2022
DOI: 10.3390/s22186724
|View full text |Cite
|
Sign up to set email alerts
|

Application of Meta-Heuristics in 5G Network Slicing: A Systematic Review of the Literature

Abstract: Network slicing is a vital component of the 5G system to support diverse network scenarios, creating virtual networks (slices) by mapping virtual network requests to real networks. The mapping is an arduous computing process, mathematically studied and known as the Virtual Network Embedding (VNE) problem, and its complexity is NP-Hard. The mapping process is oriented to respect the QoS demands from the virtual network requests and the available resources in the physical-substrate infrastructure. Meta-heuristic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 34 publications
0
1
0
Order By: Relevance
“…The 5G networks introduce the idea of network slicing, which helps vertical businesses meet their varied needs. With network slicing, a single physical infrastructure can be partitioned into many, autonomous virtual slices, each of which can have its own set of performance characteristics and set of resources [7]. Network functions virtualization (NFV) and software-defined networking (SDN) are just two examples of the technologies that have helped with the creation and management of virtual functions in network slices.…”
Section: Requirementsmentioning
confidence: 99%
“…The 5G networks introduce the idea of network slicing, which helps vertical businesses meet their varied needs. With network slicing, a single physical infrastructure can be partitioned into many, autonomous virtual slices, each of which can have its own set of performance characteristics and set of resources [7]. Network functions virtualization (NFV) and software-defined networking (SDN) are just two examples of the technologies that have helped with the creation and management of virtual functions in network slices.…”
Section: Requirementsmentioning
confidence: 99%
“…Reasonable resource allocation can not only better satisfy the Quality of Service (QoS) of users, but also improve the cost-effectiveness ratio of operators' revenue [4][5][6]. Researchers have established the resource allocation problem of network slices as a linear programming model to obtain the expected goal [7,8], and the same idea has been adopted for the security embedding problem of virtual networks. By describing the security embedding strategy as a constraint or an objective function, researchers can obtain the expected security deployment results.…”
Section: Related Researchmentioning
confidence: 99%