2021
DOI: 10.1109/access.2021.3050155
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-Native Network Slicing Using Software Defined Networking Based Multi-Access Edge Computing: A Survey

Abstract: Fifth-Generation (5G) mobile cellular networks provide a promising platform for new, innovative and diverse IoT applications, such as ultra-reliable and low latency communication, real-time and dynamic data processing, intensive computation, and massive device connectivity. End-to-End (E2E) network slicing candidates present a promising approach to resource allocation and distribution that permit operators to flexibly provide scalable virtualized and dedicated logical networks over common physical infrastructu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 87 publications
(53 citation statements)
references
References 80 publications
0
53
0
Order By: Relevance
“…Thus, f t is the two-dimensional vector or Subsequently, the sequential output of the encoder layer is fitted into the temporal attention layer with the outputs of the decoder layer to construct the attention context vectors (4). Finally, the LSTM decoder processes the attention context vectors to output future usage of resources (5). The details of each layer are presented in the following sections.…”
Section: Proposed Attention-based Encoder-decoder Framework a Problem...mentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, f t is the two-dimensional vector or Subsequently, the sequential output of the encoder layer is fitted into the temporal attention layer with the outputs of the decoder layer to construct the attention context vectors (4). Finally, the LSTM decoder processes the attention context vectors to output future usage of resources (5). The details of each layer are presented in the following sections.…”
Section: Proposed Attention-based Encoder-decoder Framework a Problem...mentioning
confidence: 99%
“…Using these key technologies, network slicing divides a network into multiple virtual networks consisting of virtual network functions (VNFs) and deploy them on virtual machines (VMs) or virtual containers (e.g docker) to reduce cost and energy consumption. Each VNF can be divided into sub-functions called VNF components [5]. In this paper, for simplicity, we assume that each VNF comprises a single VNF component.…”
Section: Introductionmentioning
confidence: 99%
“…Many surveys and reviews have been published in the recent years. Many works focus on MEC (first mobile and then multiaccess), referring (at least partially) to the ETSI architecture [52]- [75]. Some works focus exclusively or jointly on fog computing [55], [59], [60], [62], [63], [65]- [67], [71], [73], [76]- [79].…”
Section: Related Workmentioning
confidence: 99%
“…Other works focus on specific environments: vehicular networks [81], [88], IoT [63], [82]- [84], industrial Internet [69]. Finally, other works focus on specific tasks or parts: location trade-off [53], orchestration [54], capabilities on computing, caching, and communication [55], communication [56], computation offload [57], service adoption and provision [61], infrastructure [64], optimization [72], tools and applications [73], integration with network slicing [75].…”
Section: Related Workmentioning
confidence: 99%
“…The total state transfer time is the time needed to transfer all states of the migrated flows, whereby the time to transfer the states of each flow is calculated by Eqn. (7) and the parameters to evaluate the transmission delays of the state information of the three considered applications follow the approach in [49]. The execution time is the time needed to execute each evaluated scheme.…”
Section: Performance Metricsmentioning
confidence: 99%