Next Article in Journal
On Some Solvable Systems of Some Rational Difference Equations of Third Order
Previous Article in Journal
Robust Statistic Estimation in Constrained Optimal Control Problems of Pollution Accumulation (Part II: Markovian Switchings)
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Mathematical Framework for Mixed Reservation- and Priority-Based Traffic Coexistence in 5G NR Systems

1
Applied Informatics and Probability Department, Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya St, 117198 Moscow, Russia
2
Institute of Informatics Problems, Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences (FRC CSC RAS), 44-2 Vavilov St, 119333 Moscow, Russia
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(4), 1046; https://doi.org/10.3390/math11041046
Submission received: 11 January 2023 / Revised: 14 February 2023 / Accepted: 16 February 2023 / Published: 18 February 2023
(This article belongs to the Section Network Science)

Abstract

:
Fifth-generation (5G) New Radio (NR) systems are expected to support multiple traffic classes including enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC) at the same air interface. This functionality is assumed to be implemented by utilizing the network slicing concept. According to the 3rd Generation Partnership Project (3GPP), the efficient support of this feature requires statistical multiplexing and, at the same time, traffic isolation between slices. In this paper, we formulate and solve a mathematical model for a class of Radio Access Network (RAN) slicing algorithms that simultaneously include resource reservation and a priority-based service discipline allowing us to incur fine granularity in the service processes of different traffic aggregates. The system is based on a queueing model and allows parametrization by accounting for the specifics of wireless channel impairments. As metrics of interest, we utilize K-class session drop probability, K-class session pre-emption probability, and system resource utilization. To showcase the capabilities of the model, we also compare performance guarantees provided for URLLC, eMBB, and mMTC traffic when multiplexed over the same NR radio interface. Our results demonstrate that the performance trade-off is dictated by the offered traffic load of the highest priority sessions: (i) when it is small, mixed reservation/priority scheme outperforms the full reservation mechanism; (ii) for overloaded conditions, full reservations provides better traffic isolation. The mixed strategy is beneficial to traffic aggregates with short-lived lightweight sessions, such as URLLC and mMTC, while the reservation only scheme works better for elastic eMBB traffic. The most important feature is that the mixed strategy allows resource utilization to be improved up to 95%, which is 10–15% higher compared to the reservation-only scheme while still providing isolation between traffic types.

1. Introduction

Network slicing is an essential functionality of future fifth-generation (5G) New Radio (NR) cellular systems [1,2]. It can allow resources to be allocated and isolated for different traffic classes or mobile virtual network operators (MVNOs) on the same physical network infrastructure, e.g., mobile physical network operators (MPNOs) [3]. In both cases, traffic aggregates may have different quality of service (QoS) requirements in terms of throughput, latency, and drop probability as stated in the International Telecommunications Union Radiocommunication Sector (ITU-R) M.2410 [4].
QoS provisioning to traffic slices needs to be provided in an end-to-end way [5,6]. The critical part is the Radio Access Network (RAN), where time-varying radio channel conditions may deteriorate statically provisioned performance guarantees [7,8]. In addition, according to the unified opinion of the 3rd Generation Partnership Project (3GPP), ITU-R, and the Groupe Speciale Mobile Association (GSMA) [9,10], the utilized slicing scheme should satisfy two contradictory requirements—traffic isolation and efficient usage of radio resources. The former requirement can be implemented by utilizing static or dynamic resource allocation policies [11,12], while the latter can be implemented via traffic prioritization schemes [13,14]. The joint dynamics of schemes accounting for both types of requirements is rather complex. To this end, mathematical models are needed to understand the trade-offs between user-centric key performance indicators (KPI), such as session loss and pre-emption probabilities, and system-centric ones, such as the efficiency of system resource utilization.

1.1. Related Work

There have been a number of studies addressing the question of network slicing at the air interface. Specifically, Ref. [15] focuses on two key features of slicing: traffic isolation and automated management. In doing so, a pre-emption-based prioritization (PP) scheme, ”merging” the resource allocation and traffic prioritization schemes, is proposed. To evaluate or estimate the so-called PP scheme, a queuing system model analyzing the functioning of a single base station (BS) accommodating multiple services with different QoS requirements is given. Concretely, this paper considers each service-oriented slice to be assigned an overall share of radio resources, including guaranteed ones utilized by neighboring slices. As one key result, the proposed PP scheme can achieve 100% gain in terms of blocking probabilities with respect to a predefined baseline. In addition, Ref. [11] investigates the following features of slicing: flexible priority-based traffic isolation, fair QoS-aware resource allocation, and efficient usage of radio resources. The authors proposed a slicing scheme bolstering the traffic isolation and maintaining the efficient usage of radio resources, and represented it by utilizing a queuing model with three 5G services having uniform data rate requirements at one BS. This slicing scheme takes advantage of the complete partitioning and complete sharing policies’ key features. In practice, this paper considers the users of each service-oriented slice to be ensured a minimum data rate, with the possibility to achieve higher data rates whenever radio resources are free. The proposed slicing scheme can achieve 90% gain in terms of average user satisfaction index, and reduce the session drop probability by an order of magnitude dependent on the baseline.
Authors in [13] studied the industrial deployment of 5G with simultaneous support of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. The effectiveness of coexistence strategies is achieved via explicit prioritization. In addition, the authors consider service strategies in which URLLC traffic can be offloaded onto device-to-device (D2D) connections with and without explicit reservation of a fraction of resources for direct connections. As a result, the authors concluded that a D2D-aware strategy, in which the BS explicitly reserves resources for direct connection, is significantly superior to strategies in which no explicit reservation is used, as well as the strategy without support for D2D connections.
Recently, studies suggesting the use of machine learning (ML) for network slicing have started to appear. Specifically, Ref. [16] utilizes deep reinforcement learning (DRL) technology and proposes a hybrid hard–soft slicing framework, guaranteeing service level agreements (SLAs) and maximizing the spectrum efficiency given some isolation constraints. Technically, the paper considers the users of each service-oriented slice to be able to utilize the radio resources of a newly configured service-oriented slice neighboring existing ones. As the main result, the SLAs can be guaranteed all the time with the proposed hybrid slicing able to achieve near-optimal performance in terms of SLA satisfaction ratio, isolation degree, and spectrum efficiency. As the main drawback, the proposed slicing cannot satisfy mixed SLAs such as latency and reliability. The authors in [17] investigate the impact of traffic in one slice on QoS parameters experienced by the traffic in another slice. They develop a data-driven slicing and allocation model by using ML algorithms, where resources between network slices are intelligently redistributed in accordance with prescribed QoS parameters. The study in [18] considers an experimental 5G network prototype with the ability to configure radio resources for network slices using ML solutions based on real-time performance metrics. The obtained results confirm that the ML-based approaches outperform the traditional ones and improve the utilization of resources while guaranteeing the QoS parameters.

1.2. Contributions

In this paper, by utilizing the tools of the queuing theory, we formulate and solve a general slicing RAN problem for K traffic aggregates utilizing both resource reservation and pre-emptive-priority service discipline. In the considered system, each slice is assigned a certain dedicated share of radio resources g k such that k g k < C , where C is the overall amount of radio resources. The shared pool of resources, C k g k is regulated by the pre-emptive priority service procedure to improve the degree of statistical multiplexing. The system is then solved for user- and system-centric KPI, session drop/pre-emption probability as well as system resource utilization, by utilizing the queuing-theoretic formalism. The proposed system allows to satisfy inherently contradictory requirements of having a strong degree of isolation between traffic classes and high efficiency of resource usage. The performance of the proposed system is demonstrated by utilizing a three-class slicing scheme serving an ultra-reliable low-latency service, an enhanced mobile broadband service, and a massive machine-type communication (mMTC) service at the same radio interface.
The main contributions of our study are the following:
  • Mathematical framework for mixed reservation- and priority-based network slicing at the radio interface along with parameterization by accounting for wireless channel specifics that include numerous special traffic isolation strategies such as full reservation and priority;
  • Observation that the mixed reservation- and priority-based strategy allows extremely high resource utilization to be maintained, approaching 95% in overloaded system conditions, while still providing a strong degree of traffic isolation;
  • Observations that short-lived lightweight low-priority traffic, such as mMTC, is best suited for the mixed reservation–priority strategy while elastic eMBB traffic benefits more from the full reservation strategy in terms of both drop and pre-emption probabilities.
The rest of the paper is organized as follows. First, in Section 2 we introduce our system model. The mathematical model is formalized and solved for performance metrics of interest in Section 3. Numerical results of the coexistence of three services, URLLC, eMBB, and mMTC, are presented in Section 4. Conclusions are drawn in the last section.

2. System Model

In this section, we introduce the considered system model. We start by describing the scenario, then proceed by specifying the details of the radio part, and finally, introduce the metrics of interest.

2.1. Considered Scenario

We consider a single base station (BS) deployment with a circular coverage area of radius r, see Figure 1a. We assume that network slicing is utilized to deliver K services having different QoS requirements. Further, for brevity, we use “k-type session” to mean “user’s request for service of type k”, k = 1 , , K . The geometric locations of user equipment (UE)-generating sessions are assumed to be uniformly distributed in the cell coverage. The height of BS and UE is assumed to be h B S and h U E , respectively.
The considered system is formalized in terms of queueing theory, see Figure 1b. We consider a queueing system with K types of traffic assumed to be partially elastic with the minimum and the maximum resource requirements, 1 b k min b k max , k = 1 , , K , expressed in primary resource blocks (PRB). The resource requirements correspond to the rates c k min and c k max and are derived below by utilizing the radio part models. We also denote b min = ( b 1 min , , b K min ) T , b max = ( b 1 max , , b K max ) T . Requests for service of type k arrive according to the homogeneous Poisson process with intensity λ k . The session service time is exponentially distributed with the mean μ k 1 . We assume that g k , k = 1 , , K , PRBs from C PRBs are reserved for each type of service requests, k = 1 K g k < C . Then c = C k = 1 K g k represents the shared pool of resources available for any type of traffic.

2.2. Radio Part

The impact of the radio part manifests itself in two critical parameters: (i) coverage of the BS r and (ii) resource request characterization, b k min , b k max . These two quantities can be obtained by utilizing session rate requirements c k min , c k max and radio part models, including propagation, antenna, and blockage models specified in [19] depending on the considered deployment and operational frequency. Below, we illustrate the basic steps involved in parameterization [20,21]. The exposure provided below is applicable for both microwave ( μ Wave) and millimeter wave (mmWave) 5G NR systems, see, for example, [22].
The coverage radius r of the cell is assumed to be the maximum separation between the UE and the NR BS, such that the UE is not in an outage. The signal-to-interference-plus-noise ratio (SINR) at the 3D distance y is provided by
S ( y ) = P B G B G U M S F L ( y ) N 0 B + M I ,
where P B is the NR BS emitted power; G B and G U are the BS and UE antenna gains, respectively, obtained from [23]; N 0 is the thermal noise power spectral density; B is the system bandwidth; M S F N ( 0 , σ S F ) is the shadowing; M I is the cross-cell interference margin; and L ( y ) is the path loss that can be obtained from TR 38.901 [19].
L d B ( y ) = β + 10 ζ log 10 y + 20 log 10 f c ,
where f c is the carrier frequency measured in GHz, β , and ζ are the parameters provided in [19] that depend on the utilized band and propagation conditions.
To derive r, we assume the worst-case scenario for millimeter wave communications, such that UE at the cell edge is in non-line-of-sight (nLoS) conditions and is also blocked. Observe that the path loss in (2) can be represented in the linear scale by utilizing the model in the form A y ζ n L o S , where A = 10 2 log 10 f c + β . The 3D distance y is given by
y = r 2 + [ h B S h U E ] 2 .
By solving (1) and (3) with respect to r, we have
r = P B G B G U M S F 10 β 10 f c 2 ( N 0 B + M I ) S t h 2 ζ n L o S ( h B S h U E ) 2 ,
where ζ n L o S = 3.19 , β = 52.4 dB, S t h = 8.97 dB is the SINR threshold corresponding to the minimum feasible modulation and coding scheme (MCS) in 5G NR [19,24].
Select r such that the UE at the cell edge spends no more than 5 % of time in outage conditions. The corresponding value of M S F is provided by solving
M S F = 2 erfc 1 ( 2 p o u t ) σ SF ,
where p o u t = 0.05 , erfc 1 ( · ) is the inverse complementary error function, σ SF is the standard deviation of the shadow fading distribution in the nLoS state tabulated in [19].
Once radius r is obtained, one may characterize the required resources b k min , b k max k = 1 , 2 , , K , to satisfy session rate requirements, c k min , c k max . Recalling that UEs are assumed to be uniformly distributed in the coverage of NR BS with the probability density function (pdf) in the form f ( y ) = 2 y / r 2 , 0 < y < r [25], the mean spectral efficiency can be obtained as follows
E [ C e ] = 0 r 2 y r 2 log 2 [ 1 + S ( y ) ] d y ,
where S ( y ) is the SINR at 3D distance y.
Accounting for the rate of applications, c k min , c k max , k = 1 , 2 , , K , and available bandwidth at NR BS, B, one may now utilize the mean spectral efficiency to estimate the mean amount of resources requested by considered UEs
b k max = c k max E [ C e ] , b k min = c k min E [ C e ] ,
and then, by utilizing the employed NR numerology (1/2 for μ Wave and 3/4 for mmWave), the mean amount of requested resources is further converted into PRBs [24].
Note that the 5G NR system considered in this paper, in addition to the sub-6 GHz band, may also operate in the mmWave band. At the same time, the model developed further is general and does not depend on the type of propagation environment and operational frequency. To this aim, here we provided parameterization for sub-6 GHz systems that captures the specifics of a wireless channel. However, the specifics of mmWave, namely, the dependence on the line-of-sight (LoS) propagation of signals, can be taken into account by using the approaches described, for example, in our previous work [13] for industrial deployment, or in the studies of other authors [20,22] for general deployments.

2.3. Metrics of Interest

In this paper, we are interested in two types of metrics for the proposed slicing scheme: (i) user-centric and (ii) system-centric. The first types of metrics include session drop and session pre-emption probabilities as a function of the number of traffic classes, resource reservations, and priority order. The main system-centric metric of interest is the efficiency of resource utilization.

3. Mathematical Model

The behavior of the queueing system specified in Section 2 can be described by the K-dimensional continuous-time Markov chain (CTMC) { ( N 1 ( t ) , , N K ( t ) ) , t 0 } , where N k ( t ) captures the number of k-type requests in the system at time t. Denote N k = ( C i k g i ) / b k min as the maximum number of k-type sessions in service, then n = ( n 1 , , n K ) , n k = 0 , , N k , is the number of k-type sessions that are currently in the system, i , k = 1 , , K . Additionally, let us denote N k g = g k / b k min , k = 1 , , K as the maximum guaranteed number of k-type sessions in service. The considered process is defined over the following state space
X = { n : 0 n k N k , k = 1 , , K , i = 1 K max { n i b i min , g i } C } .
Due to the partially elastic nature of the considered sessions, the amount of resources, b k ( n ) , b k min b k ( n ) b k max , available to the k-type sessions is equally distributed between them and depends on the state n X . That is, we have
b k ( n ) = = min C max { i k g i , i = 1 k 1 max { n i b i ( n ) , g i } + i = k + 1 K max { n i b i min , g i } } n k , b k max .

3.1. Model without Pre-Emption

Let us start with a partial sharing strategy with a non-pre-emptive priority. In the state space X we can identify three important sets, namely S k , B k , and S k max , k = 1 , , K . The former set, S k , k = 1 , , K , called the “accepting” set, contains all the states in which sessions are accepted to the system and is provided by
S k = { n X : n k < N k , i = 1 k 1 max ( n i b i ( n + e k ) , g i ) + + ( n k + 1 ) b k min + i = k + 1 K max ( n i b i min , g i ) C } , k = 1 , , K .
The second set of states B k , k = 1 , , K , called the “loss” set, is a set of system states in which arriving sessions are dropped,
B k = { n X : n k = N k i = 1 k 1 max ( n i b i ( n + e k ) , g i ) + + ( n k + 1 ) b k min + i = k + 1 K max ( n i b i min , g i ) > C } , k = 1 , , K .
Finally, in the accepting set S k , we can select a subset S k max , k = 1 , , K , a set of system states in which the arriving sessions will be accepted to the system using b k max PRBs, i.e.,
S k max = { n X : n k < C i k g i b k max , i = 1 k 1 max ( n i b i ( n + e k ) , g i ) + + ( n k + 1 ) b k max + i = k + 1 K max ( n i b i min , g i ) C } , k , i = 1 , , K .
Consider now the process of session admission to the system. Particularly, when a new session arrives to the system, the following may happen:
  • If (i) upon arrival of the new session of type k there are more than b k min , k = 1 , , K , PRBs available, and (ii) the current amount of sessions in service is smaller than N k , k = 1 , , K , this session is accepted at the system;
  • In any other case, the session is rejected.
Denote by p = { p ( n 1 , , n K ) , ( n 1 , , n K ) X } the steady-state probability distribution of the CTMC X ( t ) . Since the considered stochastic process X ( t ) is reversible, by solving the system of local balance equations,
λ k p ( n ) = ( n k + 1 ) μ k p ( n + e k ) , p ( n + e k ) = λ k ( n k + 1 ) μ k p ( n ) ,
recursively, we obtain the steady-state probability distribution of the system in the product-form (14), that is,
p ( n 1 , , n K ) = ρ 1 n 1 n 1 ! · · ρ K n K n K ! p ( 0 , , 0 ) , n k = 0 , 1 , , N k , p ( 0 , , 0 ) = n 1 = 0 N 1 n K = 0 N K ρ 1 n 1 n 1 ! · · ρ K n K n K ! 1 ,
where ρ k = λ k / μ k , k = 1 , , K .
Once the steady-state distribution vector p is found, we may proceed to determine the performance measures of the system:
  • Drop probability of k-type session, p B k , is given by
    p B k = n 1 = 0 N 1 n K = 0 N K p ( n ) I { n B k } , k = 1 , , K ;
  • Average amount of resources occupied by i-type sessions, k ¯ i , is given by
    k ¯ i = n 1 = 0 N 1 n K = 0 N K n i b i ( n ) p ( n ) I { n X } , i = 1 , , K ;
  • The fraction of utilized resources, U, is provided as
    U = i = 1 K n 1 = 0 N 1 n K = 0 N K n i b i ( n ) p ( n ) I { n X } .

3.2. Model with Pre-Emption

Consider now the system with the pre-emptive priority service. The behavior of this queuing system is similar to the previous one in the sense that the considered process is defined over the same state space X as in (8). We assume that the services have different priorities: the highest priority is for the first type of services, the lowest is for K-type of services. Priority service is implemented in such a way that in the case of insufficient resources in the system to provide the k-type service with a minimum requirement, the service of one or more lower priority sessions in the shared pool of resources c could be pre-empted.
Figure 2 illustrates the algorithm for selecting sessions that could be pre-empted when a new session arrives to the system. We assume that m = ( m 1 , , m K ) —the numbers of sessions that could be pre-empted. Given the initial condition i = K , i > j , m k = 0 , k = 1 , , K , consider the steps of the algorithm.
Step 1. Check if there are enough resources for arriving at j-type session. If the condition is met, the session is accepted. If the condition is not met, go to Step 2.
Step 2. Check if the service of the i-type session in the shared pool c can be pre-empted. If the condition is met, increase m i by one and go to Step 1. If the condition is not met, go to Step 3.
Step 3. Check if there are sessions in the system with a higher priority i 1 > j . If the condition is met, go to Step 2 with i = i 1 . If the condition is not met, the session is rejected.
Similarly to the previous model, we also define accepting, loss, and accepting with the maximum number of PRB sets of system states, as S k p r e , B k p r e , and S k max , k = 1 , , K , respectively. The first set, S k p r e , is defined as
S k p r e = { n X : n k < N k , ( i = 1 k 1 max ( n i b i ( n + e k ) , g i ) + i = k + 1 K max ( n i b i min , g i ) + + ( n k + 1 ) b k min C ( k < K , i = 1 k 1 max ( n i b i ( n + e k ) , g i ) + i = k + 1 K max ( n i b i min , g i ) + + ( n k + 1 ) b k min i = k + 1 K b i min ( n i N i g ) · I ( n i > N i g ) C ) ) } , k = 1 , , K ,
the second set, B k p r e , is provided by
B k p r e = { n X : n k = N k i = 1 k 1 max ( n i b i ( n + e k ) , g i ) + i = k + 1 K max ( n i b i min , g i ) + + ( n k + 1 ) b k min i = k + 1 K b i min ( n i N i g ) · I ( n i > N i g ) > C } , k = 1 , , K ,
and the last set, S k max , is defined in (12).
For pre-emptive service, the system of these sets should also be complemented with the pre-emption set of states, Π k , k = 1 , , K 1 , where a k-type session is accepted to the system, causing the pre-emption of lower priority sessions. This set is given by
Π k = { n X : n k < N k , i = 1 k 1 max ( n i b i ( n + e k ) , g i ) + i = k + 1 K max ( n i b i min , g i ) + + ( n k + 1 ) b k min > C , i = 1 k 1 max ( n i b i ( n + e k ) , g i ) + i = k + 1 K max ( n i b i min , g i ) + + ( n k + 1 ) b k min i = k + 1 K b i min ( n i N i g ) · I ( n i > N i g ) C } , k = 1 , , K 1 .
Consider now the process of session admission at the system. Particularly, when a new session arrives to the system, the following may happen:
  • If (i) upon arrival of the new k-type session there are more than b k min , k = 1 , , K , PRBs available, and (ii) the current amount of k-type sessions in service is smaller than N k , k = 1 , , K , this session is accepted to the system;
  • If (i) the arriving k-type session, k = 1 , , K 1 , observes less than b k min free PRBs in the system, and (ii) the current amount of k-type sessions in service is smaller than N k , and (iii) there are more than b k min PRBs occupied by lower priority sessions in the shared pool of resources, c, the session is admitted to the system causing the pre-emption of i = 2 K m i lower priority sessions;
  • In any other case, the session is rejected.
By utilizing the rules specified above, we can fully characterize the stochastic process X ( t ) describing the service of URLLC and eMBB sessions with the partial reservation strategy and pre-emptive priority. The arbitrarily chosen “central” state of the process is shown in Figure 3.
a ( n , n ) = λ k , if n = n + e k , n S k , k = 1 , , K , or n = n m + e k , n S k , n S k p r e , n i > m i , k , i = 1 , , K , n k μ k , if n = n e k , n k > 0 , k = 1 , , K ; , if n = n , k = 1 , , K ; 0 , otherwise .
As opposed to the non-pre-emptive system, the CTMC X ( t ) is non-reversible, implying that no product-form solution is available for this system. In this case, the steady-state distribution can be estimated numerically by solving the following set of linear equations:
p T A = 0 T , p T 1 = 1 ,
where A is an infinitesimal generator having elements a ( n , n ) defined in (21), with the shorthand notation ∗ provided by
= [ k = 1 K λ k I { n S k } + λ k I { n S k , n S k p r e , n i > m i , i = 1 , , K } + n k μ k ] .
Once the steady-state distribution vector p is obtained, one may proceed with the performance measures of the considered system that can be expressed as follows:
  • Drop probability of k-type session, p B k p r e , is given by
    p B k p r e = n 1 = 0 N 1 n K = 0 N K p ( n ) I { n B k p r e } ;
  • The pre-emption probability, p p r e k , that is, the probability that arbitrarily chosen sessions are dropped during ongoing service when k-type session is accepted to the system
    p p r e k = n 1 = 0 N 1 n K = 0 N K p ( n ) I { n Π k } .
Note that k ¯ i , U are defined in (16) and (17), respectively.

4. Numerical Results

In this section, we proceed to provide an illustrative example of the proposed mixed reservation- and priority-based traffic coexistence strategy. Specifically, we consider three services that have to be supported by the 5G NR air interface—URLLC, eMBB, and mMTC. According to the 5G International Mobile Telecommunications-2020 (IMT-2020) requirements specified in [4] and network slicing recommendations in 3GPP Technical Specification (TS) 23.501 and TS 38.300, URLLC should receive the highest priority and be served as there are absolutely no other types of traffic in the system reaching the drop probability of 10 5 . On the other hand, mMTC requirements are the loosest out of all these three types of services, requiring that no more than 1% of traffic is not delivered within 10 s. The eMBB service is characterized by the balanced requirements. Thus, in our numerical example, we assign the priorities accordingly.
The default system parameters utilized to produce the reported results in this section are shown in Table 1. Note that here, we explicitly compare two slice isolation schemes: (i) full reservation, where the whole set of resources, C = 39 PRBs, is equally divided between the slices, and (ii) partial reservation with priorities, where a set of resources is allocated to the shared pool. Note that in both cases, URLLC traffic is well isolated from the rest of the traffic and, thus, we will only consider performance degradation experienced by eMBB and mMTC.
We start with Figure 4 with the two critical metrics of interest, eMBB and mMTC session drop, p B 2 , p B 3 , and pre-emption probabilities, p p r e 2 , p p r e 3 , for two considered schemes as a function of the offered traffic load of URLLC, ρ 1 = λ 1 b 1 min / μ 1 . Note that the full reservation scheme is indicated by g k = 13 PRBs, while the mixed reservation- and priority-based is indicated by g k = 10 . In the latter case, there is the shared pool of nine PRBs that are shared between all types of traffic. By analyzing the session drop probability demonstrated in Figure 4a, one may observe that the mixed reservation- and priority-based mechanism outperforms full reservation in terms of the mMTC drop probability for low and moderate values of the ρ 1 . For both eMBB and mMTC traffic, the system is characterized by two regimes: (i) up until approximately ρ 1 = 15 , the mixed scheme performs better, (ii) after ρ 1 = 15 , the full reservation scheme outperforms the mixed one. The rationale is that prior to ρ 1 = 15 both eMBB and mMTC traffic efficiently utilize the shared pool of resources available. However, when the offered traffic load of highest priority URLLC sessions further increases, they start to occupy the shared pool of resources, aggressively leading to the performance loss of eMBB and mMTC traffic.
The price one has to pay for better session drop probability in the mixed reservation- and priority-based scheme is higher session pre-emption probability demonstrated in Figure 4b for the same system parameters. Here, we see that the session pre-emption probability is lower for the full reservation scheme across almost the whole range of the URLLC-offered traffic load ρ 1 . Notably, the mMTC traffic suffers less with the corresponding probabilities being quite close to each other. The rationale here is that short-lived lightweight traffic is better suited for priority service due to fine granularity in terms of the number of sessions that need to be interrupted to accommodate the arriving higher priority session. However, the elastic eMBB traffic suffers most with the difference reaching three times at approximately ρ 1 = 20 . Note that the pre-emption of a rare but long eMBB session has much higher negative impact compared to mMTC sessions, thus making the full reservation scheme better suited for the former type of traffic.
We finally proceed with the resource utilization of the system demonstrated in Figure 5 for the same set of input parameters as in Figure 4, as a function of URLLC offered traffic load, ρ 1 , and eMBB maximum requested rate, b 2 max . By analyzing the results presented in Figure 5a, we observe that across the whole range of ρ 1 the mixed strategy shows consistently better results by approximately 10%. Notably, in overloaded conditions with a certain level of isolation supported, the resource utilization is just 5% off from 100%. In fact, this is the best side of the considered mixed strategy. Qualitatively similar results are also observed in Figure 5b, where resource utilization of the system as a function of the eMBB maximum requested rate b 2 max is shown. Here, we might observe that as the system starts to be overloaded, the mixed scheme allows 95% of utilization to be reached, while the full reservation schemes remain at approximately 80%, resulting in slightly higher gains of around 15%.

5. Conclusions

In this paper, motivated by the need for simple mathematical models for RAT network slicing, we proposed and solved the model for mixed reservation- and priority-based traffic coexistence. The proposed framework aims to provide the balance between traffic isolation and efficient use of resources and also includes numerous service strategies as its special cases including full reservation, priority-only strategies, as well as mixed strategy without pre-emption. The system is formulated and solved by utilizing the tools of the queuing theory. We also demonstrated how the input parameters can be related to the wireless channel specifics including antennas and propagation models.
Our numerical results demonstrate that the proposed mixed reservation- and priority-based strategy allows resource utilization to be improved up to 95% while still providing isolation between traffic types in highly overloaded conditions. Compared to the full reservation strategy, the gains are in the range 10–15% across a wide range of system parameters. The mixed scheme is also better in terms of session drop probabilities for low and moderate offered traffic load of the highest priority sessions. However, elastic eMBB traffic benefits more from the full reservation strategy in terms of both drop and pre-emption probabilities.
One of the important advantages of the proposed approach is the simplicity of implementation, since for one of the models the steady-state probability distribution can be obtained by solving the system of local balance equations in a product form. However, for the model with pre-emption, the product-form solution is not available, so the steady-state distribution can only be estimated numerically by solving a system of linear equations. In addition, we considered 5G NR, which may operate in a mmWave or sub-6 GHz band. The proposed model is general and does not depend on the type of propagation environment and operational frequency.
In our future studies, the performance of the proposed algorithm on specific traffic sets and per-slice QoS/QoE (quality of Eexperience) will be evaluated. Moreover, propagation models that are closer to reality will also be utilized.

Author Contributions

Conceptualization, E.M., Y.G. and K.S.; methodology, D.I., E.M. and Y.G.; software, D.I.; validation, E.M. and Y.G.; formal analysis, E.M. and D.I; investigation, D.I.; resources, E.M. and D.I.; data curation, E.M.; writing—original draft preparation, D.I. and E.M.; writing—review and editing, Y.A., E.M. and Y.G.; visualization, Y.A.; supervision, E.M. and Y.G.; project administration, E.M., Y.G. and K.S.; funding acquisition, E.M. and K.S. All authors have read and agreed to the published version of the manuscript.

Funding

Section 2, Section 3 and Section 4 were written by Daria Ivanova, Yves Adou, and Yuliya Gaidamaka under the support of the Russian Science Foundation, project no. 22-79-10053, https://rscf.ru/en/project/22-79-10053/, accessed 1 September 2022. This paper has been supported by the RUDN University Strategic Academic Leadership Program (recipients Ekaterina Markova, Konstantin Samouylov, Section 1 and Section 5).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. ITU-T. Requirements of the IMT-2020 Network; ITU-T Rec. Y.3101; ITU-T: Geneva, Switzerland, 2018. [Google Scholar]
  2. ETSI. System Architecture for the 5G System; 3GPP TS 23.501 Version 15.2.0 Release 15; ETSI: Sophia Antipolis, France, 2018. [Google Scholar]
  3. Li, Y.; Zheng, J.; Li, Z.; Liu, Y.; Qian, F.; Bai, S.; Liu, Y.; Xin, X. Understanding the ecosystem and addressing the fundamental concerns of commercial MVNO. IEEE/ACM Trans. Netw. 2020, 28, 1364–1377. [Google Scholar] [CrossRef]
  4. Series, M. Minimum Requirements Related to Technical Performance for IMT-2020 Radio Interface(s); ITU-R M.2410-0; ITU: Geneva, Switzerland, 2017. [Google Scholar]
  5. Nakao, A.; Du, P.; Kiriha, Y.; Granelli, F.; Gebremariam, A.A.; Taleb, T.; Bagaa, M. End-to-end network slicing for 5G mobile networks. J. Inf. Process. 2017, 25, 153–163. [Google Scholar] [CrossRef] [Green Version]
  6. Li, X.; Ni, R.; Chen, J.; Lyu, Y.; Rong, Z.; Du, R. End-to-end network slicing in radio access network, transport network and core network domains. IEEE Access 2020, 8, 29525–29537. [Google Scholar] [CrossRef]
  7. ETSI. UMTS QoS Concept and Architecture; 3GPP TS 23.107 Version 4.1.0 Release 4; ETSI: Sophia Antipolis, France, 2001. [Google Scholar]
  8. Yan, M.; Feng, G.; Zhou, J.; Sun, Y.; Liang, Y.C. Intelligent resource scheduling for 5G radio access network slicing. IEEE Trans. Veh. Technol. 2019, 68, 7691–7703. [Google Scholar] [CrossRef]
  9. GSM Association. GSM Association Official Document NG.116 (11/2020); Generic Network Slice Template; Version 4.0; GSM Association: London, UK, 2020. [Google Scholar]
  10. ITU-T. Framework for the Support of Network Slicing in the IMT-2020 Network; ITU-T Rec.Y.3112; ITU-T: Geneva, Switzerland, 2018. [Google Scholar]
  11. Yarkina, N.; Correia, L.M.; Moltchanov, D.; Gaidamaka, Y.; Samouylov, K. Multi-tenant resource sharing with equitable-priority-based performance isolation of slices for 5G cellular systems. Comput. Commun. 2022, 188, 39–51. [Google Scholar] [CrossRef]
  12. Naddeh, N.; Jemaa, S.B.; Eddine Elayoubi, S.; Chahed, T. Proactive RAN Resource Reservation for URLLC Vehicular Slice. In Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 25–28 April 2021; pp. 1–5. [Google Scholar] [CrossRef]
  13. Ivanova, D.; Markova, E.; Moltchanov, D.; Pirmagomedov, R.; Koucheryavy, Y.; Samouylov, K. Performance of Priority-Based Traffic Coexistence Strategies in 5G mmWave Industrial Deployments. IEEE Access 2022, 10, 9241–9256. [Google Scholar] [CrossRef]
  14. Yang, W.; Li, C.P.; Fakoorian, A.; Hosseini, K.; Chen, W. Dynamic URLLC and eMBB Multiplexing Design in 5G New Radio. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–5. [Google Scholar] [CrossRef]
  15. Adou, Y.; Markova, E.; Gaidamaka, Y. Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework. Future Internet 2022, 14, 299. [Google Scholar] [CrossRef]
  16. Zhang, H.; Pan, G.; Xu, S.; Zhang, S.; Jiang, Z. A Hard and Soft Hybrid Slicing Framework for Service Level Agreement Guarantee via Deep Reinforcement Learning. In Proceedings of the 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 19–22 June 2022; IEEE: Piscataway, NJ, USA, 2022. [Google Scholar] [CrossRef]
  17. Kumar, N.; Ahmad, A. Machine learning-based QoS and traffic-aware prediction-assisted dynamic network slicing. Int. J. Commun. Netw. Distrib. Syst. 2022, 28, 27–42. [Google Scholar] [CrossRef]
  18. Salhab, N.; Langar, R.; Rahim, R.; Cherrier, S.; Outtagarts, A. Autonomous Network Slicing Prototype Using Machine-Learning-Based Forecasting for Radio Resources. IEEE Commun. Mag. 2021, 59, 73–79. [Google Scholar] [CrossRef]
  19. 3GPP. Study on Channel Model for Frequencies from 0.5 to 100 GHz (Release 14); 3GPP TR 38.901 V14.1.1; 3GPP: Sophia-Antipolis, France, 2017. [Google Scholar]
  20. Kovalchukov, R.; Moltchanov, D.; Gaidamaka, Y.; Bobrikova, E. An accurate approximation of resource request distributions in millimeter wave 3GPP new radio systems. In Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 19th International Conference, NEW2AN 2019, and 12th Conference, ruSMART 2019, Proceedings 19, St. Petersburg, Russia, 26–28 August 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 572–585. [Google Scholar]
  21. Sopin, E.; Moltchanov, D.; Daraseliya, A.; Koucheryavy, Y.; Gaidamaka, Y. User Association and Multi-connectivity Strategies in Joint Terahertz and Millimeter Wave 6G Systems. IEEE Trans. Veh. Technol. 2022, 71, 12765–12781. [Google Scholar] [CrossRef]
  22. Moltchanov, D.; Sopin, E.; Begishev, V.; Samuylov, A.; Koucheryavy, Y.; Samouylov, K. A tutorial on mathematical modeling of 5G/6G millimeter wave and terahertz cellular systems. IEEE Commun. Surv. Tutor. 2022, 24, 1072–1116. [Google Scholar] [CrossRef]
  23. Constantine, A.B. Antenna theory: Analysis and design. In Microstrip Antennas, 3rd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2005. [Google Scholar]
  24. 3GPP. NR; Physical Channels and Modulation (Release 15); 3GPP TR 38.211; 3GPP: Sophia-Antipolis, France, 2017. [Google Scholar]
  25. Moltchanov, D. Distance distributions in random networks. Ad. Hoc. Netw. 2012, 10, 1146–1166. [Google Scholar] [CrossRef]
Figure 1. The considered system model and its formalization in terms of a queueing system: (a) system model, (b) queueing model.
Figure 1. The considered system model and its formalization in terms of a queueing system: (a) system model, (b) queueing model.
Mathematics 11 01046 g001
Figure 2. Algorithm for selecting sessions that could be pre-empted.
Figure 2. Algorithm for selecting sessions that could be pre-empted.
Mathematics 11 01046 g002
Figure 3. Transition probabilities of the central state.
Figure 3. Transition probabilities of the central state.
Mathematics 11 01046 g003
Figure 4. Drop and pre-emption probabilities: (a) eMBB and mMTC drop probabilities, (b) URLLC and eMBB pre-emption probabilities.
Figure 4. Drop and pre-emption probabilities: (a) eMBB and mMTC drop probabilities, (b) URLLC and eMBB pre-emption probabilities.
Mathematics 11 01046 g004
Figure 5. System resource utilization: (a) varying ρ 1 , (b) varying b 2 max .
Figure 5. System resource utilization: (a) varying ρ 1 , (b) varying b 2 max .
Mathematics 11 01046 g005aMathematics 11 01046 g005b
Table 1. Parameters utilized for numerical assessment.
Table 1. Parameters utilized for numerical assessment.
ParameterValue
Arrival intensity of URLLC sessions10,000 sess./s
Arrival intensity of eMBB sessions1 sess./s
Arrival intensity of mMTC sessions10,000 sess./s
Mean service time of URLLC sessions1 ms
Mean service time of eMBB sessions10 s
Mean service time of mMTC sessions1 ms
Overall amount of resources in the system39 PRB
Amount of reserved resources for URLLC10, 13 PRB
Amount of reserved resources for eMBB10, 13 PRB
Amount of reserved resources for mMTC10, 13 PRB
Resource requirement of URLLC sessions1 PRB
Minimum resource requirement of eMBB sessions1 PRB
Maximum resource requirement of eMBB sessions3 PRB
Resource requirement of mMTC sessions1 PRB
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ivanova, D.; Adou, Y.; Markova, E.; Gaidamaka, Y.; Samouylov, K. Mathematical Framework for Mixed Reservation- and Priority-Based Traffic Coexistence in 5G NR Systems. Mathematics 2023, 11, 1046. https://doi.org/10.3390/math11041046

AMA Style

Ivanova D, Adou Y, Markova E, Gaidamaka Y, Samouylov K. Mathematical Framework for Mixed Reservation- and Priority-Based Traffic Coexistence in 5G NR Systems. Mathematics. 2023; 11(4):1046. https://doi.org/10.3390/math11041046

Chicago/Turabian Style

Ivanova, Daria, Yves Adou, Ekaterina Markova, Yuliya Gaidamaka, and Konstantin Samouylov. 2023. "Mathematical Framework for Mixed Reservation- and Priority-Based Traffic Coexistence in 5G NR Systems" Mathematics 11, no. 4: 1046. https://doi.org/10.3390/math11041046

APA Style

Ivanova, D., Adou, Y., Markova, E., Gaidamaka, Y., & Samouylov, K. (2023). Mathematical Framework for Mixed Reservation- and Priority-Based Traffic Coexistence in 5G NR Systems. Mathematics, 11(4), 1046. https://doi.org/10.3390/math11041046

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop