A Utility-Driven Multi-Queue Admission Control Solution for Network Slicing

01/18/2019
by   Bin Han, et al.
0

The combination of recent emerging technologies such as network function virtualization (NFV) and network programmability (SDN) gave birth to the Network Slicing revolution. 5G networks consist of multi-tenant infrastructures capable of offering leased network "slices" to new customers (e.g., vertical industries) enabling a new telecom business model: Slice-as-aService (SlaaS). In this paper, we aim i ) to study the slicing admission control problem by means of a multi-queuing system for heterogeneous tenant requests, ii ) to derive its statistical behavior model, and iii ) to provide a utility-based admission control optimization. Our results analyze the capability of the proposed SlaaS system to be approximately Markovian and evaluate its performance as compared to legacy solutions.

READ FULL TEXT
research
09/06/2019

Multiservice-based Network Slicing Orchestration with Impatient Tenants

The combination of recent emerging technologies such as network function...
research
09/18/2018

Rational Impatience Strategy of 5G Network Tenants in Queue-Based Slice Admission Control: Shall I Wait Further for My Network Slice?

The fifth generation (5G) technologies enable an emerge type of public c...
research
11/30/2019

Admission Control and Resource Allocation of Slice Requests with Minimization of Mobile Service Provider's Cost

Network slicing is a crucial part of the 5G networks that communication ...
research
01/05/2022

On Multi-domain Network Slicing Orchestration Architecture Federated Resource Control

A sophisticated and efficient network slicing architecture is needed to ...
research
01/10/2018

ONETS: Online Network Slice Broker From Theory to Practice

Network slicing allows mobile network operators to open their physical n...
research
01/05/2022

QoS and Resource aware Security Orchestration System

Network Function Virtualization (NFV) and Software Distributed Networkin...
research
12/22/2017

Network Utility Maximization in Adversarial Environments

Stochastic models have been dominant in network optimization theory for ...

Please sign up or login with your details

Forgot password? Click here to reset