Abstract
The network slicing of physical infrastructure is required for fifth-generation mobile networks to make significant changes in how service providers deliver and defend services in the face of evolving end-user performance requirements. To perform this, a fast and secure slicing technique is employed for node allocation and connection establishment, which necessitates the usage of a large number of domain applications across the network. PROMETHEE-II and SLE algorithms were used in this study’s approach to network design for node allocation and link construction, respectively. The PROMETHEE-II approach takes into account a variety of node characteristics while constructing a node importance rank array (NIRA), including the node capacity, bandwidth of neighboring connections, degree of the node, and proximity centrality among others. The SLE method is proposed to record all possible link configurations for the network slice request (NSR) nodes to guarantee that the shortest path array (SPA) of the NSR has a high acceptance rate. Performance metrics such as the service revenue and acceptance ratio were considered to evaluate the effectiveness of the suggested approach. The effectiveness of network slicing has been further examined under different infrastructure models to determine whether a small-world network structure is beneficial to 5G network. For each scenario, simulations were carried out and the results were compared to previously published findings from other sources.
Keywords: 5G network, virtual network embedding, resource allocation, heuristic fuzzy, shortest path
1. Introduction
In recent years, private and commercial 5G mobile networks have faced enormous mobile traffic due to a growth in the use of portable devices by consumers. In the near future, 5G technology is projected to assist many new enterprises and vertical sectors, including transportation, healthcare, and the energy supply chain. A highly sophisticated 5G architecture [1] is required for providing high-level, continuous, and reliable service to user equipment (UE) with a broad variety of needs. The next generation mobile networks (NGMN) by Alliance established the network slicing idea to achieve resource allocation for user devices with varying performance needs in 5G network settings [2]. Individual slices of physical infrastructure are created based on the grouping of requirements through a set of virtual network functions (VNFs) that have virtual resources, logical topology, traffic regulation, and node and link provisioning rules, as well as security monitoring parameters to guarantee the quality of service (QoS) [3]. The 5G system architecture that supports network slicing was previously established in the first edition of 5G normative standards and was authorized by the 3rd Generation Partnership Project (3GPP) [4]. According to the physical architecture, each logical network slice is generally made up of three key components: the radio access network (RAN) and the core network (CN) [5]. The logical networks are shown in Figure 1 with the components separated, assuming that the physical infrastructure is being used as a shared resource. RAN behavior was investigated in the work [6] by taking into account the criteria associated with the quality of service in order to provide a dependable service to the UE. Nojima et al. [7] dealt with network isolation in their study, and they allocated resources using traditional packet scheduling and dynamic resource block allocation techniques. In an orthogonal frequency division multiple access (OFDMA) context, network slicing and resource allocation based on a sub-carrier and power were performed in [8], where the maximization of the network summation rate was treated as the objective function, with the traffic rate of each slice assumed. In [9], network slices were found to be chains of virtual network functions and real resources to meet the varying needs of end users, leading a variety of studies on the issue of VNF deployment and orchestration.
Figure 1.
Architecture of 5G mobile network with slicing.
In [10], the VNF orchestration problem was framed as an integer linear program and addressed using a heuristic method, with the cost function consisting of the VNF deployment cost, the energy cost, the traffic cost, and the propagation delay cost. Another solution, known as WiNE (wireless network embedding) [11], was developed to address the issue of VNF placement in large-scale installations. For the purpose of solving the VNF placement issue according to requests, WiNE examines three various situations, including linear VNF requests, branching VNF requests, and VNF requests containing loops, among others. Using software-defined networking (SDN) and VNF together was detailed in [12] to provide network slicing, which also covered the underlying principles, designs, and challenges of the two techniques. Recent research shows that VNF-based network slicing is superior to SDN when it comes to increasing the profit and maximizing the utilization of resources. A thorough examination of the strategies for providing logical network nodes and connections from physical resources, which is referred to as the virtual network embedding (VNE) issue, is provided in [13]. VNE is also known as network slice provisioning, and [14] provides a framework for allocating physical resources to logical networks. According to previous network slicing research findings, network slice provisioning becomes difficult in many ways, including ensuring the highest possible acceptance ratio, secure data transmission, and a low latency, and providing service for a diverse range of user requirements [15,16].
In response to the concerns identified in the literature, a hybrid approach to node slice provisioning was devised. The physical network architecture was also designed to make the network slice more user-friendly. The PROMETHEE and SLE algorithms were used in this research to allocate nodes and create connections for the logical networks inside the physical network. This project was completed in two independent stages. First, a node importance ranking array (NIRA) was constructed using PROMETHEE-II and various node attributes, and then nodes were assigned according to the NIRA. This was performed in the following step, while the SLE algorithm establishes a link between the targeted nodes. The following are the primary contributions of the planned work:
A mathematical model is introduced for network slicing that takes operational constraints and security considerations into account when assigning nodes and connecting them.
The prepared node importance rank array (NIRA) was used to allocate NSR nodes in physical and logical networks, and the SLE approach was utilized to connect the network slice request (NSR) nodes. NIRA preparation takes into account node information such as the node capacity, nearby line bandwidth, degree of the node, and the node’s proximity centrality.
A PROMETHEE-II multi-criteria approach is suggested for NIRA preparation, and an SLE algorithm is provided for NSR node link creation. The SLE approach generates the shortest path array (SPA) for NSR nodes, guaranteeing that all possible connections are installed and increasing the acceptance percentage.
The proposed PROMETHEE-SLE approach was evaluated on a small-world network to confirm that the infrastructure is slicing-friendly, and the results were also compared to those obtained from a scale-free physical infrastructure.
2. Related Works
The current efforts for optimum resource allocation in 5G network slicing, as well as their extensive performance comparisons and strategies used, are discussed in this section. VNE methods from the ViNEYard (virtual networks embedding yard) library, D-ViNE, and R-ViNE (deterministic and random rounding) were used in [17] to solve a network resource allocation problem adopted as a mixed integer program via substrate network augmentation. The concepts of virtualization and service orientation that are employed in networking technology make cloud-based networking viable [18]. The authors of [19] presented a deployment method based on complex network theory, with the goal of optimizing the resource efficiency and acceptance ratio while minimizing costs. It is recommended that two phases are completed in the proposed method: (i) the installation of virtual network functions and (ii) the selection of link route options. A further evaluation of the suggested approach’s efficacy was carried out by comparing the solution to those obtained with simulated annealing (SA) [20], the VNE algorithm based on LAVA [21], and VNF placement achieved by the GLL method [22]. Ref. [23] deployed VNFs using network topology and resource-based algorithms (VNE-NTANRC).
All substrate and virtual nodes were ranked using computed node values (NoV), which are defined by network topology characteristics and global network resources. In addition to the average VNR acceptance ratio, the method’s performance was measured by average node and link utilization. For the purpose of improving the quality of service, a slice-based physical resource sharing scheme was implemented in a non-orthogonal multiple access system (NOMA) [24]. The optimization of the total user rate remains the objective function in this technique, which is expressed as a Markov decision process issue for the allocation of subcarriers. In [25], network slicing for enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) requests was provided by considering optimizing the spectral efficiency as the goal function that is subject to the reliability constraint. Using the orthogonal frequency division multiple access (OFDMA) technology, the slice model was created, and the problem was addressed using the joint power and subcarrier allocation (JPSA) approach. Adaptive particle swarm optimization was used to demonstrate the usefulness of the suggested technique (APSO) [26]. For the production of node ranking, the VIKOR technique, which is one of the multi-criteria decision-making approaches, was introduced in [27]. The provisioning of virtual network nodes was carried out in accordance with the node ranking that had been developed for the physical and logical networks. It was decided to use Floyd’s method for link provisioning in order to offer the shortest route for the NSR nodes.
Recently, machine learning and deep learning methods have been applied to the problem of resource allocation in virtual networks [28,29]. Slicing categorization, data collection, and slicing extraction were all part of the process used to create network slices. GS-DHOA (glow-worm swarm-based deer hunting optimization algorithm) was also used to improve the weight function of the training network [28]. The provisioning of nodes and connections for virtual networks in physical networks was carried out in accordance with the categorization results of the virtual networks. A scalable digital twin (DT) for network slicing is presented in [29], with the goal of capturing and monitoring the end-to-end (E2E) metrics of slices across a wide range of network settings while maintaining scalability. Table 1 summarizes the literature’s discussion of the objectives, node and link provisioning procedures, security problems, and physical network.
Table 1.
Summary of literature.
Ref. No. | Objectives | Node Provisioning for NSR Nodes |
Link Provisioning for NSR Nodes |
Physical Network | Resource | Security Issues |
---|---|---|---|---|---|---|
[17] | Slice acceptance ratio and revenue-to-cost ratio | Deterministic and random rounding | Deterministic and random rounding | Scale-free | Bandwidth and CPU capacity | Not considered |
[19] | Acceptance ratio and resource efficiency | Acceptance ratio and resource efficiency | k shortest path Floyd algorithm | Scale-free | Bandwidth and CPU capacity | Not considered |
[20] | Acceptance ratio and resource efficiency | Simulated annealing | Simulated annealing | Scale-free | Bandwidth and CPU capacity | Not considered |
[21] | Acceptance ratio and resource efficiency | LAVA approach | LAVA approach | Scale-free | Bandwidth and CPU capacity | Not considered |
[22] | Acceptance ratio and resource efficiency | GLL approach | GLL approach | Scale-free | Bandwidth and CPU capacity | Not considered |
[23] | Slice acceptance ratio and revenue-to-cost ratio | Greedy node mapping | Dijkstra’s algorithm | Scale-free | Bandwidth and CPU capacity | Considered |
[24] | Resource utilization and outage probability and resource efficiency | Markov decision process | Markov decision process | Scale-free NOMA | Power and subcarrier | Considered |
[25] | Spectral efficiency and reliability | JSPA | JSPA | Scale-free OFDMA | Power and subcarrier | Not considered |
[26] | Spectral efficiency and reliability | APSO | APSO | Scale-free OFDMA | Power and subcarrier | Not considered |
[27] | Slice acceptance ratio and revenue-to-cost ratio | Node ranking using VIKOR | k shortest path algorithm | Scale-free | Bandwidth and CPU capacity | Considered |
[28] | Slice classification accuracy | DBN and NN, GS-DHOA for weight function adjustments | DBN and NN, GS-DHOA for weight function adjustments | - | Performance dataset consists of network features | Considered |
[29] | Latency and training loss | GNN model with DT | GNN model with DT | - | Performance dataset consists of network features | Considered |
Proposed | Acceptance ratio and resource efficiency | Node ranking using PROMETHEE II | SPA formation through Dijkstra’s algorithm | Small-world network and scale-free network | Bandwidth and CPU capacity | Considered |
The acceptance rate and resource efficiency are the fundamental objectives of the majority of research investigations. The distinction between the implemented approaches is based only on the process for deploying VNFs. In this suggested research, PROMETHEE-II and SLE algorithms were employed to install VNFs in the physical infrastructure. Additionally, almost all of the methodologies for network slicing make use of a scale-free network model [30], which has some drawbacks in terms of identifying the shortest pathways for NSRs. Scale-free network models will be less efficient when NSRs are more closely scheduled and also have a longer life-time. This initiative aims to construct a slice-friendly physical infrastructure in order to maximize benefits to stakeholders with the fewest possible facilities. The small-world network is one of the physical network infrastructures proposed for future wireless mobile networks. Experiments in [31] were performed to make a complete investigation of the small-world network. This research adopted the Watts–Strogatz [32] small-world network concept to develop a slicing-friendly physical design. The most important breakthrough in this work is the utilization of the small-world network for the construction of physical infrastructure. Utilizing a small-world network results in improvements to the bandwidth, as well as CPU resources.
3. Proposed System Model
3.1. Physical Infrastructure Model
The most important aspect of network slicing is the physical infrastructure. The Watts–Strogatz [32] small-world network model is best suited for a network with a fixed number of nodes. Small-world networks feature sub-networks with connections between any two nodes that have a high clustering coefficient, allowing for many pathways between nodes. This network model is built in two phases, which are as follows:
Step 1: Create an undirected graph with N nodes linked to M nearby nodes, assuming on either side of nodes. Any edge (i, j) might be created in a network of nodes () only if it satisfies the following condition:
(1) |
Step 2: Rewire the probability for each edge with . This is accomplished by substituting for , where k is evenly picked at random from all nodes. The value of is considered as any number between 0 and 1. The foregoing two procedures result in the creation of an undirected physical network with N nodes and connections, , where indicates the set of nodes and denotes the set of linkages in the physical structure. As with earlier research, this approach evaluates the node capacity and security power level for each node. The capacity of a node is determined by the number of CPUs that are available. The total number of CPUs available in the node is defined as . The security of the physical node is denoted by , which represents the highest level of security that a physical node may provide to the NSR node. The primary parameter for connections linking nodes i and j is the link’s bandwidth, . The lengths of the various connections are supplied in order to discover the shortest route between any two nodes. For example, the variable stores the length of the line between the nodes i and j.
3.2. NSR Model
This study made the assumption that each NSR requires the specified number of nodes, CPU capacity, bandwidth, security, and lifetime. Hence, the NSR request was modeled as an undirected graph where indicates the set of nodes in NSR and denotes the set of linkages in NSR. Each node consists of , where is the CPU capacity of the NSR. is the security power level of the associated NSR. is the lifetime of the NSR. is the set of bandwidth requirements of requested links in NSR [33]. During each interval, the physical infrastructure was used to allocate nodes and establish links for the NSR. Each time a new NSR is received, the physical infrastructure’s available resources were updated depending on the preceding request’s .
3.3. NSR Deployment Strategy
Each NSR was deployed on the physical network in two successive steps. First, the NSR’s nodes were allocated in accordance with the NIRA developed for both physical and logical networks. Second, the creation of links was carried out based on the SPA through SLE. Basically, the NIRA is a dynamic array that must be updated once each slice request is processed. Link mapping begins once nodes are allocated through the mapping of NIRAs for the physical and logical networks. SPA is created for link mapping using the SLE method, which employs Dijkstra’s algorithm [34] to determine the shortest route between two nodes. Figure 2 illustrates the phases involved in the NSR deployment method.
Figure 2.
NSR deployment strategy with NIRA and SPA.
- NSR Acceptance Ratio (NAR): This metric provides the direct measurement of the adapted network slicing technique on the given physical infrastructure. It is measured by taking the ratio between successfully completed NSRs and unsuccessful NSRs for a given time , which is expressed as
where and are served and unserved NSR at time t, respectively.(2) - Resource Efficiency (RE): This metric is measured by calculating the achieved revenue and the investment cost made for providing the physical infrastructure. The revenue can be determined from the CPU capacity of nodes and link bandwidth requested for the NSRs. The investment cost is estimated from the physical infrastructure for the case. The expression for calculating RE is given by
(3) (4)
where is the revenue of NSR at time t, is the utilized physical infrastructure for the NSR at time t, and are the requested numbers of CPU and BW of NSR at time t, and is the length of the shortest path for NSR at time t.(5) - Problem Formulation: It is understandable that effective network slicing results in the maximum utilization of physical network resources while minimizing slice provisioning costs [27]. As a result, the problem of minimizing the cost of slice provisioning is formulated using the integer linear programming model in conjunction with the necessary constraints as shown below.
(6) (7) (8) (9) (10) (11)
is a binary variable, where indicates that is served onto , and is otherwise 0. indicates whether the link hosts the request link : the value will be 1 if the link exists; otherwise, it will be 0. Network providers use some additional resources to ensure the security level of nodes. Along with CPU capacity and bandwidth, we also considered the link capacity, delay rate, and jitter resources to improve the allocation of resources and accuracy of node slice creation. Constraint (7) guarantees that each request node is allocated onto the physical node. Constraint (8) ensures that the physical node can only host one node from the same request. The CPU capacity is represented in constraint (9). Constraint (10) ensures the security constraints of each node. Constraint (11) indicates the flow passing through physical nodes. Constraint (12) guarantees that the bandwidth requested by the NSR link should not exceed the available bandwidth in the physical link. The objective of this work was to improve the use of resources and the adoption rate of network slicing. Physical infrastructure restrictions were kept in mind as part of this solution method. Every NSR requirement is guaranteed to be within the stated limits given below:(12) (13) (14) (15) (16) (17)
where and are the minimum and maximum number of nodes per NSR, respectively, and are the minimum and maximum number of BW per NSR, respectively, and are the minimum and maximum number of CPUs per node per NSR, respectively, and are the minimum and maximum life time per NSR, respectively, and and are the minimum and maximum security level per node per NSR, respectively. The limitations specified in Equations (12)–(16) correspond to the NSR limits on the node count, bandwidth, CPU capacity, security level, and life duration. Constraint (17) ensures that the NSR’s lifetime does not exceed the overall transmission time interval .(18)
3.4. Factors for Node Importance Calculation
This problem takes into account four crucial aspects that might have an impact on every node in a complex network. The NIRA of nodes in a network is created depending on the value of the variables that have been determined for them. It is derived from the basic complex network theory that the formulations for the factors are derived.
- Node Capacity Factor (NCF): The availability of the number of CPUs on the node is used to determine the capacity of the node. A node with a higher number of CPUs may give service to a greater number of NSRs. As a result, a node with a large number of CPUs should be given a better ranking in the NIRA system. The value of the factor is updated immediately upon the accomplishment of each NSR as below:
where is the available CPU capacity of the node of physical infrastructure at time t, and is the requested CPU capacity of the node of the NSR received at time t.(19) - Node Topology Factor (NTF) and Node Bandwidth Factor (NBF): In both cases, the number of adjacent connections present with the physical node determines the NTF and NBF. The total number of adjacent connections of a node is represented by NTF, whereas the total number of adjacent links bandwidth is represented by NBF. Any node with a greater NTF and NBF is given a higher priority in the NIRA. Each NSR results in an update of the factors. The equations for updating the factors are shown below:
(20)
where is the total nodes present in the network, is 1 if the node has a connection with node and unserved at time t, and 0 otherwise, is the available bandwidth of the link connecting node i and node j of physical infrastructure at time t, and is the requested bandwidth of the link connecting node i and node j of the NSR at time t.(21) - Node Closeness Centrality Factor (NCCF): Using the factors NCF, NTF, and NBF, we may learn about the node’s local information. A node’s strength in a network should be measured by how much it can influence the shortest path. A node’s global relevance is determined by its shortest route information, which is provided by NCCF. Therefore, the closer a node is to other nodes, the greater its centrality. Listed below is the NCCF equation at time t.
where is the shortest path length between node i and j.(22)
4. Proposed Strategies for NSR Deployment
4.1. PROMETHEE-II Strategy for NIRA Preparation
The preparation of the NIRA was used to carry out the node allocation of the logical structure on the physical structure in this piece of work. The NIRA for physical infrastructure was developed before receiving the NSR, and the same for the logical structure was prepared upon receipt of the NSR, respectively. The value of each node was determined by a variety of elements engaged in the network connecting to the node, including the NCF, NTF, NBF, and NCCF. Consequently, it is critical to construct the ranking without compromising the specifics of the node’s configuration. A famous multiple-criteria decision-making approach established by Brans [35] was utilized for NIRA preparation, and PROMETHEE-II was one of the methods employed. More precisely, the preferences of and differences in the elements were taken into account by this technique. The following are the stages that are involved in the PROMETHEE-II approach:
Step 1: Preparation of evaluation table. The evaluation table keeps the values of factors for each node. Therefore, the factors of each node are evaluated with their respective weight parameters for preparing Table 2. It is assumed that is a set of nodes and is a set of factors.
Table 2.
Evaluation table.
. | . | . | . | . |
. | . | . | . | . |
Step 2: Determination of preference function. This value is determined by the pairwise comparison between all of the nodes for each factor of a network.
(23) |
where refers to the difference between the evaluations of two actions for factor . The preference function is introduced to convert the unified value to the following:
(24) |
Step 3: Determination of global preference index.
(25) |
where is a weight function of factor k, which is assumed to be greater than 0, and the sum of the weights is equal to 1.
Step 4: Determination of positive and negative outranking flows. The following two factors are calculated to locate each node with respect to all other nodes.
(26) |
(27) |
where is obtained by ranking the nodes according to the non-increasing values of their respective positive flow values. and is obtained by ranking the nodes according to the non-decreasing values of their respective negative flow values.
Step 5: Determination of net flow.
(28) |
The highest value of refers to the best node in NIRA. Algorithm 1 is used to explain the process of node allocation through NIRA.
Algorithm 1: Node allocation through PROMETHEE-II |
Input: Output: for each node of do Calculate for Physical infrastructure using PROMETHEE-II end for for each node of do Calculate Prepare for NSR using PROMETHEE-II end for Set allocationTrack=0 for each node of do if is not empty then for each node of do if and then node Allocation to Update and of and Update else Move to next node end if end for else if allocationTrack= then Return NSR node allocation unsuccessful else Return NSR node allocation success end if end for return |
4.2. SLE Strategy for SPA Preparation
Identifying the shortest route for the NSR nodes in the physical infrastructure is the primary goal of this SLE technique. Regarding NSR, it is clear that sometimes the most direct route is not the best one. In certain cases, a connection in the chosen shortest route may be connected to the already supplied NSRs. This makes an identification of all of the connections linking NSR nodes and organizing them in SPA in a non-increasing order according to the length of their individual pathways very necessary. This array may be used for the establishment of a connection for NSRs. It is anticipated that the shortest pathways indicated would be referred to one after another throughout the connection building process. The SPA chooses the path with the shortest length among those that are not engaged for link provisioning. Algorithm 2 is used to explain the process of preparing SPA.
Algorithm 2: SLE for SPA preparation |
|
4.3. Hybrid PROMETHEE-II and SLE Approach for Deployment
This operation allots a node and establishes a connection between the nodes of the NSRs that have been received during the time interval from 0 to . Throughout this study, it was assumed that all of the required NSR nodes belong to a single category, such as eMBB, mMTC, or URLLC. A NSR should be able to request any slice type at any point in time. The PROMETHEE-II method was used to allocate nodes for the NSRs, and the SLE algorithm, which is based on Dijkstra’s shortest route algorithm, was used to construct links between them. The hybrid PROMETHEE-II and SLE algorithms were used to obtain the best possible optimum provisioning for the NSR. In the physical infrastructure, the NIRA and SPA were updated in accordance with the lifetime of the received NSR, which allows for the identification of the most appropriate and optimum provisioning for the next arrival of NSR. As a result, the dynamic allocation of NSRs in the physical infrastructure was made effective and efficient. The success rate and resource efficiency of slice provisioning are two major indicators that are used to evaluate the efficacy of slice provisioning. This is accomplished by Algorithm 3 for the proposed hybrid algorithm, which allocates resources for NSRs for the maximum amount of time . The flowchart in Figure 3 depicts the sequence of events that occur throughout the whole solution method.
Algorithm 3: NSR deployment through hybrid PROMETHEE-II and SLE |
|
Figure 3.
Depicts the sequence of events that occur throughout the whole solution method.
5. Simulation Results and Discussions
The suggested technique was validated using two distinct scenarios: (i) an implementation of the proposed hybrid PROMETHEE-II and SLE algorithm for NS, and (ii) an implementation of the algorithm with varying physical infrastructure provisions. The resource efficiency and acceptance ratio of the scenarios were used to determine their level of competence. The factors taken into consideration for the test case are included in Table 3, which covers the range of available resources in the physical infrastructure, as well as the range of NSRs needs for the test scenario. In order to build the simulation platform, we used the Python programming language.
Table 3.
Test case parameters.
Definitions | Descriptions | Range |
---|---|---|
The distribution of available security level of a node in real number | (0–1) | |
The distribution of CPU for each node in unit | U[30, 60] | |
The distribution of bandwidth of each links in unit | U[30, 60] | |
L | The distribution of length of the links | U[1, 5] |
The total number of NSRs arrived in the time frame | U[5, 35] | |
The distribution of nodes for each NSR | U[10, 30] | |
The distribution of CPU requirement | U[5, 25] | |
The distribution of bandwidth requirement | U[5, 25] | |
The distribution of required security level of a node in real number | (0–0.5) | |
The time duration of each NSR | T[10, 40] |
5.1. Implementation of Proposed Algorithm for NSR Resource Allocation
According to the Watts–Strogatz model, physical infrastructure is developed in order to execute the suggested algorithm. This infrastructure is based on the small-world network. The competence of the suggested technique was evaluated in comparison to works published in the literature, including NSR-NR [19], SA [20], LAVA [21], GLL [22], and VIKOR [27]. In order to ensure that the results of different algorithms are more comparable, the same parameters were used in all of them. The NS’s resource efficiency and acceptance ratio were taken into account while evaluating the algorithms’ performance. This study evaluated the number of nodes required by NSRs in various categories, such as 10, 20, and 30 in the context of the physical infrastructure availability of 100, 200, and 300 nodes [19,22,27]. All network features, such as the CPU capacity of each node, security level of each node, bandwidth of the connections, and length of the lines, had their respective values chosen at random from a pool of values within the defined range.
The resource efficiency and acceptance ratios achieved for the various algorithms under various operating situations are shown in Figure 4 and Figure 5. To facilitate a comparison, several techniques were used to allocate nodes and connections for various NSRs. Regarding the overall observation regarding resource efficiency and NSRs, it is evident from Figure 4 that the network’s resource efficiency declines as the number of NSRs rises, whereas the number of nodes in the physical infrastructure enhances the efficiency. As can be seen from the resource efficiency equation, increasing the number of nodes in a network reduces the shortest route length, resulting in a better use of available resources. Additionally, the increased number of NSRs necessitates the allocation of additional nodes with the needed CPU capacity and bandwidth. The proposed method achieves a resource efficiency of 0.73, 0.68, and 0.66 for NSRs 10, 20, and 30, respectively, for an infrastructure equipped with 100 nodes, as shown in Figure 4a. As seen in Figure 4b,c, the efficiency rises as the number of nodes grows to 200 and 300, resulting in a maximum efficiency of 0.9 under 10 NSRs for a 300-node physical resource. Additionally, it supports a maximum of 17,554 CPUs and a minimum of 2921 CPUs within the infrastructure of 100 and 300 nodes, respectively. Additionally, a maximum of 16,676 and a minimum of 2775 bandwidth are used under the same operating state. When comparing the performance of the methods, the suggested approach outperforms the others under a variety of operating situations and with variable NSRs.
Figure 4.
Resource efficiency under (a) 100, (b) 200, and (c) 300 nodes in physical infrastructure. Proposed method performance is compared with existing methods such as NSR-NR [19], SA [20], LAVA [21], GLL [22], VIKOR [27].
Figure 5.
Acceptance Ratio under (a) 100, (b) 200, and (c) 300 nodes in physical infrastructure. Proposed method performance is compared with existing methods such as NSR-NR [19], SA [20], LAVA [21], GLL [22], VIKOR [27].
Among the various methods, the technique based on VIKOR achieves the best results since it employs MCDM-based node ranking for node provisioning and Floyd’s shortest route algorithm for link provisioning. In comparison to all other algorithms, the technique based on GLL has the lowest performance. The other algorithms, such as NSR implementation, an SA-based method, and LAVA, all outperformed GLL. When a network is equipped with 100 nodes and requires 30 NSRs, the GLL algorithm records 0.44 as the minimum value for resource efficiency. The suggested technique for the acceptance ratio was analyzed using various values of NSRs () ranging from 5 to 35. The NSRs’ lifetimes were chosen at random from the defined range. The findings obtained after the algorithms were successfully executed under various physical infrastructure conditions and are shown in Figure 5.
The data demonstrate that, as the () value is raised, the acceptance ratio decreases even though the number of physical nodes is increased. However, having more nodes in the physical structure results in a much higher acceptance percentage. Additionally, the acceptance ratio increases when the life of the NSRs decreases. The proposed technique achieves a maximum acceptance ratio of 0.99 when ten NSRs are used in conjunction with the 300 accessible nodes. The minimal acceptance ratio is 0.687 when 35 NSRs are used in conjunction with 100 accessible nodes. In contrast to previous algorithms, the suggested approach outperforms them under a variety of operating situations. Among the five algorithms, the technique based on VIKOR achieves the second-best result, which is comparable to the PROMETHEE-II-SLE algorithm’s findings. The lowest acceptance ratios are 0.5848 and 0.6069 for 35 NSRs under 100 available nodes, respectively, when network slicing is performed using the LAVA and GLL approaches.
5.2. Implementation of the Algorithm under Different Physical Infrastructure Networks
The effectiveness of the proposed algorithm was further validated with different working conditions under two different physical infrastructure networks. We considered a scale-free network (SFN) and small-world network (SWN) for the performance investigation. The characteristic behaviors of the two networks are entirely different.
The construction of the SWN and SFN was carried out in this study by using the Watts–Strogatz model and the Barabsi–Albert model [30], respectively. The comparison of the two networks has been carried out for many decades, and the findings show that the SWN has more benefits than the SFN since it can connect practically any two nodes in a network, but the SFN cannot. The purpose of this research was to determine the efficacy of the SWN for NSRs, since several studies have been conducted using an SFN for NSRs [19,20,21,22,27]. The physical infrastructure based on the SFN and SWN is being built using the nodes 100, 200, and 300, which are currently available.
Similarly to the previous work, the values for the NSR parameters were chosen at random from a predefined range of possibilities. The proposed technique was tested on two networks that operate under a variety of diverse situations. The number of NSRs was modified from 10 to 30, and the findings acquired after the algorithm was executed were recorded in a spreadsheet. Figure 6a depicts the resource efficiency of distinct NSRs that are provided under two different network configurations. It can be seen in the figure that the efficiency of network slicing is significantly improved when the network is organized according to the SWN topology. When the number of NSRs in a network is increased, the resource efficiency of both networks suffers a decline. The growth in the number of nodes in the infrastructure, on the other hand, enhances the efficiency in both circumstances. The resource efficiency is reported as 0.44 when using an SFN for serving 30 NSRs under a 100-node availability; however, the resource efficiency is recorded as 0.65 when using an SWN for serving 30 NSRs under a 100-node availability. As a result, an SWN-based network topology allows for better network slicing even during periods of high demand while using fewer resources. The SWN, on the other hand, performs much better as the amount of resources available is increased.
Figure 6.
(a) Resource efficiency vs. number of NSRs node under number of nodes in physical infrastructure (100, 200, 300). (b) Acceptance ratio vs. number of NSRs node (10, 20, 30) under number of nodes in physical infrastructure (100, 200, 300).
The performance of the algorithm in conjunction with the various network infrastructures was further tested by the acceptance ratio of the method. As shown in Figure 6b, the acceptance ratios of the SWN and SFN changed from 5 to 35 under different numbers of network nodes for provisioning (100, 200, and 300). It can be seen in the figure that an acceptance ratio of more than 0.9 was achieved in all of the instances. It does not matter what kind of network topology is used; as the demand increases, the acceptance ratio decreases. However, when comparing the provisioning via the SWN to the SFN structure under various physical nodes, the provisioning through the SWN delivers a much superior acceptance ratio. In the face of a peak demand of 35 NSRs with the bare minimum of resources, the SWN still manages to deliver a 0.68 acceptance ratio, whereas the SFN manages to produce just 0.62. Additionally, when the resources are expanded, the SWN yields an acceptance ratio of 0.77 for the peak demand. The SFN, on the other hand, achieves a 0.74 acceptance ratio with the same resources. A further validation of the proposed algorithm’s consistency was accomplished by running it through a series of 10 trials under the same operating circumstances and NSR values. For each number of NSRs, the minimum and maximum units of CPU serviced, as well as the bandwidth consumed, were logged during the 10 trials.
During execution, the method selects random values for all of the NSRs parameters, including the number of nodes, the CPU capacity, the bandwidth, the security level, and the lifespan, that are within their respective ranges of possibilities. The execution is carried out individually in the SFN and SWN network settings, with three node levels (100, 200, and 300) in each network configuration. Table 4 displays the outcomes that are achieved. From the table, it is evident that more CPU units are serviced and that more bandwidth is consumed when the network is organized according to the SWN topology. For 30 NSRs with 300 accessible nodes, an SWN-based network records the maximum values of CPU serviced and bandwidth consumed as 17,554 and 16,676, respectively, for the maximum values of CPU served and bandwidth utilized. The maximum values of CPU served and bandwidth consumed for the same circumstance are recorded by the SFN as 13,275 and 12,611, respectively.
Table 4.
Performance comparison with [ = 10, = 40].
Model | 100 Nodes | 200 Nodes | 300 Nodes | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
BW Utilized | CPU Served | BW Utilized | CPU Served | BW Utilized | CPU Served | ||||||||
NSRs | Min | Max | Min | Max | Min | Max | Min | Max | Min | Max | Min | Max | |
SFN | 10 | 2328 | 4351 | 2212 | 4133 | 2605 | 4875 | 2501 | 4680 | 3123 | 5859 | 2967 | 5566 |
20 | 4086 | 7653 | 3882 | 7270 | 4729 | 8852 | 4540 | 8498 | 5601 | 10508 | 5321 | 9983 | |
30 | 7927 | 9908 | 7531 | 9413 | 9544 | 11,925 | 9162 | 11,448 | 10,626 | 13,275 | 10,095 | 12,611 | |
SWN | 10 | 2921 | 5476 | 2775 | 5202 | 3440 | 6450 | 3302 | 6192 | 3605 | 6754 | 3425 | 6416 |
20 | 5448 | 10,200 | 5176 | 9690 | 6484 | 12,156 | 6225 | 11,670 | 6720 | 12,600 | 6384 | 11,970 | |
30 | 11,880 | 14,852 | 11,286 | 14,109 | 13,680 | 17,102 | 13,133 | 16,418 | 14,049 | 17,554 | 13,347 | 16,676 |
The analysis was furthered by running the algorithm under three different numbers of NSRs with fixed lifetimes of the requests, with = 10 and = 40 as the starting and ending values. As demonstrated in Table 5, the resulting values of the CPU served and bandwidth consumed were recorded for NSRs, which ranged between 10 and 30 as shown in the table. It is obvious from the table that both forms of the physical structure record the maximum values of the CPU served and bandwidth consumed for LTmin requests, and vice versa for LTmax requests, and that this is true for both types of physical structure. The SWN structure, on the other hand, is able to share more resources than the SFN structure, as seen by the highest recorded value of 16,644 CPU served and 17,625 bandwidth consumed for 30 NSRs on the provided structure, which has 300 nodes in total. The SFN, on the other hand, could only serve 9322 CPUs while consuming just a 983 bandwidth for the same number of physical nodes. Furthermore, it is shown that the SWN may deliver superior services when compared to the SFN structure, and that service providers can earn a higher profit while simultaneously enhancing the utility.
Table 5.
Performance comparison with fixed .
Model | 100 Nodes | 200 Nodes | 300 Nodes | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
BW Utilized | CPU Served | BW Utilized | CPU Served | BW Utilized | CPU Served | ||||||||
NSRs | |||||||||||||
SFN | 10 | 2406 | 914 | 2286 | 868 | 2811 | 1045 | 2699 | 1003 | 3321 | 1957 | 3155 | 1859 |
20 | 6243 | 2431 | 5931 | 2309 | 7368 | 2692 | 7073 | 2584 | 7862 | 3164 | 7468 | 3006 | |
30 | 8683 | 5292 | 8248 | 5027 | 9321 | 7018 | 8948 | 6737 | 9813 | 7738 | 9322 | 7351 | |
SWN | 10 | 4812 | 1827 | 4571 | 1736 | 5622 | 2089 | 5397 | 2005 | 6642 | 3914 | 6310 | 3718 |
20 | 10,486 | 8861 | 9862 | 8618 | 11,736 | 8384 | 11,147 | 8169 | 11,723 | 8328 | 10,937 | 8012 | |
30 | 13,365 | 10,584 | 12,497 | 10,055 | 15,641 | 11,035 | 14,895 | 10,874 | 17,625 | 12,476 | 16,644 | 10,702 |
6. Conclusions
The solution approach for effective network slicing in a 5G mobile network environment was developed in this study. The physical infrastructure, NSRs, and deployment plan were all modelled. To achieve a slicing-friendly infrastructure, physical infrastructure was represented as a small-world network. Physical infrastructure and NSR factors were found for efficient resource distribution. The deployment technique made use of PROMETHEE-II for node allocation and SLE for node-to-node connection creation. For the network slicing performance assessment, the resource efficiency and acceptance ratio were taken into account. The suggested algorithm’s performance was investigated under various network operating circumstances and varying NSR parameter values. The suggested algorithm’s competence was shown by comparing the result to other algorithms in the literature. Furthermore, to demonstrate the superiority of the small-world network (SWN), the suggested method was tested in a scale-free network (SFN) and a comparative analysis was performed. The findings reveal that the suggested algorithm operates better under various operating situations, and the small-world network provided a much better slicing provision. It is possible to develop this work to include the likelihood of the nodes’ placement, as the user cannot stand motionless. Machine and deep-learning-based node provisioning may also be advised for quick deployment.
Author Contributions
Conceptualization, S.V., T.S. and H.-G.J.; methodology, S.V. and T.S.; investigation, S.V. and T.S.; writing—original draft preparation, S.V. and T.S.; writing—review and editing, H.-G.J. and I.-H.R.; supervision, I.-H.R. and H.-G.J. All authors have read and agreed to the published version of the manuscript.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Funding Statement
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A2C2014333).
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
- 1.5G PPP Architecture Working Group View on 5G Architecture: Version 2.0. 2017, pp. 1–117. [(accessed on 31 January 2018)]. Available online: https://discovery.ucl.ac.uk/id/eprint/10043680.
- 2.Alliance N. Description of network slicing concept. NGMN 5G P. 2016;1:1–11. [Google Scholar]
- 3.Zhang H., Liu N., Chu X., Long K., Aghvami A.H., Leung V.C. Network slicing based 5G and future mobile networks: Mobility, resource management, and challenges. IEEE Commun. Mag. 2017;55:138–145. doi: 10.1109/MCOM.2017.1600940. [DOI] [Google Scholar]
- 4.Study on Management and Orchestration of Network Slicing for Next Generation Network. 3GPP; Sophia Antipolis, France: 2018. [Google Scholar]
- 5.Nojima D., Katsumata Y., Shimojo T., Morihiro Y., Asai T., Yamada A., Iwashina S. Resource isolation in RAN part while utilizing ordinary scheduling algorithm for network slicing; Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring); Porto, Portugal. 3–6 June 2018; pp. 1–5. [Google Scholar]
- 6.Parsaeefard S., Dawadi R., Derakhshani M., Le-Ngoc T. Joint user-association and resource-allocation in virtualized wireless networks. IEEE Access. 2016;4:2738–2750. doi: 10.1109/ACCESS.2016.2560218. [DOI] [Google Scholar]
- 7.Tang L., Zhang X., Xiang H., Sun Y., Peng M. Joint resource allocation and caching placement for network slicing in fog radio access networks; Proceedings of the 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC); Sapporo, Japan. 3–6 July 2017; pp. 1–6. [Google Scholar]
- 8.Bega D., Gramaglia M., Banchs A., Sciancalepore V., Samdanis K., Costa-Perez X. Optimising 5G infrastructure markets: The business of network slicing; Proceedings of the IEEE INFOCOM 2017-IEEE Conference on Computer Communications; Atlanta, GA, USA. 1–4 May 2017; pp. 1–9. [Google Scholar]
- 9.Sama M.R., An X., Wei Q., Beker S. Reshaping the mobile core network via function decomposition and network slicing for the 5G Era; Proceedings of the 2016 IEEE Wireless Communications and Networking Conference; Doha, Qatar. 3–6 April 2016; pp. 1–7. [Google Scholar]
- 10.Bari F., Chowdhury S.R., Ahmed R., Boutaba R., Duarte O.C.M.B. Orchestrating virtualized network functions. IEEE Trans. Netw. Serv. Manag. 2016;13:725–739. doi: 10.1109/TNSM.2016.2569020. [DOI] [Google Scholar]
- 11.Riggio R., Bradai A., Harutyunyan D., Rasheed T., Ahmed T. Scheduling wireless virtual networks functions. IEEE Trans. Netw. Serv. Manag. 2016;13:240–252. doi: 10.1109/TNSM.2016.2549563. [DOI] [Google Scholar]
- 12.Ordonez-Lucena J., Ameigeiras P., Lopez D., Ramos-Munoz J.J., Lorca J., Folgueira J. Network slicing for 5G with SDN/NFV: Concepts, architectures, and challenges. IEEE Commun. Mag. 2017;55:80–87. doi: 10.1109/MCOM.2017.1600935. [DOI] [Google Scholar]
- 13.Herker S., Khan A., An X. Survey on survivable virtual network embedding problem and solutions; Proceedings of the International Conference on Networking and Services, ICNS; Lisbon, Portugal. 24–29 March 2013; pp. 99–104. [Google Scholar]
- 14.Leconte M., Paschos G.S., Mertikopoulos P., Kozat U.C. A resource allocation framework for network slicing; Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications; Honolulu, HI, USA. 16–19 April 2018; pp. 2177–2185. [Google Scholar]
- 15.Kaloxylos A. A survey and an analysis of network slicing in 5G networks. IEEE Commun. Stand. Mag. 2018;2:60–65. doi: 10.1109/MCOMSTD.2018.1700072. [DOI] [Google Scholar]
- 16.Subedi P., Alsadoon A., Prasad P., Rehman S., Giweli N., Imran M., Arif S. Network slicing: A next generation 5G perspective. EURASIP J. Wirel. Commun. Netw. 2021;2021:1–26. doi: 10.1186/s13638-021-01983-7. [DOI] [Google Scholar]
- 17.Chowdhury M., Rahman M.R., Boutaba R. Vineyard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Trans. Netw. 2011;20:206–219. doi: 10.1109/TNET.2011.2159308. [DOI] [Google Scholar]
- 18.Duan Q., Wang S., Ansari N. Convergence of networking and cloud/edge computing: Status, challenges, and opportunities. IEEE Netw. 2020;34:148–155. doi: 10.1109/MNET.011.2000089. [DOI] [Google Scholar]
- 19.Guan W., Wen X., Wang L., Lu Z., Shen Y. A service-oriented deployment policy of end-to-end network slicing based on complex network theory. IEEE Access. 2018;6:19691–19701. doi: 10.1109/ACCESS.2018.2822398. [DOI] [Google Scholar]
- 20.Aarts E., Korst J. Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing. John Wiley and Sons, Inc.; New York, NY, USA: 1989. (Wiley-Interscience series in discrete mathematics and optimization). [Google Scholar]
- 21.Yu C., Hou W., Guan Y., Zong Y., Guo P. Virtual 5G network embedding in a heterogeneous and multi-domain network infrastructure. China Commun. 2016;13:29–43. doi: 10.1109/CC.2016.7732010. [DOI] [Google Scholar]
- 22.Mijumbi R., Serrat J., Gorricho J.L., Bouten N., De Turck F., Davy S. Design and evaluation of algorithms for mapping and scheduling of virtual network functions; Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft); London, UK. 13–17 April 2015; pp. 1–9. [Google Scholar]
- 23.Cao H., Yang L., Zhu H. Novel node-ranking approach and multiple topology attributes-based embedding algorithm for single-domain virtual network embedding. IEEE Internet Things J. 2017;5:108–120. doi: 10.1109/JIOT.2017.2773489. [DOI] [Google Scholar]
- 24.Tang L., Tan Q., Shi Y., Wang C., Chen Q. Adaptive virtual resource allocation in 5G network slicing using constrained Markov decision process. IEEE Access. 2018;6:61184–61195. doi: 10.1109/ACCESS.2018.2876544. [DOI] [Google Scholar]
- 25.Ma T., Zhang Y., Wang F., Wang D., Guo D. Slicing Resource Allocation for eMBB and URLLC in 5G RAN. Wirel. Commun. Mob. Comput. 2020:1–11. doi: 10.1155/2020/6290375. [DOI] [Google Scholar]
- 26.Faisal A.R., Hashim F., Noordin N.K., Ismail M., Jamalipour A. Efficient beamforming and spectral efficiency maximization in a joint transmission system using an adaptive particle swarm optimization algorithm. Appl. Soft Comput. 2016;49:759–769. doi: 10.1016/j.asoc.2016.09.009. [DOI] [Google Scholar]
- 27.Li X., Guo C., Gupta L., Jain R. Efficient and secure 5G core network slice provisioning based on VIKOR approach. IEEE Access. 2019;7:150517–150529. doi: 10.1109/ACCESS.2019.2947454. [DOI] [Google Scholar]
- 28.Abidi M.H., Alkhalefah H., Moiduddin K., Alazab M., Mohammed M.K., Ameen W., Gadekallu T.R. Optimal 5G network slicing using machine learning and deep learning concepts. Comput. Stand. Interfaces. 2021;76:103518. doi: 10.1016/j.csi.2021.103518. [DOI] [Google Scholar]
- 29.Wang H., Wu Y., Min G., Miao W. A graph neural network-based digital twin for network slicing management. IEEE Trans. Ind. Inform. 2020;18:1367–1376. doi: 10.1109/TII.2020.3047843. [DOI] [Google Scholar]
- 30.Barabási A.L., Albert R. Emergence of scaling in random networks. Science. 1999;286:509–512. doi: 10.1126/science.286.5439.509. [DOI] [PubMed] [Google Scholar]
- 31.Dong Z., Wang Z., Xie W., Emelumadu O., Lin C., Rojas-Cessa R. An experimental study of small world network model for wireless networks; Proceedings of the 2015 36th IEEE Sarnoff Symposium; Newark, NJ, USA. 20–22 September 2015; pp. 70–75. [Google Scholar]
- 32.Guennebaud G., Jacob B. Eigen. Version 3. 2010. [(accessed on 31 January 2018)]. Available online: http://eigen.tuxfamily.org.
- 33.Gao L., Li P., Pan Z., Liu N., You X. Virtualization framework and VCG based resource block allocation scheme for LTE virtualization; Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring); Nanjing, China. 15–18 May 2016; pp. 1–6. [Google Scholar]
- 34.Olya M.H. Applying Dijkstra’s algorithm for general shortest path problem with normal probability distribution arc length. Int. J. Oper. Res. 2014;21:143–154. doi: 10.1504/IJOR.2014.064541. [DOI] [Google Scholar]
- 35.Brans J., Mareschal B. Multiple Criteria Decision Analysis: State of the Art Surveys. Volume 78 Figueira, Springer; New York, NY, USA: 2005. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Not applicable.