Next Article in Journal
Towards Reliable Baselines for Document-Level Sentiment Analysis in the Czech and Slovak Languages
Next Article in Special Issue
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
Previous Article in Journal
A Unified PUF and Crypto Core Exploiting the Metastability in Latches
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework

1
Applied Probability and Informatics Department, Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya Str., Moscow 117198, Russia
2
Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russia
*
Author to whom correspondence should be addressed.
Future Internet 2022, 14(10), 299; https://doi.org/10.3390/fi14100299
Submission received: 8 September 2022 / Revised: 13 October 2022 / Accepted: 14 October 2022 / Published: 18 October 2022
(This article belongs to the Special Issue AI and Security in 5G Cooperative Cognitive Radio Networks)

Abstract

:
The Network Slicing (NS) technology, recognized as one of the key enabling features of Fifth Generation (5G) wireless systems, provides very flexible ways to efficiently accommodate common physical infrastructures, e.g., Base Station (BS), multiple logical networks referred to as Network Slice Instances (NSIs). To ensure the required Quality of Service (QoS) levels, the NS-technology relies on classical Resource Reservation (RR) or Service Prioritization schemes. Thus, the current paper aims to propose a Preemption-based Prioritization (PP) scheme “merging” the classical RR and Service Prioritization schemes. The proposed PP-scheme efficiency is evaluated or estimated given a Queueing system (QS) model analyzing the operation of multiple NSIs with various requirements at common 5G BSs. As a key result, the proposed PP-scheme can provide up to 100% gain in terms of blocking probabilities of arriving requests with respect to some baseline.

1. Introduction

With the emergence of new opportunities in the era of 5G and Cloud technologies, the industries, services and users have various requirements for the Quality of Service (QoS). For example, Mobile communications, Environmental monitoring, Smart Home, Smart Agriculture, and Smart Metering require a huge number of connected devices and frequent transmission of numerous small packets. Other examples are Live Streaming, Video Uploads, and Mobile Health services that require higher data rates, as well as the Internet of Vehicles (IoV), Smart Grids, and industrial Internet of Things (IIoT) services requiring millisecond latency and near 100% reliability. As documented by standards organizations, namely the 3rd Generation Partnership Project (3GPP), GSM Association, and others, 5G networks should provide features such as mass access, deterministic latency, and ultra-high reliability. In this regard, it has become necessary to create flexible and dynamic networks that meet the various requirements for servicing users and vertical industries [1,2,3,4,5].
To flexibly meet the various requirements of users, the Network Slicing (NS) technology is introduced [1,2,3,4,5,6,7,8,9,10,11].Given NS-technology, Mobile Network Operators (MNOs) can enable multiple dedicated, virtualized, and isolated networks known as Network Slice Instances (NSIs) at common physical network infrastructures, e.g., Base Station (BS). Once fully established, interface specifications for Transport Network (TN), Core Network (CN), and Data Network (DN) control domains enable the automatic creation and deletion of 5G NSIs, and allow MNOs to monitor QoS in networks for smooth Degradation detection [5,12,13,14,15]. NSI can only be designed or instantiated to accommodate a unique service type from the standardized categories [1,2,16,17,18], i.e., guaranteed bit rate (GB), best effort with minimum guaranteed (BG), and best effort (BE). Note that GB category regroups the services that require minimum and maximum bit rates, e.g., Video Streaming, Music Streaming, etc. As for BG category, it regroups the services that only require minimum bit rate, e.g., Social Networking, Web Surfing or Browsing, etc. Lastly, BE category regroups the services that do not require minimum and/or maximum bit rates, e.g., Smart Metering, Email, etc.
The main objective of NS-technology is the efficient resource use while avoiding network downtimes and ensuring the required NSIs isolation [14,19,20,21]. In that way, load bursts in some NSIs cannot affect the QoS in other neighboring NSIs. The outlined by Kleinrock classical approach to finite Resource Sharing introduces five Resource Allocation schemes from Complete Partitioning to Complete Sharing through schemes with Maximum Queue Length and Minimum Allocation [22,23]. This approach, based on the Resource Reservation (RR) scheme, cannot allow reserved resources use even when network downtimes occur. Thus, the approach cannot ensure the efficient resource use in 5G systems. Moreover, the Service Prioritization scheme required in 5G networks for heterogeneous traffic service is not considered in the approach.
In 5G networks, the RR and Service Prioritization schemes can contribute to NSIs isolation [24,25,26,27,28,29]. Given the traffic intensities, the RR-scheme is relatively efficient and simple to implement, providing guaranteed minimum and/or maximum data rates to NSIs at common 5G BSs. The drawback is that this scheme can prove inefficient and limit the network flexibility to accommodate any new demand. In contrast, inherently dynamic and allowing efficient resource use, the Service Prioritization can pave the way to a solution, though hierarchy creation among the NSIs cannot enforce the required isolation.
Given what precedes, the paper [26] focuses on three important features of NS-technology: flexible priority-based performance isolation, fair QoS-aware resource allocation among users and efficient resource use. A Queueing System (QS) model to analyze the operation of three NSIs at common 5G BSs is proposed. The NSIs are considered to each support a unique service type from the standardized GB, BG, and BE categories. The authors assumed uniform data rate requirements for starting service of users at the NSIs. Thus, is proposed for heterogeneous traffic service a NS scheme that can bolster the NSIs performance isolation while maintaining efficient resource use at the Complete Sharing level. In addition, the paper [25] proposes a QS model to estimate the End-to-End (E2E) mean packet delay of the NSIs. The 5G infrastructure performance in industrial environments is analyzed with a focus on the instantiated NSIs isolation degree. A reasonably complete and realistic setup is considered, given inputs parameters from experimentation and simulation. The aim is to highlight the features enabled when using segregated NSIs with reserved resources to service the traffic generated by various production lines at a factory floor. As an important feature to solution QoS degradation, the number of production downtimes and the corresponding associated expenditures can be significantly reduced. In contrast, the paper [27] proposes a real test-bed of 5G stand-alone network deployment with a Service Prioritization scheme, then a NS-technology technique, and, finally, a flexible transparent allocation mechanism at the Radio level. The first aim is to mark a difference with other contributions remaining at the simulation level. The proposed approaches are evaluated in terms of performance given a scenario with saturated uplinks communications. Multiple data flows and various service requirements from external sources are considered in the contribution. The results obtained are then compared to others, from a scenario without NS-technology.
In the current article, following the papers [27,30] and in contrast with papers [25,26], we focus on two key features of NS-technology: NSIs Resource isolation and Automated management. First, propose a Pre-emption-based Prioritization (PP) scheme “merging” the classical RR and Service Prioritization schemes. Second, and last, evaluate or estimate the proposed PP-scheme efficiency given a QS model analyzing the operation of multiple NSIs with various requirements at common 5G BSs. Thus, the remainder of this paper is outlined as follows. Section 2 discusses the main assumptions and considerations of the paper. Section 3 mathematically analyzes a given QS model and proposes formulas to find key performance indicators (KPIs). Section 4 gives numerical results, illustrative of the proposed PP-scheme efficiency. Section 5 presents the conclusions.

2. System Model

Consider a Fifth Generation (5G) Base Station (BS) at which operate customizable and logical Network Slice Instances (NSIs). Let C represent the total network capacity of the 5G BS measured in some capacity units. For simplicity, assume that constant network capacities and service requirements for a NSI are measured in bps, i.e., these can be given in other capacity units by applying the radio channel model for the Radio Access Technology (RAT) in use. Let S represent the finite set of NSIs at the 5G BS, i.e., S N \ { 0 } with S = | S | representing the number of NSIs. Let C s represent the overall network capacity of the s th NSI, s S , under the condition
C 1 + + C S C .
Suppose that the overall network capacity C s of the s th NSI includes a guaranteed network capacity [26,31]. Thus, let Q s represent the guaranteed network capacity of the s th NSI, i.e., Q s C s , under the condition
Q 1 + + Q S C .
The above conditions suggest that when no requests are servicing at the s th NSI, the guaranteed network capacity Q s is available to service arriving requests at the other NSIs. In that case, these arriving requests become violators of the isolation of the s th NSI. At those moments, arriving requests at the s th NSI become competent to free the necessary resources from the violators servicing at the other NSIs. Various approaches are used to determine the number and the emplacement of the violators that must be discarded to free resources [32]. Some approaches suggest discarding the last admitted violator, and others propose discarding the violator with the longest remaining service time. Our paper proposes a Pre-emption-based Prioritization (PP) scheme for randomly discarding first the violators servicing at the NSI with the lowest priority until the necessary resources are freed up.
Consider the Poisson arrival process of a unique request type with rate λ s , s S , at the s th NSI. Suppose that the arriving request at the s th NSI requires for starting service b s capacity units, i.e., b s Q s . Assume the average service time for a request at the s th NSI to be exponentially distributed, with the mean μ s 1  that corresponds to scenarios with real-time applications.
Give a summary of the proposed system main notations in Table 1.
Organize the radio admission control (RAC) scheme so that upon arrival at the s th NSI, s S , the arriving request is bound to one path: blocking, direct admission, or via pre-emption admission. The blocking path is followed when the number n s of servicing requests at the NSI is greater than or equal to Q s / b s and the amount of available capacity units at the 5G BS is less than b s . The direct admission path is followed when the number n s of servicing requests at the NSI is less than C s / b s and the amount of available capacity units at the 5G BS is greater than or equal to b s . The via pre-emption admission path is followed when the number n s of servicing requests at the NSI is less than Q s / b s and the amount of available capacity units at the 5G BS is less than b s . In that case, the arriving request is competent to discard a number of violators servicing at the s ^ th NSI, s ^ S \ { s } . Consideration of Service Prioritization appears with the dilemma of choosing the violator(s) that must be discarded in the cases of three and more NSIs at the 5G BS. Such cases are outlined below. Therefore, develop a Discard or Preemption scheme, starting with cases of the system where two and three NSIs operate.

2.1. Case Example of Two NSIs

Consider the case example of two NSIs, i.e., S = 1 , 2 , instantiated at a common 5G BS. Clarify the Pre-emption scheme by supposing that with an arriving request bound to the via pre-emption admission path at the s th NSI, i.e., s { 1 , 2 } , a number
u s ^ s , n = n + e s · b C e s ^ · b , s ^ { 1 , 2 } \ { s } ,
of violators servicing at the s ^ th NSI undergo a service pre-emption or are discarded.
As an example application, with an arriving request bound to the via pre-emption path at the 1st NSI, exactly u 2 1 , n violators servicing at the 2nd NSI are discarded. Analogically, with an arriving request bound to the via pre-emption path at the 2nd NSI, exactly u 1 2 , n  violators servicing at the 1st NSI are discarded.
Thus, improve the Pre-emption scheme for three NSIs in the following subsection.

2.2. Case Example of Three NSIs

Consider the case example of three NSIs, i.e., S = 1 , 2 , 3 , instantiated at a common 5G BS. Differently to the previous subsection, introduce Priority levels [3,24,29,33,34] to clarify the Pre-emption scheme. Let
  • The highest priority be assigned to all servicing requests at the 1st NSI;
  • The medium priority be assigned to all servicing requests at the 2nd NSI;
  • The lowest priotity be assigned to all servicing requests at the 3rd NSI.
Thus, consider that with an arriving request bound to the via pre-emption admission path at the s th NSI, s { 1 , 2 , 3 } , the following consecutive events occur at the system. Firstly, a number
u s ^ s , n = min n N g · e s ^ , n + e s · b C e s ^ · b , s ^ = max i { 1 , 2 , 3 } \ { s } : n N g · e i > 0 ,
of violators servicing at the s ^ th NSI are discarded. Secondly and last, a number
u s ˜ s , n = n + e s u s ^ s , n e s ^ · b C e s ˜ · b , s ˜ { 1 , 2 , 3 } \ { s , s ^ } ,
of violators servicing at the s ˜ th NSI are also discarded.
As an example application, with an arriving request bound to the via pre-emption path at the 2nd NSI, exactly u 3 2 , n , then u 1 2 , n  violators servicing, respectively, at the 3rd and 1st NSIs are discarded.
Thus, generalize the Pre-emption scheme for multiple NSIs in the following subsection.

2.3. General Case of S NSIs

Consider the general case of S NSIs, i.e., S N \ { 0 } , instantiated at a common 5G BS. Similarly to previous Subsection, introduce Priority levels to clarify the Pre-emption scheme. Let s represent the priority level of all servicing requests at the s th NSI, e.g., the highest priority is assigned to all servicing requests at the 1st NSI, and the lowest priority is assigned to all servicing requests at the S th NSI. Thus, introduce the Pre-emption vector-function
u s , n = u s ^ s , n s ^ = 1 , , S = u 1 s , n , , u S s , n , s S ,
whose entries u s ^ s , n , s ^ S , represent the number of violators servicing at the s ^ th NSI that must be discarded when an arriving request is bound to the via pre-emption admission path at the s th NSI.
Theorem 1.
Given the initial condition u s , n = 0 , describe the entry
u s ^ s , n = min R n N g · e s ^ , R n + e s u s , n · b C e s ^ · b , s ^ = S , , 1 ,
where R x = x H x represents the Ramp function (https://mathworld.wolfram.com/RampFunction.html, accessed 1 September 2022), and H x —the Heaviside function:
H x = 1 , x > 0 , 0 , otherwise .
Note that when s ^ = s the entry u s ^ s , n is zero, i.e., an arriving request cannot follow the via pre-emption admission path at the expense of one servicing request at the same NSI.
Given the Pre-emption vector-function (Theorem 1), formalize in Figure 1 the RAC scheme for accessing the s th NSI, i.e., s S , at the 5G BS.
Evaluate and analyze the efficiency of the proposed Pre-emption-based Prioritization (PP) scheme stated by Theorem 1. To this end, construct a mathematical model using the Queueing Theory apparatus, and propose formulas to calculate key performance indicators (KPIs) in the following section.

3. Mathematical Model

Given the Poisson arrival processes, the exponentially distributed service times, plus the RAC scheme, describe the system behavior using a S-dimensional Markov process
X t = X 1 ( t ) , , X S ( t ) , t > 0 ,
where X s ( t ) , s S , represents the number of servicing requests at the s th NSI at the time t over the system state space
Ω = n N S : n N max · j 0 n · b C ,
where N S represents the set of all S-dimensional vectors with natural elements.
A depiction of considered Queueing System (QS) functioning is given by the scheme model in Figure 2.
Consider the following main sets [35,36,37] of the state space Ω for further investigation of the model. Let the blocking set, described as
Ω s block = n Ω : n N g · e s 0 n + e s · b > C , s S ,
collect all the system states, where an arriving request is bound to the blocking path at the  s th NSI. Let the direct admission set, described as
Ω s dad = n Ω : n N max · e s < 0 n + e s · b C ,
collect all the system states, where an arriving request is bound to the direct admission path at the  s th NSI. Let the via pre-emption admission set, described as
Ω s vpad = n Ω : n N g · e s < 0 n + e s · b > C ,
collect all the system states, where an arriving request is bound to the via pre-emption admission path at the  s th NSI. Given the direct admission and via pre-emption admission sets, also describe the blocking set as
Ω s block = Ω \ Ω s dad Ω s vpad ,
where Ω s dad Ω s vpad represents the collection of all the system states that are in Ω s dad or in Ω s vpad , i.e., an arriving request is bound to any of the two admission paths at the s th NSI.
A depiction of the system transition diagram, for an arbitrary state n , i.e., n Ω , is given in Figure 3.
Introduce the stationary probabilities of the Markov process X ( t )
P ( n ) = lim t P { X ( t ) = n } , n Ω ,
and describe them using the system of equilibrium equations
P n   λ · s = 1 S I Ω s dad n + I Ω s vpad n e s + n · μ = = λ · s = 1 S P n e s   I Ω s dad n e s + P n e s + u s , n   I Ω s vpad n e s + u s , n e s +
+ μ · s = 1 S P n + e s   I Ω s dad n   n + e s · e s e s , n Ω ,
where P n represents the stationary probability that the system is in the state n and I A a represents the Indicator function (https://mathworld.wolfram.com/CharacteristicFunction.html, accessed 1 September 2022):
I A a = 1 , a A , 0 , otherwise .
Note that the Markov process describing the system behavior is not reversible. Therefore, compute the system stationary probability distribution P = P n n Ω , i.e., a size | Ω | × 1 matrix, using an iterative method [38,39,40] to solve the system of equilibrium equations, rewritten as
A   P = 0 , P · j = 1 ,
where A represents the infinitesimal generator of Markov process, i.e., a size | Ω | × | Ω | matrix, whose entries A n Ω , n ^ Ω are computed as follows:
  • when n n ^ ,
A n , n ^ = λ · e s , if n ^ = n + e s , s . t . n Ω s dad , else if n ^ = n + e s u s , n , s . t . n Ω s vpad , n μ · e s , if n ^ = n e s , s . t . n ^ Ω s dad , 0 , otherwise , i . e . , n ^ Ω \ { n } ,
i . e . , s = 1 , , S ,
when n = n ^ ,
A n , n = n ^ Ω \ { n } A n , n ^ .
Compute the stationary probability distribution P n from (15), then calculate the system Key Performance Indicators (KPIs) using expressions in analytic form. Use the expression
N s = n Ω P n   n · e s , s S ,
to calculate the mean number of servicing requests at the s th NSI, the expression
N = n Ω P n   n · j
to calculate the mean number of servicing requests at the system, and the expression
P A = n A P ( n ) , A Ω ,
to calculate the probability of an event A determined using the main sets (10)–(13). Let P s adm and B s block represent the probability of events Ω s dad Ω s vpad and Ω s block , respectively, i.e., the admission and blocking probabilities for arriving requests at the s th NSI. Moreover, use the expression
φ s = 1 Q s n Ω P n n b · e s , s S ,
to calculate the average utilization of the guaranteed network capacity of the s th NSI, and the expression
σ = 1 C s = 1 S n Ω P n n b · e s
to calculate the average utilization of the total network capacity of the 5G BS.
Given the above expressions, evaluate and analyze the efficiency of the proposed Pre-emption-based Prioritization (PP) scheme versus the classical Resource Reservation (RR) scheme in the following section.

4. Numerical Analysis

Perform a qualitative comparative analysis of the proposed Pre-emption-based Prioritization (PP) scheme versus the classical Resource Reservation (RR) scheme. Particularly consider the Key Performance Indicators (KPIs) calculated using the expressions (17), (19), (20) and (21) in the previous section.
Consider the case example of three NSIs instantiated at one 5G BS. Dedicate the 1st NSI to 4K Live Video application instances. Next, dedicate the 2nd NSI to 4K 360-degree VR Panoramic Video application instances. Lastly, dedicate the 3rd NSI to 8K FOV VR Video application instances. Therefore, assign:
  • The highest priority to servicing 4K Live Video requests at the 1st NSI;
  • The medium priority to servicing 4K 360-degree VR Panoramic Video requests at the 2nd NSI;
  • The lowest priority to servicing 8K FOV VR Video requests at the 3rd NSI.
Compare the performance when using both PP and RR-schemes versus the uniform offered load ρ at the NSIs. Find all the input parameters in Table 2.
Depictions of the obtained results for the considered KPIs are given in Figure 4, Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9, where
Δ   KPI = | KPI PP - scheme KPI RR - scheme | / KPI RR - scheme
represents the relative gain (https://mathworld.wolfram.com/PercentageError.html, accessed 1 September 2022) in terms of given KPI.
According to Figure 4 and Figure 5, the mean numbers of servicing requests at the NSIs significantly increase with proposed PP-scheme compared to the classical RR-scheme. This result is the consequence of allowing violation of the guaranteed network capacities of the NSIs. With an increase up to approximately 16.75% when ρ equals value 21.2, the 2nd NSI gains the most when using proposed PP-scheme given the input parameters in Table 2. As for the 1st NSI, instantiated to service 4K Live Video requests with “low” requirements, it gains up to approximately 10.49% when ρ equals value 29.29. As for the 3rd NSI, instantiated to service 8K FOV VR video requests with “high” requirements, it gains up to approximately 2.6% when ρ equals value 23.22. Thus, compared to the classical RR-scheme, the proposed PP-scheme always provides better performance in terms of mean numbers of servicing requests at the NSIs.
In Figure 6 and Figure 7, the admission probabilities are greatly improved with the proposed PP-scheme. Consequently, the blocking probabilities greatly decrease (Figure 8 and Figure 9). Thus, the proposed PP-scheme also provides better performance, in terms of admission and blocking probabilities for arriving requests at the NSIs.
In Figure 10, the average utilization of the guaranteed network capacities improved when using the proposed PP-scheme. This is especially evident for the 2nd NSI in Figure 5 and Figure 7. Indeed, by flexibly using available parts of neighboring guaranteed network capacities of the 1st and/or 3rd NSIs, the 2nd NSI can service more 4K 360-degree VR Panoramic Video requests at middle workload values, i.e., when arriving requests can only be admitted for service with their respective guaranteed network capacities. One can also note that due to the low requirements for the throughput b 1 , with a simultaneous increase in the load ρ , the requests of the 1st NSI always manage to occupy the underused capacities of other NSIs, that is why ϕ 1 exceeds unity and lies above the rest of the curves.
In Figure 11 finally, the average utilization of the total network capacities improved by up to 10% at medium and high workload when using the proposed PP-scheme, compared to the classical RR-scheme. Note that, unlike the average utilization of the guaranteed network capacities (Figure 10), the average utilization of the total network capacities cannot exceed 100%.
To conclude, the numerical analysis was conducted given simultaneously increased uniform offered loads at the NSIs, while the average service times and service requirements were individual. The given Queueing System (QS) model in Section 3 facilitates the evaluation or estimation of proposed PP-scheme efficiency with respect to some baseline. As one key result, the 2nd NSI, instantiated to service requests with “medium” requirements, significantly gains in performance when using the proposed PP-scheme, compared to the classical RR-scheme. Indeed, the arriving 4K 360-degree VR Panoramic Video requests at the 2nd NSI use more often the guaranteed network capacities of other neighboring NSIs. The highlighted result is illustrated in the figures in this section.

5. Conclusions

This paper proposes a Pre-emption-based Prioritization (PP) scheme “merging” the classical Resource Reservation (RR) and Service Prioritization schemes. A Queueing System (QS) model analyzing the operation of multiple Network Slice Instances (NSIs) at common 5G BSs is provided to evaluate or estimate the proposed PP-scheme efficiency. Expressions are given to calculate system Key Performance Indicators (KPIs): the mean numbers of servicing requests, the admission and blocking probabilities for arriving requests, and the average utilization of the total and guaranteed network capacities. A qualitative numerical analysis comparing the proposed PP-scheme with the classical RR-scheme is given. Thus, the operation of three NSIs instantiated for 4K Live Video, 4K 360-degree VR Panoramic Video and 8K FOV VR Video requests is considered. The key results of the conducted comparative analysis are the following. Given some baseline, the proposed PP-scheme can provide:
  • Up to more than 60% gain in terms of admission probability of arriving 4K 360-degree VR Panoramic Video requests at the 2nd NSI;
  • Up to 100% gain in terms of blocking probabilities of arriving requests;
  • Up to 15% in terms of average utilization of the guaranteed network capacity of the 2nd NSI.
As next stage of this research topic, the PP-scheme efficiency can be evaluated or estimated given a QS model supporting also data applications using Transmission Control Protocol (TCP), e.g., Web Browsing, File Download, Social Networking, etc. Future research can investigate the optimal capacity settings for all NSIs at common 5G BSs given the PP-scheme.

Author Contributions

Conceptualization, Y.A., E.M. and Y.G.; Data curation, Y.A.; Formal analysis, Y.A.; Funding acquisition, E.M.; Investigation, Y.A.; Methodology, Y.A., E.M. and Y.G.; Project administration, E.M. and Y.G.; Resources, Y.A.; Software, Y.A.; Supervision, E.M. and Y.G.; Validation, Y.A.; Visualization, Y.A. and E.M.; Writing—original draft, Y.A.; Writing—review and editing, Y.A., E.M. and Y.G. All authors have read and agreed to the published version of the manuscript.

Funding

The research was funded by the Russian Science Foundation, project no. 22-79-10053, (https://rscf.ru/en/project/22-79-10053/, accessed 1 September 2022).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
3GPPThird Generation Partnership Project
5GFifth generation
BEBest effort
BGBest effort with minimum guaranteed
BSBase station
CNCore network
DNData network
E2EEnd-to-End
FOVField of vision/view
GBGuaranteed bit rate
GSMGroupe Speciale Mobile
IoTInternet of Things
IoVInternet of Vehicles
MNOMobile network operator
NSNetwork slicing
NSINetwork slice instance
PPPre-emption-based prioritization
QoSQuality of Service
QSQueueing system
RACRadio admission control
RATRadio access technology
RRResource reservation
TNTransport network
VoIPVoice over Internet Protocol
VRVirtual reality

References

  1. Meredith, J.M.; Firmin, F.; Pope, M. Release 16 Description; Summary of Rel-16 Work Items. Technical Report (TR) 21.916, 3rd Generation Partnership Project (3GPP). 2022. Version 16.2.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3493 (accessed on 1 September 2022).
  2. Sultan, A.; Pope, M. Feasibility Study on New Services and Markets Technology Enablers for Network Operation; Stage 1. Technical Report (TR) 22.864, 3rd Generation Partnership Project (3GPP). 2016. Version 15.0.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3016 (accessed on 1 September 2022).
  3. Meredith, J.M.; Soveri, M.C.; Pope, M. Management and Orchestration; 5G End to end Key Performance Indicators (KPI). Technical Specification (TS) 28.554, 3rd Generation Partnership Project (3GPP). 2022. Version 17.8.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3415 (accessed on 1 September 2022).
  4. 5G Industry Campus Network Deployment Guideline. Official Document NG.123, GSM Association (GSMA). 2021. Version 2.0. Available online: https://www.gsma.com/newsroom/wp-content/uploads//NG.123-v2.0.pdf (accessed on 1 September 2022).
  5. DOCOMO Today, Technology Reports (Special Articles), Technology Reports, Standardization. Technical Journal, NTT DOCOMO. 2022, Volume 23. No.4. Available online: https://www.docomo.ne.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn/vol23_4/vol23_4_en_total.pdf (accessed on 1 September 2022).
  6. Zambianco, M.; Lieto, A.; Malanchini, I.; Verticale, G. A Learning Approach for Production-Aware 5G Slicing in Private Industrial Networks. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Korea, 16–20 May 2022. [Google Scholar] [CrossRef]
  7. Zheng, Q.; Zhang, G.; Ou, M.; Bao, J. 5G Slice Allocation Algorithm Based on Mapping Relation. In Advances in Intelligent Systems and Computing; Springer: Singapore, 2020; pp. 1608–1616. [Google Scholar] [CrossRef]
  8. Luntovskyy, A.; Shubyn, B.; Maksymyuk, T.; Klymash, M. 5G Slicing and Handover Scenarios: Compulsoriness and Machine Learning. In Current Trends in Communication and Information Technologies; Springer International Publishing: Cham, Switzerland, 2021; pp. 223–255. [Google Scholar] [CrossRef]
  9. Riad, M.A.; El-Ghandour, O.; El-Haleem, A.M.A. Joint User-Slice Pairing and Association Framework Based on H-NOMA in RAN Slicing. Sensors 2022, 22, 7343. [Google Scholar] [CrossRef]
  10. Singh, S.; Babu, C.R.; Ramana, K.; Ra, I.H.; Yoon, B. BENS-B5G: Blockchain-Enabled Network Slicing in 5G and Beyond-5G (B5G) Networks. Sensors 2022, 22, 6068. [Google Scholar] [CrossRef]
  11. Zahoor, S.; Ahmad, I.; Othman, M.T.B.; Mamoon, A.; Rehman, A.U.; Shafiq, M.; Hamam, H. Comprehensive Analysis of Network Slicing for the Developing Commercial Needs and Networking Challenges. Sensors 2022, 22, 6623. [Google Scholar] [CrossRef]
  12. Awada, Z.; Boulos, K.; El-Helou, M.; Khawam, K.; Lahoud, S. Distributed multi-tenant RAN slicing in 5G networks. Wirel. Netw. 2022, 28, 3185–3198. [Google Scholar] [CrossRef]
  13. Wichary, T.; Batalla, J.M.; Mavromoustakis, C.X.; Żurek, J.; Mastorakis, G. Network Slicing Security Controls and Assurance for Verticals. Electronics 2022, 11, 222. [Google Scholar] [CrossRef]
  14. Dangi, R.; Jadhav, A.; Choudhary, G.; Dragoni, N.; Mishra, M.K.; Lalwani, P. ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet 2022, 14, 116. [Google Scholar] [CrossRef]
  15. Thantharate, A.; Paropkari, R.; Walunj, V.; Beard, C.; Kankariya, P. Secure5G: A Deep Learning Framework Towards a Secure Network Slicing in 5G and Beyond. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020. [Google Scholar] [CrossRef]
  16. Chen, C.; Tian, H.; Nie, G. Fairness Resource Allocation Scheme for GBR Services in Downlink SCMA System. In Proceedings of the 2020 IEEE/CIC International Conference on Communications in China (ICCC), Chongqing, China, 9–11 August 2020. [Google Scholar] [CrossRef]
  17. D, M.P.; Das, D. Efficient way of Non-GBR, High Latency GTP-U Packet Transmission in 4G and 5G Networks. In Proceedings of the 2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Bangalore, India, 9–11 July 2021. [Google Scholar] [CrossRef]
  18. Kheddar, H.; Ouldkhaoua, S.; Bouguerra, R. All you need for horizontal slicing in 5G network. arXiv 2022, arXiv:2207.11477. [Google Scholar]
  19. Kotulski, Z.; Nowak, T.W.; Sepczuk, M.; Tunia, M.A. 5G networks: Types of isolation and their parameters in RAN and CN slices. Comput. Netw. 2020, 171, 107135. [Google Scholar] [CrossRef]
  20. Alotaibi, D. Survey on Network Slice Isolation in 5G Networks: Fundamental Challenges. Procedia Comput. Sci. 2021, 182, 38–45. [Google Scholar] [CrossRef]
  21. Wong, S.; Han, B.; Schotten, H.D. 5G Network Slice Isolation. Network 2022, 2, 153–167. [Google Scholar] [CrossRef]
  22. Kermani, P.; Kleinrock, L. Analysis of buffer allocation schemes in a multiplexing node. In Proceedings of the Conference Record, International Conference on Communications, Chicago, IL, USA, 12–15 June 1977; Volume 2, pp. 30–34. [Google Scholar]
  23. Kamoun, F.; Kleinrock, L. Analysis of Shared Finite Storage in a Computer Network Node Environment Under General Traffic Conditions. IEEE Trans. Commun. 1980, 28, 992–1003. [Google Scholar] [CrossRef] [Green Version]
  24. Marabissi, D.; Fantacci, R. Highly Flexible RAN Slicing Approach to Manage Isolation, Priority, Efficiency. IEEE Access 2019, 7, 97130–97142. [Google Scholar] [CrossRef]
  25. Chinchilla-Romero, L.; Prados-Garzon, J.; Ameigeiras, P.; Muñoz, P.; Lopez-Soler, J.M. 5G Infrastructure Network Slicing: E2E Mean Delay Model and Effectiveness Assessment to Reduce Downtimes in Industry 4.0. Sensors 2021, 22, 229. [Google Scholar] [CrossRef]
  26. Yarkina, N.; Correia, L.M.; Moltchanov, D.; Gaidamaka, Y.; Samouylov, K. Multi-tenant resource sharing with equitable-priority-based performance isolation of slices for 5G cellular systems. Comput. Commun. 2022, 188, 39–51. [Google Scholar] [CrossRef]
  27. Gabilondo, Á.; Fernández, Z.; Viola, R.; Martín, Á.; Zorrilla, M.; Angueira, P.; Montalbán, J. Traffic Classification for Network Slicing in Mobile Networks. Electronics 2022, 11, 1097. [Google Scholar] [CrossRef]
  28. Rehman, A.U.; Mahmood, I.; Kamran, M.; Sanaullah, M.; Ijaz, A.; Ali, J.; Ali, M. Enhancement in Quality-of-Services using 5G cellular network using resource reservation protocol. Phys. Commun. 2022, 101907. [Google Scholar] [CrossRef]
  29. Luu, Q.T.; Kerboeuf, S.; Kieffer, M. Admission Control and Resource Reservation for Prioritized Slice Requests With Guaranteed SLA Under Uncertainties. IEEE Trans. Netw. Serv. Manag. 2022, 19, 3136–3153. [Google Scholar] [CrossRef]
  30. Yarkina, N.; Gaidamaka, Y.; Correia, L.M.; Samouylov, K. An Analytical Model for 5G Network Resource Sharing with Flexible SLA-Oriented Slice Isolation. Mathematics 2020, 8, 1177. [Google Scholar] [CrossRef]
  31. Basharin, G.P.; Gaidamaka, Y.V.; Samouylov, K.E. Mathematical theory of teletraffic and its application to the analysis of multiservice communication of next generation networks. Autom. Control Comput. Sci. 2013, 47, 62–69. [Google Scholar] [CrossRef]
  32. Naumov, V.; Gaidamaka, Y.; Yarkina, N.; Samouylov, K. Matrix and Analytical Methods for Performance Analysis of Telecommunication Systems; Springer Nature: Singapore, 2021. [Google Scholar]
  33. Althumali, H.; Othman, M.; Noordin, N.K.; Hanapi, Z.M. Priority-based load-adaptive preamble separation random access for QoS-differentiated services in 5G networks. J. Netw. Comput. Appl. 2022, 203, 103396. [Google Scholar] [CrossRef]
  34. Gedikli, A.M.; Koseoglu, M.; Sen, S. Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks. Comput. Netw. 2022, 215, 109202. [Google Scholar] [CrossRef]
  35. Enderton, H.B. Elements of Set Theory; Elsevier: Amsterdam, The Netherlands, 1977. [Google Scholar] [CrossRef]
  36. Devlin, K. The Joy of Sets; Undergraduate Texts in Mathematics; Springer: New York, NY, USA, 1993. [Google Scholar] [CrossRef]
  37. Bagaria, J. Set Theory. In The Stanford Encyclopedia of Philosophy, Winter 2021 ed.; Zalta, E.N., Ed.; Metaphysics Research Lab, Stanford University: Stanford, CA, USA, 2021. [Google Scholar]
  38. Xie, D. An efficient finite element iterative method for solving a nonuniform size modified Poisson-Boltzmann ion channel model. J. Comput. Phys. 2022, 470, 111556. [Google Scholar] [CrossRef]
  39. Zhou, D.; Chen, Z.; Pan, E.; Zhang, Y. Dynamic statistical responses of gear drive based on improved stochastic iteration method. Appl. Math. Model. 2022, 108, 46–65. [Google Scholar] [CrossRef]
  40. Stepanov, S.N. Theory of Teletraffic: Concepts, Models, Applications [Teoriya Teletraffika: Kontseptsii, Modeli, Prilozheniya]; Goryachaya Liniya-Telekom: Moscow, Russia, 2015; p. 868. (In Russian) [Google Scholar]
  41. Schoolar, D.; Lambert, P.; Nanbin, W.; Liang, Z. 5G Service Experience-Based Network Planning Criteria. White Paper, Ovum Consulting. 2019. in Partnership with Huawei. Available online: https://carrier.huawei.com/~/media/cnbgv2/download/products/servies/5g-planning-criteria-white-paper.pdf (accessed on 1 September 2022).
Figure 1. Flowchart formalizing the RAC scheme for accessing the s th NSI, i.e., s S , at the 5G BS.
Figure 1. Flowchart formalizing the RAC scheme for accessing the s th NSI, i.e., s S , at the 5G BS.
Futureinternet 14 00299 g001
Figure 2. Scheme model of considered QS with S NSIs at the 5G BS.
Figure 2. Scheme model of considered QS with S NSIs at the 5G BS.
Futureinternet 14 00299 g002
Figure 3. Transition diagram fragment for an arbitrary system state n , i.e., n Ω .
Figure 3. Transition diagram fragment for an arbitrary system state n , i.e., n Ω .
Futureinternet 14 00299 g003
Figure 4. The mean numbers of servicing requests vs. the offered load.
Figure 4. The mean numbers of servicing requests vs. the offered load.
Futureinternet 14 00299 g004
Figure 5. The percentage increase in the mean numbers of servicing requests vs. the offered load.
Figure 5. The percentage increase in the mean numbers of servicing requests vs. the offered load.
Futureinternet 14 00299 g005
Figure 6. The admission probabilities for arriving requests vs. the offered load.
Figure 6. The admission probabilities for arriving requests vs. the offered load.
Futureinternet 14 00299 g006
Figure 7. The percentage increase in the admission probabilities for arriving requests vs. the offered load.
Figure 7. The percentage increase in the admission probabilities for arriving requests vs. the offered load.
Futureinternet 14 00299 g007
Figure 8. The blocking probabilities for arriving requests vs. the offered load.
Figure 8. The blocking probabilities for arriving requests vs. the offered load.
Futureinternet 14 00299 g008
Figure 9. The percentage decrease in the blocking probabilities for arriving requests vs. the offered load.
Figure 9. The percentage decrease in the blocking probabilities for arriving requests vs. the offered load.
Futureinternet 14 00299 g009
Figure 10. The average utilization of the guaranteed network capacities vs. the offered load.
Figure 10. The average utilization of the guaranteed network capacities vs. the offered load.
Futureinternet 14 00299 g010
Figure 11. The average utilization of the total network capacities vs. the offered load.
Figure 11. The average utilization of the total network capacities vs. the offered load.
Futureinternet 14 00299 g011
Table 1. System parameters.
Table 1. System parameters.
NotationDescription
S The set of NSIs at the 5G BS, S N \ { 0 } , [units (u.)]
SThe number of NSIs at the 5G BS, S = | S | , [u.]
CThe total network capacity of the 5G BS, [capacity units (c.u.)]
C s The overall network capacity of the s th NSI, s S , C 1 + + C S C , [c.u.]
Q s The guaranteed network capacity of the s th NSI, Q s C s , Q 1 + + Q S C , [c.u.]
λ s The arrival rate of requests at the s th NSI, λ = λ 1 , , λ S , [requests per time units (requests/t.u.)]
μ s 1 The average service time for a request at the s th NSI, μ = μ 1 , , μ S , [t.u.]
ρ s = λ s / μ s The offered load at the s th NSI
b s The requirement for starting service of a request at the s th NSI, b s Q s , b = b 1 , , b S , [c.u.]
C s / b s The maximum number of requests that may be admitted for service with the overall network capacity of the s th NSI, N max = C 1 / b 1 , , C S / b S , [u.]
Q s / b s The maximum number of requests that may be admitted for service with the guaranteed network capacity of the s th NSI, N g = Q 1 / b 1 , , Q S / b S , [u.]
n s The current number of servicing requests at the s th NSI, n = n 1 , , n S , [u.]
e s The s th row of the size S × S identity matrix
j The S-dimensional all-ones vector
Table 2. Input parameters of comparative analysis [41].
Table 2. Input parameters of comparative analysis [41].
ParameterValue RR-SchemeValue PP-SchemeUnit of Measure
C 5.0 Gbps
Q 1 , Q 2 , Q 3 1.0, 1.5, 2.5 Gbps
C 1 , C 2 , C 3 Q 1 , Q 2 , Q 3 1.5, 2.0, 3.0 Gbps
b 1 , b 2 , b 3 0.04, 0.08, 0.1 Gbps
ρ from 5 to 100 -
μ 1 , μ 2 , μ 3 60, 30, 45 min 1
λ 1 , λ 2 , λ 3 ρ μ 1 , ρ μ 2 , ρ μ 3 requests/min
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Adou, Y.; Markova, E.; Gaidamaka, Y. Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework. Future Internet 2022, 14, 299. https://doi.org/10.3390/fi14100299

AMA Style

Adou Y, Markova E, Gaidamaka Y. Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework. Future Internet. 2022; 14(10):299. https://doi.org/10.3390/fi14100299

Chicago/Turabian Style

Adou, Yves, Ekaterina Markova, and Yuliya Gaidamaka. 2022. "Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework" Future Internet 14, no. 10: 299. https://doi.org/10.3390/fi14100299

APA Style

Adou, Y., Markova, E., & Gaidamaka, Y. (2022). Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework. Future Internet, 14(10), 299. https://doi.org/10.3390/fi14100299

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop