2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft) 2018
DOI: 10.1109/netsoft.2018.8460057
|View full text |Cite
|
Sign up to set email alerts
|

A reference architecture for network slicing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 1 publication
0
12
0
Order By: Relevance
“…Kotulski et al [267] provide a constructive approach to E2E slice isolation in 5G networks. Kukli ński et al [268] propose an approach for a single domain consisting of management and orchestration of slices which are distributed into several functional blocks. The NFV MANO complaint orchestration mechanisms employed in [261] for enabling 5G network slicing are adapted without any modifications.…”
Section: Orchestratormentioning
confidence: 99%
“…Kotulski et al [267] provide a constructive approach to E2E slice isolation in 5G networks. Kukli ński et al [268] propose an approach for a single domain consisting of management and orchestration of slices which are distributed into several functional blocks. The NFV MANO complaint orchestration mechanisms employed in [261] for enabling 5G network slicing are adapted without any modifications.…”
Section: Orchestratormentioning
confidence: 99%
“…The architectural approach of the 5G!Pagoda project [36] serves as the basis for our work. This architecture allows for hierarchical orchestration, the tenants can directly manage their slices, and the management plane is a part of each slice [37]. Independent slicing of each plane (i.e., user, control and management planes) and recursive vertical stitching of them (further described in subsection IV-B2) are allowed.…”
Section: Related Workmentioning
confidence: 99%
“…𝐻 𝑑,𝑘,𝑜 = 𝜓 𝑑,𝑘 𝜌 𝑜,𝑘 Pr 𝑑,𝑘,ℎ 𝑜 (10) Next, we take a close-up view of the bidding vector of a MVNO. To this end, an MVNO 𝑑 can bid for resources from different InPs such that for ease of exposition, the bidding vector 𝝍 𝒅 = (𝜓 𝑑,1 , 𝜓 𝑑,2 , … , 𝜓 𝑑,𝑖 ).…”
Section: Multi-domaingames Frameworkmentioning
confidence: 99%
“…On the other hand, in the single domain model, the NS resources are primarily from the virtualised resources of only one InP. A vast corpus of literature on NS has focused on the single domain model despite its non-lexibility and limited resource constraints which make it unsuitable for the future mobile networks [8,10]. In Fig.…”
Section: Introductionmentioning
confidence: 99%