2019
DOI: 10.1109/access.2019.2939935
|View full text |Cite
|
Sign up to set email alerts
|

Maximizing Infrastructure Providers’ Revenue Through Network Slicing in 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
42
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(43 citation statements)
references
References 15 publications
1
42
0
Order By: Relevance
“…Indeed, if research and standardization efforts initially focused on architectures and enabling technologies, 5G ecosystem's drive is becoming progressively service-oriented. On the one hand, manufacturers and network owners are willing to fully exploit the potential of 5G's marketplace, on the other hand, regulation authorities and standardization bodies implement solutions for the healthy coexistence among parties [1]- [3].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, if research and standardization efforts initially focused on architectures and enabling technologies, 5G ecosystem's drive is becoming progressively service-oriented. On the one hand, manufacturers and network owners are willing to fully exploit the potential of 5G's marketplace, on the other hand, regulation authorities and standardization bodies implement solutions for the healthy coexistence among parties [1]- [3].…”
Section: Introductionmentioning
confidence: 99%
“…The issue of pricing for services was considered in [18], and such an optimization structure allows us to find a compromise between the interests of communication service providers and the social welfare of the network, without violating the interests of users. Maximizing revenue using the access control mechanism for the network slice is presented in [16]. Infrastructure providers have the ability to rent network slices, both one-time and on a periodic basis.…”
Section: Introductionmentioning
confidence: 99%
“…Network slicing at the admission-control level is discussed in Reference [33] along with other approaches to RAN slicing, while user blocking probabilities for such systems are estimated in References [17,21]. Besides, since network slices are to be created and terminated dynamically [2], some studies [31,32,34] investigate the slice admission control, that is, whether a new slice instance can/should be admitted to the network. The problem of associating users to base stations under slicing constraints is addressed in References [23,24].…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning along with Markov decision processes are applied in References [25,31,32]. Continuous-Time Markov Chain (CTMC) models for network slicing analysis are proposed in References [17,34]. The authors of Reference [34] consider a one-dimensional CTMC which transitions represent slice instantiation and termination, and use it to establish a flexible auction-based slice-admission policy.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation