2019 16th International Symposium on Wireless Communication Systems (ISWCS) 2019
DOI: 10.1109/iswcs.2019.8877372
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Model for Mobile Network Slice Embedding under Resource Uncertainty

Abstract: The fifth generation (5G) of mobile networks will support several new use cases, like the Internet of Things (IoT), massive Machine Type Communication (mMTC) and Ultra-Reliable and Low Latency Communication (URLLC) as well as significant improvements of the conventional Mobile Broadband (MBB) use case. End-to-end network slicing is a key-feature of 5G since it allows to share and at the same time isolate resources between several different use cases as well as between tenants by providing logical network. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…Constraints ( 5) and ( 6) ensure that the resources provisioned for all slices s ∈ S + k|k do not exceed the available resources in each infrastructure node i ∈ N and link ij ∈ E. A flow conservation constraint similar to that introduced in [12] is described in (7). Constraints ( 8)- (9) ensure that the relation between κ s,k (i, v) (real), κ s,k (i, v) (binary), and κ k (i) are respected.…”
Section: A Provisioning Constraintsmentioning
confidence: 99%
See 1 more Smart Citation
“…Constraints ( 5) and ( 6) ensure that the resources provisioned for all slices s ∈ S + k|k do not exceed the available resources in each infrastructure node i ∈ N and link ij ∈ E. A flow conservation constraint similar to that introduced in [12] is described in (7). Constraints ( 8)- (9) ensure that the relation between κ s,k (i, v) (real), κ s,k (i, v) (binary), and κ k (i) are respected.…”
Section: A Provisioning Constraintsmentioning
confidence: 99%
“…The topic of dynamic slice deployment has received significant attention, see, e.g., [6][7][8]. Taking the dynamic nature of slice requests as a starting point, these works aim to design adaptive resource allocation and reconfiguration algorithms for the deployment of network slices or Service Function Chains (SFCs).…”
Section: Introductionmentioning
confidence: 99%
“…As in [13], enough resources are dedicated to a service so as to satisfy the mean plus γ times the standard deviation of the demands. In [14], additionally, a similar approach is considered to account for the uncertainty in the available resources. A probability of feasibility, depending on γ, is then evaluated for the slice embedding to measure the risk of having a degraded service for some users.…”
Section: Introductionmentioning
confidence: 99%
“…A network slice embedding problem is considered in [14], where available resources and resource demands are assumed to be partly uncertain. They are described by normal distributions built upon the data history on mobile network resource availability as well as slice resource utilization.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation