutions. The input power to measure is in Mbps/W, where W stands for Watt, and describes the relationship between the energy consumed and the bandwidth of data transmitted.
3. Proposed Network Sub-Slicing Framework in a Sustainable 5G Environment
3.1. Design Overview of the Proposed Network Sub-Slicing Framework
3.2. Functional Component of the Proposed Network Sub-Slicing Framework
- (1)
- Feature selection, which defines how to select the features according to the services of smart applications in the IoT with a sustainable 5G environment through the SVM algorithm.
- (2)
- Feature clustering or scaling, which creates a cluster with the help of the K-means Algorithm and assigns the group based on similar types of application services, such as the application-based, platform-based, and infrastructure-based services (Software applications, cloud computing services, and cloud-based infrastructure resources) of IoT devices.
- (3)
- Access and Core networks, which are used to provide essential functions such as computing of storage, processing, and storage resources, data forwarding, and others.
Algorithm 1. Support Vector Machine |
Enter the features of training sample IoT devices, such as IP address, network type, packet size, cloud computing services, and cloud-based infrastructure resource features , with the output-ordered device set defined as B. |
Input: The training feature samples set , Class label samples b The feature rank list order set B = Ø. |
Output: Projected IoT devices with feature select and weight vector , which is the form of the essential subspace. |
Process: |
1: Subset of surviving features and feature rank list B = Ø. |
2: Feature Sorting repeat until = Ø |
3: Restrict training examples to good feature indices: |
4: Train the classifier: |
5: Compute the weight vector to dimension length(s): |
6: Calculate the device ranking with a criteria score value |
7: Find the features such as bandwidth, weight with the smallest IoT device ranking criteria: |
8: Update the feature set by using the union formula |
/* |
9: Destroy this feature with the smallest ranking criteria B such that |
Algorithm 2. K-means |
K is the number of groups (clusters) belonging to the same data points or services, such as software applications, cloud computing, and cloud-based infrastructure resources. |
Input: Unordered feature sets are available in IoT devices. Unlabeled data sets are , Selected distinct input randomly ., K is the number of clusters, which has the same data point. |
Output: Cluster data centers are and assignment of the data points are {}, randomly initiate with {}. |
Process: |
1: Do |
2: for all m = 1 to M do |
3: for all k = 1 to K do |
4: if Assign cluster membership |
5: then /* is set of binary indicator variables |
6: else |
7: end |
8: end |
9: for all k = 1 to K do |
10: and the average |
11: end of all points assigned to that cluster. |
while convergence change the value |
12: Return and |
13: end procedure |
4. Experimental Evaluation of the Proposed Network Sub-Slicing Framework
4.1. Evaluation
4.2. Comparative Analysis
- Heterogeneity: We compared the proposed framework with other methods based on their ability to allocate network slice resources to the application’s sub-modules. It compares sub-modules such as software applications, cloud computing services, and cloud-based infrastructure resources with traditional research. Various sub-modules have diverse requirements and different needs from the network. A model capable of addressing the issue of heterogeneous conditions while allocating resources to applications would provide the optimal environment for the system to function.
- Proposed framework: Our model first implements a Machine Learning-based Support Vector Machine algorithm to identify the features of different sub-applications. An application such as Healthcare is a broad application with various sub-modules having different needs from other modules. Upon identification of the different features of the modules, we applied the k-means algorithm and cluster common requirements to one group. Groups that require low latency such as medial sensors are grouped in one cluster, and groups requiring high reliability, such as network administrators are arranged as one group. Using the access and core network features of 5G, we further sliced the network and distributed it to each application’s sub-module to enhance reliability and efficiency.
- RL-NSB Slice Broker: The Reinforcement Learning-based 5G Network Slice Broker implements traffic forecasting using the Holt–Winter (HW) forecasting method. The HW method is used to predict the network slice’s traffic based on the historical data of a user’s requirement and mobility pattern. Sciancalepore et al. [18] proposed a method that allocates resources based on the needs of different users. Nonetheless, modern applications consist of various sub-modules with heterogeneous sensor devices. The network slice cannot provide optimized services to the whole application functioning on a single allocated network slice.
- Hierarchical cognitive engine: Hao et al. [20] proposed a hierarchical cognitive engine (HCE) architecture in order to realize data-driven resource management in 5G networks. The primary aim of their research is to allocate resources to wearable devices based on their requirements. A fitness tracker requires fewer communication resources, whereas AR and VR services have a greater need for communication resources. Their research was focused on providing optimized resources for different heterogeneous devices.
- POSENS: Garcia-Aviles et al. [19] proposed an end-to-end network slicing solution for mobile networks. Their research and experimental results were focused on providing isolation for the assigned network slice as well as the ability to offer customized network slices. The POSENS tool offers customizable slices of the network. Still, there is no provision to divide further the slice resource based on different needs. As such, it does not serve the requirements of diverse heterogeneous devices.
- Latency: Latency is a result of the network slice being unable to provide the optimum conditions of data transmission for the devices grouped in the sub-modules [32]. This delay renders the devices unable to connect to their server and provide valuable data in a timely manner. High latency causes the network to malfunction or deliver erroneous feedback. We compared our framework with the existing research literature.
- Proposed framework: We are providing division of each slice into sub-slices, which is based on the customized needs of the individual requirements of each sub-module or application. By learning the features of different application sub-modules using SVM and grouping them using k-means, we accurately allocated resources based on their network requirements. Clusters that require low latency in data transmission allocate a sub-slice that fulfills the service level agreement according to those exact requirements.
- RL-NSB Slice Broker: The Reinforcement Learning-based slice brokering mechanism allocates resources based on an application’s requirements. Every sub-module in the application is assigned the same common network slice configuration as the parent application. Nonetheless, not every sub-module has the same requirements as the parent application, which identifies the broader needs. The RL-NSB proposed model does not optimally address the network needs of each application-based sub-module.
- Hierarchical cognitive engine: The proposed HCE architecture implements a data-driven resource management scheme for wearable devices. The cognitive engine analyzes the service features and then uses the cognitive resource engine to monitor the resource consumption of each device. The global cognitive engine allocates resources according to the individual device’s needs. Wearables for AR and VR are allocated resources based on their requirements, which helps reduce latency for applications requiring low latency-based solutions.
- POSENS: As an end-to-end tool for network slicing based on user/application requirements, POSENS can provide low latency solutions for applications when needed. However, the requirements of each application sub-module are different. While one sub-module requires low latency in data transmission to the server, others may place greater emphasis on spectral efficiency. POSENS does not have a solution based on the separate allocation of resources that serve varying requirements and broad application needs. A standard network slice may serve one sub-module better, but it is not optimized for other sub-modules.
- Load balancing: The deployment of multiple modules of applications has an impact on the performance of the network slice. Each sub-module of an application requires a customizable sub-slice to work in optimized conditions [33,34,35,36,37]. We compared our proposed framework with other methods to assess which exerted the lowest load on the network when operating multiple sub-modules.
- Proposed framework: Our model has a separate network sub-slice using machine learning. We divided the finite network resources according to the differing requirements of each sub-module of an application. This step leads to an optimized approach to allocating resources, such as when a sub-module requires low latency. Another sub-module required high reliability to handle the vast deployment of sensor devices. Our proposed model was shown to prevent network slice congestion by dividing network resources further into sub-slices based on their requirements.
- RL-NSB Slice Broker: The Reinforcement learning network slice broker broadly addresses the problem of load balancing by allocating resources according to the broad application requirements; nonetheless, it does not address the requirements of each module based on an application’s dynamic needs. The slice traffic forecasting feature presented in the RL-NSB method determines the future patterns of network usage and manages load balancing according to future requirements; but, as an application within itself has varying needs, there is no solution to the problem to optimal load balancing as yet.
- Hierarchical cognitive engine: The HCE architecture manages load balancing based on the alternating needs of the user’s wearable devices. It analyzes the service features and their usage patterns and utilizes service-based resource allocation. The allocation of resources is achieved to enable optimal use of the network resources. Nonetheless, different users have alternating needs, and this method does not address how a single parent slice can address a broad set of users whose network needs differ.
- POSENS: The proposed POSENS tool is designed to provide customizable network slices based on user requirements. It targets individual network slices for all users or applications and divides the network accordingly. Load balancing is achieved at the broad level of network slicing, and there is no provision to allocate resources optimally for the needs of the individual application’s module.
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Arfaoui, G.; Bisson, P.; Blom, R.; Borgaonkar, R.; Englund, H.; Félix, E.; Papay, J. A security architecture for 5G networks. IEEE Access 2018, 6, 22466–22479. [Google Scholar] [CrossRef]
- How 5G Help Fuel the Next Generation of IoT Projects. Available online: https://www.iotworldtoday.com/2019/03/18/how-5g-could-help-fuel-the-next-generation-of-iot-projects/ (accessed on 20 March 2019).
- Alqarni, M.A.; Chauhdary, S.H.; Malik, M.N.; Ehatisham-ul-Haq, M.; Azam, M.A. Identifying smartphone users based on how they interact with their phones. Hum. Cent. Comput. Inf. Sci. 2020, 10, 1–14. [Google Scholar] [CrossRef] [Green Version]
- Afolabi, I.; Taleb, T.; Samdanis, K.; Ksentini, A.; Flinck, H. Network slicing and softwarization: A survey on principles, enabling technologies, and solutions. IEEE Commun. Surv. Tutor. 2018, 20, 2429–2453. [Google Scholar] [CrossRef]
- Zhang, H.; Liu, N.; Chu, X.; Long, K.; Aghvami, A.H.; Leung, V.C. Network slicing based 5G and future mobile networks: Mobility, resource management, and challenges. IEEE Commun. Mag. 2017, 55, 138–145. [Google Scholar] [CrossRef]
- Danial, S.N.; Smith, J.; Veitch, B.; Khan, F. On the realization of the recognition-primed decision model for artificial agents. Hum. Cent. Comput. Inf. Sci. 2019, 9, 36. [Google Scholar] [CrossRef] [Green Version]
- Kotulski, Z.; Nowak, T.W.; Sepczuk, M.; Tunia, M.; Artych, R.; Bocianiak, K.; Osko, T.; Wary, J.P. Towards constructive approach to end-to-end slice isolation in 5G networks. Eurasip J. Inf. Secur. 2018, 1, 2. [Google Scholar] [CrossRef] [Green Version]
- Li, S.; Da Xu, L.; Zhao, S. 5G Internet of Things: A survey. J. Ind. Inf. Integr. 2018, 10, 1–9. [Google Scholar] [CrossRef]
- Mamolar, A.S.; Pervez, Z.; Calero, J.M.A.; Khattak, A.M. Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks. Comput. Secur. 2018, 79, 132–147. [Google Scholar] [CrossRef] [Green Version]
- Chekired, D.A.; Togou, M.A.; Khoukhi, L.; Ksentini, A. 5G-Slicing-Enabled Scalable SDN Core Network: Toward an Ultra-Low Latency of Autonomous Driving Service. IEEE J. Sel. Areas Commun. 2019, 37, 1769–1782. [Google Scholar] [CrossRef]
- Shurman, M.; Taqieddin, E.; Oudat, O.; Al-Qurran, R.; Al Nounou, A.A. Performance Enhancement in 5G Cellular Networks Using Priorities in Network Slicing. In Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), IEEE, Amman, Jordan, 9–11 April 2019; pp. 822–826. [Google Scholar] [CrossRef]
- Gupta, R.; Tanwar, S.; Tyagi, S.; Kumar, N. Machine learning models for secure data analytics: A taxonomy and threat model. Comput. Commun. 2020, 153, 406–440. [Google Scholar] [CrossRef]
- Perez, A.J.; Zeadally, S.; Jabeur, N. Security and Privacy in Ubiquitous Sensor Networks. J. Inf. Process. Syst. 2018, 14, 286–308. [Google Scholar] [CrossRef]
- Tkachenko, R.; Izonin, I.; Kryvinska, N.; Dronyuk, I.; Zub, K. An Approach towards Increasing Prediction Accuracy for the Recovery of Missing IoT Data based on the GRNN-SGTM Ensemble. Sensors 2020, 20, 2625. [Google Scholar] [CrossRef] [PubMed]
- Singh, S.K.; Rathore, S.; Park, J.H. BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence. Future Gener. Comput. Syst. 2019, 110, 721–743. [Google Scholar] [CrossRef]
- Beshley, M.; Kryvinska, N.; Seliuchenko, M.; Beshley, H.; Shakshuki, E.M.; Yasar, A.-U.-H. End-to-End QoS “Smart Queue” Management Algorithms and Traffic Prioritization Mechanisms for Narrow-Band Internet of Things Services in 4G/5G Networks. Sensors 2020, 20, 2324. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Nour, B.; Ksentini, A.; Herbaut, N.; Frangoudis, P.A.; Moungla, H. A Blockchain-Based Network Slice Broker for 5G Services. IEEE Netw. Lett. 2019, 1, 99–102. [Google Scholar] [CrossRef] [Green Version]
- Sciancalepore, V.; Costa-Perez, X.; Banchs, A. RL-NSB: Reinforcement Learning-Based 5G Network Slice Broker. IEEE ACM Trans. Netw. 2019, 27, 1543–1557. [Google Scholar] [CrossRef] [Green Version]
- Garcia-Aviles, G.; Gramaglia, M.; Serrano, P.; Banchs, A. POSENS: A practical open source solution for end-to-end network slicing. IEEE Wirel. Commun. 2018, 25, 30–37. [Google Scholar] [CrossRef] [Green Version]
- Hao, Y.; Jiang, Y.; Hossain, M.S.; Ghoneim, A.; Yang, J.; Humar, I. Data-driven Resource Management in a 5G Wearable Network using Network Slicing Technology. IEEE Sens. J. 2018, 19, 8379–8386. [Google Scholar] [CrossRef]
- Dighriri, M.; Alfoudi, A.S.D.; Lee, G.M.; Baker, T.; Pereira, R. Resource allocation scheme in 5G network slices. In Proceedings of the 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), Krakow, Poland, 16–18 May 2018; pp. 275–280. [Google Scholar] [CrossRef]
- Kasgari, A.T.Z.; Saad, W. Stochastic optimization and control framework for 5G network slicing with effective isolation. In Proceedings of the 52nd Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 21–23 March 2018; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Bega, D.; Gramaglia, M.; Fiore, M.; Banchs, A.; Costa-Perez, X. DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 280–288. [Google Scholar] [CrossRef] [Green Version]
- Abbas, M.T.; Khan, T.A.; Mahmood, A.; Rivera, J.J.D.; Song, W.C. Introducing network slice management inside m-cord-based-5g framework. In Proceedings of the NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–2. [Google Scholar] [CrossRef]
- Kafle, V.P.; Fukushima, Y.; Martinez-Julia, P.; Miyazawa, T. Consideration on automation of 5G network slicing with machine learning. In Proceedings of the 2018 ITU Kaleidoscope: Machine Learning for a 5G Future (ITU K), Santa Fe, Argentina, 26–28 November 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Le, L.V.; Lin, B.S.P.; Tung, L.P.; Sinh, D. SDN/NFV, Machine Learning, and Big Data Driven Network Slicing for 5G. In Proceedings of the 2018 IEEE 5G World Forum (5GWF), Silicon Valley, CA, USA, 9–11 July 2018; pp. 20–25. [Google Scholar] [CrossRef]
- Kuang, F.; Zhang, S.; Jin, Z.; Xu, W. A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Comput. 2015, 19, 1187–1199. [Google Scholar] [CrossRef]
- Tang, Z.; Liu, K.; Xiao, J.; Yang, L.; Xiao, Z. A parallel k-means clustering algorithm based on redundance elimination and extreme points optimization employing MapReduce. Concurr. Comput. Pract. Exp. 2017, 29, e4109. [Google Scholar] [CrossRef]
- Kuang, F.; Xu, W.; Zhang, S. A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 2014, 18, 178–184. [Google Scholar] [CrossRef]
- Singh, S.K.; Jeong, Y.S.; Park, J.H. A Deep Learning-based IoT-oriented Infrastructure for Secure Smart City. Sustain. Cities Soc. 2020, 102252. [Google Scholar] [CrossRef]
- Lee, D.; Park, J.H. Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions. J. Inf. Process. Syst. 2019, 15, 717–723. [Google Scholar] [CrossRef]
- Rathore, S.; Park, J.H. Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 2018, 72, 79–89. [Google Scholar] [CrossRef]
- Singh, S.K.; Salim, M.M.; Cho, M.; Cha, J.; Pan, Y.; Park, J.H. Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks. Symmetry 2019, 11, 941. [Google Scholar] [CrossRef] [Green Version]
- Chauhan, K.; Jani, S.; Thakkar, D.; Dave, R.; Bhatia, J.; Tanwar, S.; Obaidat, M.S. Automated Machine Learning: The New Wave of Machine Learning. In Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), IEEE, Bangalore, India, 5–7 March 2020; pp. 205–212. [Google Scholar] [CrossRef]
- Yin, C.; Ding, S.; Wang, J. Mobile marketing recommendation method based on user location feedback. Hum. Cent. Comput. Inf. Sci. 2019, 9, 14. [Google Scholar] [CrossRef] [Green Version]
- Liu, M.; Cheng, L.; Qian, K.; Wang, J.; Wang, J.; Liu, Y. Indoor acoustic localization: A survey. Hum. Cent. Comput. Inf. Sci. 2020, 10, 2. [Google Scholar] [CrossRef]
- Wang, J.; Gu, X.; Liu, W.; Sangaiah, A.K.; Kim, H.J. An empower hamilton loop based data collection algorithm with mobile agent for WSNs. Hum. Cent. Comput. Inf. Sci. 2019, 9, 1–4. [Google Scholar] [CrossRef]
S.no. | Equipment Name/Tools/Technology | Description |
---|---|---|
1. | ICN (Information-Centric Network) | This addresses the Internet’s network architectural design gaps based on evolving application requirements. |
2. | TelcosRely | This provides a virtual platform like VMware; used for low-level computing resources. |
3. | TM500 | This provides a potential solution for 5G network slicing test challenges that can validate the network performance for end-users. |
4. | Android Mobile Devices | These are the end nodes on which IoT applications run in a sustainable 5G environment. |
5. | Microsoft Azure Cloud | Linked to cloud services |
6. | Wireless Access Point | A network hub that provides connectivity between IoT devices |
7. | OpenStack or Azure Stack | This provides the cloud platform for the 5G environment in IoT applications; used for reset chunks of cloud capacity to commercial clients |
8. | MPS (Multimedia Priority Service) | This supports priority sessions on end-to-end network services. |
9. | Npm | JavaScript’s Node Package Manager |
10. | Web3 API | JavaScript API |
11. | Extensive Datacenter | For additional sources of revenue besides voice telephony, video value. |
12. | 3GPP | It has recognized network slicing to be an essential component of 5G. |
13. | TeraVM | A software-based tool for 5G application emulation and security. |
S.no. | Distribution Data According to a Requirement | Value | S.no. | Distribution Data According to a Requirement | Value |
---|---|---|---|---|---|
1. | No. of MNOs | 3 | 5. | No. of measurements | 458,630 |
2. | No. of districts | 942 | 6. | Average speed of Downlink | 42.760 Mbps |
3. | No. of cities | 80 | 7. | Average speed of Uplink | 17.890 Mbps |
4. | Duration | 18 months | 8. | No. of Items of Test User Equipment | 117,050 |
Methods | Factors | Slicing Mechanism | Key Technology | Need for Data Source | |||
---|---|---|---|---|---|---|---|
Heterogeneity | Latency | Load Balancing | RAN | End-to-End | |||
Proposed network sub-slicing framework | Using the SVM and K-means algorithm, sub-slicing is achieved for sub-modules with services. | Clusters that require low latency allocate a sub-slice to fulfill the SLA. | It prevents network slice congestion by further dividing network resources into sub-slices based on their requirements. | Yes | Yes | Machine Learning, IoT, 5G | High |
RL-NSB | The proposed method allocates resources for a single network slice. It does not target sub-modules in the application. | The RL-NSB model does not address the low latency needs of sub-modules in applications. | The slice traffic forecasting feature manages load balancing for a single application but not its sub-modules individually. | Yes | No | Reinforcement Learning, 5G | Low |
Hierarchical cognitive engine | HCE provides optimized resources for different heterogeneous wearable devices. | The global cognitive engine does allocate resources according to the needs of each individual device. | HCE architecture manages load balancing based on the usage pattern of the user’s wearable devices. | No | Yes | Cognitive-based communication | Low |
POSENS | It provides customizable slices in the network. There is no provision to further divide the slice resource based on different module requirements. | POSENS does not resolve the separate allocation of resources that serve varying requirements and broad application needs. | Load balancing is achieved at the broad level of network slicing, but there is no provision to allocate resources optimally to meet the needs of the sub-modules. | No | Yes | Radio Access Networks | High |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Singh, S.K.; Salim, M.M.; Cha, J.; Pan, Y.; Park, J.H. Machine Learning-Based Network Sub-Slicing Framework in a Sustainable 5G Environment. Sustainability 2020, 12, 6250. https://doi.org/10.3390/su12156250
Singh SK, Salim MM, Cha J, Pan Y, Park JH. Machine Learning-Based Network Sub-Slicing Framework in a Sustainable 5G Environment. Sustainability. 2020; 12(15):6250. https://doi.org/10.3390/su12156250
Chicago/Turabian StyleSingh, Sushil Kumar, Mikail Mohammed Salim, Jeonghun Cha, Yi Pan, and Jong Hyuk Park. 2020. "Machine Learning-Based Network Sub-Slicing Framework in a Sustainable 5G Environment" Sustainability 12, no. 15: 6250. https://doi.org/10.3390/su12156250
APA StyleSingh, S. K., Salim, M. M., Cha, J., Pan, Y., & Park, J. H. (2020). Machine Learning-Based Network Sub-Slicing Framework in a Sustainable 5G Environment. Sustainability, 12(15), 6250. https://doi.org/10.3390/su12156250