Next Article in Journal
User Intention of Anonymous Social Application “Soul” in China: Analysis based on an Extended Technology Acceptance Model
Previous Article in Journal
Enhancing Consumer Experience through Development of Implicit Attitudes Using Food Delivery Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Study of the Operation Process of the E-Commerce Oriented Ecosystem of 5Ge Base Station, Which Supports the Functioning of Independent Virtual Network Segments

1
Department of Computer Control Systems, Vinnytsia National Technical University, Khmelnitske Shose, 95, 21000 Vinnytsia, Ukraine
2
Department of Artificial Intelligence, Lviv Polytechnic National University, Stepan Bandera Str., 12, 79013 Lviv, Ukraine
*
Author to whom correspondence should be addressed.
J. Theor. Appl. Electron. Commer. Res. 2021, 16(7), 2883-2897; https://doi.org/10.3390/jtaer16070158
Submission received: 13 September 2021 / Revised: 10 October 2021 / Accepted: 19 October 2021 / Published: 23 October 2021

Abstract

:
According to specifications, flexible services for traffic management should be implemented within the 5G platform in order to improve its efficiency, which is and will remain an actual task. For the first time, the article presented here proposes a mathematical model for the operation process of an e-commerce-oriented ecosystem of a 5Ge base station, the information environment of which supports the operation of independent virtual network segments that provide terminal–segment information interaction services. In contrast to existing models, the presented model describes the studied process as a multi-pipeline queuing system, the inputs of which are coordinated with the flows of requests for communication with the relevant virtual network segments. The distribution of the total resources between the weighted virtual network segments in the simulated system is dynamically conducted by the appropriate software control mechanism. It considers the address intensities of new incoming requests and the maintenance of received incoming requests, but throughout the scale of the information environment of the 5Ge base station ecosystem. Based on the created mathematical model, a functional algorithm for the forced termination of an active terminal–segment information interaction session in the overloaded virtual network segment and the control mechanism of the distribution of the released system resources between other virtual network segments that takes into account the degree of their overload are formulated. The simulation and computational experiments showed that the implemented forced termination algorithm and system resource management mechanism allow the 5Ge base station to continue receiving incoming requests despite the overload of individual virtual network segments. It is empirically shown that the proposed services are effectively scaled concerning the value that is generally available for the distribution of the number of system resources and the allocation method within the guaranteed amounts of system resources for individual virtual network segments.

1. Introduction

Over the last decade, the networks and communication systems industry has seen an exponential increase in both the number of subscriber devices (intended, including for e-commerce) and the total amount of traffic transmitted by wireless channels in general-purpose communication networks. According to various sources, this trend will continue [1,2,3]. An increasing proportion of subscriber devices are mobile devices, which are already allocated to a specific ecosystem known as the Internet of Wearable Things (IoWT) [3]. The list of IoWT device classes is constantly expanding and includes traditional smartphones and smartwatches, bracelets, augmented and virtual reality glasses, etc. IoWT devices in the conditions of modern megacities generate the lion’s share of information, causing an extremely high load on the subscriber segment of communication networks.
In addition to the constant growth of information interaction, mobile traffic is affected by disruptive factors in current conditions, the appearance of which is only stochastically localized in time and space. In terms of time, the intensity of mobile traffic is distributed unevenly throughout the day, which makes it necessary to activate the appropriate services to balance the network operation communication process. At the same time, the space factor manifests itself in the phenomena of interference or the blocking of some subscribers to others in the conditions of complex urban relief of modern cities. Compensating for these factors is becoming an increasingly difficult task as the number of IoWT devices increases.
Both network equipment manufacturers and standardization organizations are constantly looking for symmetrical responses to current challenges that accompany the expansion of the infosphere. Additionally, the modern mobile networks of the 4G-LTE generation are based on an effective basis of physical and channel levels technologies. In addition, it is already close to the theoretical upper limit of the bandwidth of wireless communication channels. Therefore, a promising direction that will further increase the information capacity of wireless communication channels is an expansion of the range of available frequencies. However, due to the load of the electromagnetic spectrum at frequencies below 6 GHz, advanced communication systems should focus on operation at the frequency range of 30–300 GHz. According to the leading organization for the standardization of mobile communication systems, 3GPP, devices operating in frequency band 30–100 GHz wireless radio access systems already belong to the 5G generation. In particular, the characteristic features of such systems are a slight delay on the wireless interface and a peak data rate of up to 10 Gbps. These requirements are provided by appropriate connection control, which, according to the specifications of the New Radio standard, was entrusted by base stations that support 5Ge technology.
Due to the use of the millimeter frequency range, 5G generation communication devices use antenna arrays characterized by high directivity. This technological solution provides high bandwidth communication channels and significantly reduces the interference created by such systems. However, the practice of operating 4G-LTE and 5G communication devices has revealed some unique negative phenomena. In particular, the physical blocking of the focused communication channel leads to a frequent and prolonged drop in the signal level, which cannot be compensated for by the technologies used in the 2G and 3G generations. Depending on the degree and duration of the drop phenomenon at the signal level, its appearance can cause both an abnormal increase in the number of resources directed by the base station to maintain a given speed of information interaction and the premature termination of the information interaction process. Thus, to improve subscriber service quality in 5G generation networks, it is necessary to solve many new tasks that can only be solved by creating a methodology of mathematical models to adequately describe the processes that are specific to this generation networks.
The motivation for the current research is the formalization of information technology in the composition of models, methods, and algorithms to control the information interaction process of a set of terminals and base stations in the 5Ge ecosystem that are focused on applications in e-commerce. The hierarchy of the applied tasks that allow this motivation to be achieved is formulated in Section 3.1. This article represents the first published work by the current authors in this specific area.
Thus, the research object is the operation process of the e-commerce-oriented ecosystem of the base station 5Ge, which supports the functioning of independent virtual network segments.
The main contributions of this paper can be summarized as follows:
  • We have created a mathematical model for the operation process of the e-commerce-oriented ecosystem of the 5Ge base station, the information environment of which supports the operation of independent virtual network segments that provide terminal–segment information interaction services;
  • We have designed a functional algorithm for the forced termination of an active terminal–segment information interaction section in an overloaded virtual network segment;
  • We have formulated the control mechanism of the distribution of the released system resources between other virtual network segments by taking into account the degree of their overload;
  • We conducted simulation and computational experiments showing that the implemented forced termination algorithm and system resource management mechanism allow the 5Ge base station to continue receiving incoming requests despite the overload of individual virtual network segments.
The structure of the article is as follows: 1. The Section 2 provides a critical analysis of the state of the research related to the topic discussed in the present article. The results of the analysis revealed an area that has so far been ignored in general studies. The subject of the research was also selected in the identified area; 2. In Section 3, the research objectives are set, and the proposed information technology for describing the process of information interaction in the e-commerce-oriented ecosystem of the 5Ge base station is theoretically substantiated; 3. The Section 4 and Section 5 are devoted to the simulation modeling of the presented information technology and the analysis of the adequacy of the results demonstrated by it; 4. In Section 6, the conclusions concerning the urgency of the chosen theme and the received theoretical and applied results are formulated. Directions for future research are also determined.

2. State-of-the-Art

The task of 5G generation communication networks is to meet the growing needs of states, institutions, businesses, and individuals in mobile communications of the appropriate level of quality. It is assumed [2,4,5,6] that the 5G generation networks will play a key role in transforming megacities into “Smart Cities”. Smart Cities provide the socio-economic benefits provided by the advanced digital economy to both citizen and society, with the intensive target using data.
The concept of building 5G communication networks was created based on improving the quality, reliability, and productivity of end-users by offering new services and applications with gigabit data rates. In particular, by raising the level of deployed mobile networks to the 5G generation, mobile operators will provide 3G and 4G generation services and will develop their solutions and services for consumers and industry. They will be implemented in independent virtual network segments at the level of one base station and their conglomerate [7,8,9,10].
Although the standardization of 5G generation networks is still ongoing, 5G commercial networks have been rolling out since 2020. The GSM Association predicts that by 2025, the number of one-time sessions to 5G networks will exceed 1.1 10 9 , about 12% of the total expected number of events of this type [11,12,13]. It is also projected that by 2025, the total profits of mobile operators will increase by about 2.5% and reach the level of USD 1.3 10 12 [12,14].
From a technical point of view, the transition of communication networks to the 5G generation level will be accompanied by a significant increase in speed and a reduction of communication delays. In particular, 5G generation communication networks should function so that the communication delay does not exceed 1 ms on the wireless segment of the signal distribution channel, which allows the implementation of critical application services based on these networks [15,16,17,18]. Additionally, in 5G communication networks, a peak speed of up to 10 Gbps is technologically possible for the end-user, allowing operators to provide a wide range of high-speed broadband services and allowing it to become a natural alternative to satellite communications.
Mobile operators, equipment manufacturers, and network standardization organizations have identified the three most promising and fundamentally different categories of services implemented in 5G generation networks. These are the Enhanced Mobile Broadband (eMBB) service [19,20,21], the Ultra-Reliable Low-Latency Communications (URLLC) service [22,23,24], and the Massive Machine-Type Communications (mMTC) service [25,26,27].
The eMBB service aims to meet the needs of ultra-high-speed in the subscriber segment [26,27,28,29]. The need for such fast speeds has arisen in users of applications for watching ultra-high-definition video; using goggles and helmets for augmented and virtual reality; and the transmission and operation of “Big Data.” It is expected that eMBB will be the main application of 5G at the early stages of its deployment. Some mobile operators see eMBB as a promising solution to the “Last Mile” problem for areas with no modern cable network infrastructure [28].
The high-quality level of latency and cybersecurity inherent for the URLLC implemented on the 5G platform will play an essential role in developing intelligent transport systems of the future, allowing vehicles to switch between themselves and to create new services for self-driving cars and trucks [29,30]. The need for a URLLC becomes apparent in the following example: a self-driving vehicle controlled by a cloud driving service must stop, accelerate, or turn immediately, according to real-time commands. Any delay or loss of connection in the information interaction of such a stand-alone car with the base station can lead to catastrophic consequences. The low latency inherent in the URLLC also allows us to consider the 5G generation network as a basis for implementing services for remote surgery, industrial automation, and real-time finance process control [31,32].
It is expected that with the mMTC service, 5G generation networks will also contribute to the development of smart cities and the Internet of Things by deploying sensor networks in cities and rural areas. The underpinnings of the 5G platform for security and reliability of information interaction will make such networks suitable for use in critical services [33,34,35,36,37,38], such as police, security, energy, water supply, and health services.
The range of potentially promising services that can be implemented precisely through the capabilities of 5G generation communication networks is not limited to the mentioned eMBB, URLLC, and mMTC. These services only represent the most typical real-world scenarios that have polar requirements for the quality characteristics of communication services. These good services form the base, which, in Figure 1, is presented in a triangle [17]. The sides of the triangle symbolize the fixed quality requirements for access speed, transmission reliability, and delay time. Some applications can be implemented both inside the triangle and on its faces by combining the appropriate set of these quality characteristics.
As mentioned in Section 1, the 5Ge platform implements technologies for forming independent virtual network segments in the information environment of the base station [7,8,9,10]. To support each such elements, system resources are allocated, and errors or malfunctions in one segment do not affect the Quality of Service (QoS) value for other components. In other words, the isolation of the virtual network segment to provide the appropriate service nomenclature of acceptable quality is guaranteed. At the same time, the algorithm for radio resource allocation should provide the effective targeted use of the system resources of the base station by taking the fact that each active virtual network segment is allocated a corresponding guaranteed amount of these resources into account [8,10].
This topic has recently attracted the attention of researchers. In [7,8,9], a flexible model for structuring a radio access network (RAN) is presented. The model focuses on providing an appropriate level of isolation for the resources of Virtual Network Operators (VNOs), which are network traffic tenants. The isolation level is defined to ensure that the Service Level Agreement (SLA) between the VNOs is not violated, even if different network settings change. The desired isolation level is determined by optimizing the RAN infrastructure used by dynamically allocating radio resources between different segments fairly.
Articles [10,39] also consider virtual radio resource management (VRRM), which provides the optimal use of virtualized resources of the infrastructure provider between several virtual network operators. The articles present the architecture of the VRRM modeling tool in terms of queuing systems [39]. With the help of the developed tool, the analysis of the practical scenario with three suppliers and different types of SLA can be conducted, and productivity indicators at a change loading site on traffic and SLA can be investigated.
In studies [11,15,40], the theoretical basis for the multi-operator scheduling (MOS) distribution of radio resources is considered. Due to the dynamic adaptation to the load of the communication channel, the centralized approach maximizes spectral efficiency for several operators with complete control over the guarantee of sharing.
However, something that is common to all of the proposed studies is to ignore the actual congestion scenario of the individual virtual network segments during the operation of the base station. In these models, if the incoming request is sent to the virtual network segment, the guaranteed amount of resources allocated by the base station is exhausted. Such an incoming request is lost even if free system resources are available in the information environment of the base station. To model this aspect of the 5Ge base station operation process, the authors propose choosing the mathematical apparatus for queuing systems, mathematical and simulation modeling, and experimental planning theory as the subject of research.

3. Materials and Methods

3.1. Statement of Research

The information provided in Section 2 confirms the relevance of the distribution of the communication resources of the cellular communication base station between the elements of the set of selected logical virtual network segments. A characteristic feature of this radio resource allocation technology is the independence of virtual network segments both at the computing resource frequency level and at the active service level. Independence means that for a given base station, the values of service quality indicators in a particular virtual network segment are not affected by the operation of the other virtual network segments.
The implementation quality of such network virtualization technology is entirely determined by the efficiency of the target control software mechanism, which operates at the level of the information environment of the base station. The creation of such a mechanism is only possible if there is an adequate profile for a mathematical model. Therefore, the present study aims to create a tool to manage the operation of the e-commerce-oriented ecosystem of the 5Ge base station, the information environment of which supports the functioning of independent virtual network segments.
Let us investigate the operation process of the localized e-commerce-oriented ecosystem of the 5Ge base station, the information environment of which supports the functioning of S virtual network segments, provided that the control mechanism distributes the C c.u. of the systemic recourses between them. According to the adopted QoS policy, each s -th s     S virtual network segment must support information terminal–segment interaction with a speed whose value is in the range of a s , b s , a s , b s     0 , a s     b s . The actual value of the rate is a function of the time and number of active sessions of terminal–segment interaction on the scale of the entire information environment of the base station. On the scale of a single virtual network segment, available system resources are evenly distributed between active terminal–segment interaction sessions.
We present the concept that was just described as a multi-pipeline queuing system, the inputs of which are consistent with the S flows of requests to establish terminal–segment interaction with S virtual network segments, respectively. All of these flows are Poisson with the intensities λ s   s     S . All submissions include service information about the desired amount of system resources. The values of these stochastic quantities are distributed according to the exponential law with the parameter 1 / μ s   s     S . To support the incoming request received by the s -th virtual network segment, the control mechanism allocates a finite amount of system resources r s     a s , b s that determines the actual speed of the address of the terminal–segment information interaction. Thus, the total volume of the system resources that is available creates C c.u. At each initiation or termination of a terminal–segment information interaction session, the control mechanism redistributes the system resources between the virtual network segments.
Thus, the objectives of the research are:
  • To formalize a mathematical model for the operation process of the e-commerce-oriented ecosystem of the 5Ge base station, the information environment that supports the functioning of independent virtual network segments, in the queuing theory paradigm;
  • To formulate a functional algorithm for the forced termination of an active terminal–segment information interaction session in the overloaded virtual network segment and the management mechanism needed for the distribution of the released system resources between other virtual network by segments based on the aforementioned mathematical model by taking into account their overload level;
  • To conduct simulation and computational experiments to prove the adequacy of the created mathematical model and the effectiveness of available services made on its basis.

3.2. Mathematical Model of the Process of Operation of E-Commerce Oriented Ecosystem of 5Ge Base Station, the Information Environment of Which Supports the Functioning of Virtual Network Segments

We identified the operation of the localized e-commerce-oriented ecosystem of the 5Ge base station, the information environment that supports the operation of S virtual network segments, as a stochastic function X t   =   m s t   s   =   1 , S ¯ , where m s is the number of active terminal–segment information interaction sessions for the s -th virtual network segment at the time t : m s     0 , 1 , , C a s s     S . Let us define the state space of the stochastic process X t : X   =   m 1 , m 2 , , m s , s   =   1 S m s a s     C . Suppose the control mechanism allocated system resources to support one active terminal–segment information interaction session for the s -th virtual network segment, which is r s c.u. Then, the intensity of the request service is equal to r s μ s s     S .
To localize the s -th virtual network segment in the information space of the e-commerce-oriented ecosystem of the 5Ge base station, we make the following assumption: The control mechanism is guaranteed to allocate to its support R ¯ s c.u. of the system resources, which, accordingly, guarantees the support of the M ¯ s   =   R ¯ s / a s active terminal–segment information interaction sessions. A virtual network segment in the information space from which more active terminal–segment information interaction sessions are supported than their guaranteed supported number M ¯ s , will be denoted as being overloaded. In conditions where there is a shortage of free system resources, the support for guaranteed terminal–segment information interaction sessions in any virtual network segment is conducted due to premature the termination of the required number of active terminal–segment information interaction sessions in the overloaded virtual network segments. If a shortage of free system resources is observed in the absence of crowded virtual network segments, then the incoming request is lost.
Let us investigate the dynamics of the stochastic process X in time: X t . Let the e-commerce-oriented ecosystem of the 5Ge base station be in the state m 1 , m 2 , , m s     X . Then, upon receipt of the s -th virtual network segment of the incoming request, one of the following scenarios is implemented:
  • m 1 , m 2 , , , m s   +   1 , , m S     X —in the e-commerce-oriented ecosystem of the 5Ge base station, where there are enough free system resources; therefore, the input request is accepted, and the stochastic process X t goes to state m 1 , m 2 , , , m s   +   1 , , m S ;
  • m 1 , m 2 , , , m s   +   1 , , m S     X —in the e-commerce-oriented ecosystem of the 5Ge base station, where there are not enough free system resources, therefore:
    (1).
    If m s   <   M ¯ s and m k   >   M ¯ k , s , k     S , and s     k , then the system resources are released by forcibly terminating the active terminal–segment information interaction sessions in the k -th overloaded virtual network segment: B s   =   m 1 , m 2 , , m S : m 1 , m 2 , , m s   +   1 , , m S     X m s   <   M ¯ s m k   >   M ¯ k s , k     S , s     k , where B s is the state space with forced termination of the active terminal–segment information interaction session. The functional realization algorithm from step 2.1 will be formulated further in Section 3.3;
    (2).
    The input request is lost: D s   =   m 1 , m 2 , , m s   +   1 , , m S : m 1 , m 2 , , m s   +   1 , , m S     X m s     M ¯ s m k     M ¯ k s , k     S , s     k , where D s is the state space of the incoming request loss.

3.3. Functional Algorithm of Forced Termination of an Active Session of Terminal-Segment Information Interaction

Considering the high probability of a situation in which the e-commerce-oriented ecosystem of the 5Ge base station will be more than one overloaded virtual network segment, it is advisable to enter a parameter that will quantify the degree of their relative level of overload. We formalize the options to determine this characteristic parameter:
w s 1   =   1 m s     M ¯ s , 1 m s     M ¯ s   +   1 m s   >   M ¯ s ;
w s 2   =   1 m s     M ¯ s , M ¯ s m s m s   >   M ¯ s ;
w s 3   =   1 m s     M ¯ s , w   =   c o n s t m s   >   M ¯ s .
The need for the forced termination of an active terminal–segment information interaction session arises when the incoming request arrives at an unoverloaded virtual network segment s and when the e-commerce-oriented ecosystem of the 5Ge base station lacks the required amount of free system resources: m 1 , m 2 , , m s   +   1 , , m S     X : m s   +   1 a s     R s . As such, if the situation just described is realized, then:
  • We are looking for a virtual network segment with the lowest level of overload: s     S : w s   =   min w r , r     S ;
  • In the s -th virtual network segment, we forcibly terminate an arbitrary active terminal–segment information interaction session: m 1 , m 2 , , , m s   1 , , m S ;
  • We repeat steps 1 and 2 until the condition C i   =   1 S m i a i     a s is satisfied.
Note that performing step 1 of the functional algorithm found not one virtual network segment with the lowest level of overload, but several; the choice of working among them for the further implementation of the operational algorithm is random.

3.4. Mathematical Modeling of the System Resource Management Mechanism in the E-Commerce Oriented Ecosystem of the 5Ge Base Station

Suppose that there are enough free system resources in the e-commerce-oriented ecosystem of the 5Ge base station. In that case, it is advisable to meet the needs of virtual network segments at the maximum limits b s : X 0   =   m 1 , m 2 , , m s : s   =   1 S m s b s     C .
If the amount of free system resources is limited: X 1   =   X / X 0 , then for their effective distribution between virtual network segments, it is necessary to solve the optimization task of the form:
s     S w s m s m s U s r s     max ,
s     S m s r s   =   C ,
where U s r s   =   ln r s is the utility function of the parameter of the speed of information interaction for the s -th virtual network segment. To solve such a nonlinear optimization task, we apply the approximate gradient projection method [41,42], in which the matrix of projection on the hyperplane (5) is generally defined as
P   =   r     R S : a s     b s , s     S .
In the method chosen for the solution, the iterative procedure for finding the extremum is determined by the expressions:
d k   =   P f x k ,
x k + 1   =   x k   +   τ k d k ,
τ k   >   0 : x k   +   1     P ,
where x is the vector of controlled variables, and the projection matrix P is defined as
P   =   I m mm T 1 m   =   1 1 s     S m s 2 m T m ,
where m = m 1 , m 2 , , m S is the characteristic vector of the current state of the studied ecosystem. The gradient of the utility function f x k in Expression (7) is a vector column of the form:
f x k   =   w s m s r s ,   s     S .
The value of step τ k is chosen so as not to go beyond the range of the domain of admissible solutions P , which is determined by the direct constraints (5) and (6) of the optimization task (4). As the initiating values of the elements of the vector x 0 , we can take the coordinates of the hyperplane intersection point (5), with the diagonal connecting the vertices a 1 , a 2 , , a S and b 1 , b 2 , , b S of the parallelogram P . The required coordinates will be found as a result of solving a system of linear equations of the form
b S     a S x 1     b 1     a 1 x S   =   a 1 b S     a S b 1 , b S     a S x 2     b 2     a 2 x S   =   a 2 b S     a S b 2 , b S     a S x S     1     b S     1     a S     1 x S   =   a S     1 b S     a S b S 1 , m 1 x 1   +   m 2 x 2   +     +   m S x S   =   C .
The implementation of the iterative procedure (7)–(9) provides movement by the hyperplane (5) from result define by solving the system of linear equations (11) the starting point x 0 in the direction of increasing the value of the gradient of the utility function (10) to the point of intersection with the boundary of the domain of admissible solutions P . This point where the coordinates intersect will provide the maximum allowable value of the objective function (4).

4. Results

To check the adequacy of the mathematical models presented in Section 3, we use the possibilities of simulation modeling. The UML activity diagram for the experiment is shown in Figure 2.
At the initialization stage (0), the values of the established parameters of the studied ecosystem of the 5Ge base station are set and are combined into the set I n i t   =   S , λ s , μ s , a s , b s , C , max , s   =   1 , S ¯ , where max is the maximum number of received input requests. The next stage waits for the event
(1)
If the event is recorded and it is:
(2)
The stage of the system audit, then:
(2.1)
The information environment of the 5Ge base station is checked for the presence of overloaded virtual network segments. If:
(2.1.1)
The overloaded virtual network segment is found, then the functional algorithm described in Section 3.3 is implemented, upon completion of which the control mechanism described in Section 3.4 redistributes the system resources and the system returns to stage (2);
(2.1.2)
If no overloaded virtual network segment is found, then the system returns to the waiting stage for the event (1);
(3)
The stage receives a new incoming request to the target virtual network segment, then:
(3.1)
The availability of the required amount of free system resources should be checked. If:
(3.1.1)
The amount of free system resources is sufficient, then the incoming request is received, the redistribution of system resources between received incoming requests, which is controlled by the control mechanism described in Section 3.4, is carried out, and the system returns to the stage where it is waiting for the event (1);
(3.1.2)
If the amount of free system resources is not enough, then it is checked whether there is an overloaded virtual network segment in the information environment of the 5Ge base station. If:
(3.1.2.1)
There is no overloaded virtual network segment, then the input request is lost, and the system returns to stage (1);
(3.1.2.2)
If the overloaded virtual network segment is found, then the functional algorithm described in Section 3.3 is implemented. Then, the control mechanism described in Section 3.4 redistributes system resources, and the system returns to stage (3.1).
The computational experiments were performed in the 5Ge ecosystem (LTE Advanced Pro) 800 MHz band. The actual minimum and maximum connection speeds of a s   =   0.75 Mbps and a s   =   80.00 Mbps were empirically determined for the Huawei equipment that was used. The system was studied in a metropolis, where the distance from the base station to the final mobile terminal ranged from 4 to 13 km. The upper limit of information communication speed for all of the active terminal–segment interaction sessions was selected from the range of available values: C   =   325 , 345 , 385 , 405 , 425 , 445 Mbps. The system resources limited by the parameter’s C value was distributed between three virtual network segments S   =   3 , for which the following guaranteed amounts of available system resources were set: R ¯   =   225 , 150 , 75 Mbps. The intensities of the receipt and service of the incoming requests were equal for all of the virtual network segments and were: λ   =   30 , 30 , 30 , μ   =   30 , 30 , 30 .
As a result of the experiments, the functional dependencies D s   =   f C , R ¯ s   =   f C , Δ T s   =   f C , s   =   1 , 2 , 3 were obtained, where D s is the probability of losing the input request addressed to the s -th virtual network segment, %; R ¯ s is the average actual volume of the s -th virtual network segment, c.u.; Δ T s is the total relative (to the entire censored period of operation of the studied system) duration that the s -th virtual network segment was in the overload state, %; and C is all of the available system resources that are available for distribution, c.u. Empirically obtained graphs of the functions D s   =   f C , R ¯ s   =   f C , Δ T s   =   f C , s   =   1 , 3 ¯ , are presented in Figure 3, Figure 4 and Figure 5, respectively.
The calculations visualized in Figure 3, Figure 4 and Figure 5 were performed in the software environment OriginPro 2018 (64 bit) SR1.

5. Discussion

Analyzing the first approximation of the graphs of functions D s   =   f C shown in Figure 3 for three virtual network segments s 1 , s 2 , s 3 , which functioned for a censored time in the information environment of the studied ecosystem of the 5Ge base station, we can state that the probability of the loss of input requests decreases with increasing maximum available amounts of system resources. However, considering that the degree of a load of all virtual network segments was the same (the intensity of receipt and service of incoming requests were equal: λ   =   30 , 30 , 30 , μ   =   30 , 30 , 30 ), but the distribution of guaranteed amounts of available system resources between segments was uneven ( R ¯   =   225 , 150 , 75 Mbps), then the initial value and rate of decrease in the graphs of the functions D s   =   f C with the increasing importance of the argument turned out to be different. The connection is obvious—the greater the guaranteed amount of available system resources for a particular virtual network segment, the lower the inherent probability of losing the incoming request was. The nonlinear nature of the graphs of the functions shown in Figure 3 correlates with the analytical representation of the mechanism to control the allocation of system resources in the e-commerce-oriented ecosystem of the 5Ge base station (see Section 3.4). The underlying optimization task with objective function (4) and constraints (5) and (6) was classified as nonlinear. At the same time, the descending nature of the graphs of the functions D s   =   f C , s   =   1 , 3 ¯ , unambiguously confirms the effectiveness of the operation of the just mentioned control mechanism.
The graphs of functions R ¯ s   =   f C , s   =   1 , 3 ¯ , which are presented in Figure 4 in the order of dynamics of increasing their values by increasing value of the argument, can be arranged as follows: R ¯ 3   =   f C , R ¯ 2   =   f C , R ¯ 1   =   f C . Again, this order correlates with the initial distribution of guaranteed amounts of available system resources between virtual network segments ( R ¯   =   225 , 150 , 75 Mbps). The example of graphs of functions R ¯ 3   =   f C   R ¯ 2   =   f C clearly shows the operation of the control mechanism for the allocation of system resources. It does not allow the virtual network segments to be overloaded, even in the conditions of a steady stream receiving new incoming requests. This is the responsibility of the system audit service and is based on the functional algorithm of the forced termination of the active session of terminal-segment information interaction for the overloaded virtual network segment (see Section 3.3).
Finally, the growing nature of the graphs of the functions Δ T s   =   f C , s   =   1 , 3 ¯ from Figure 5 indicates the need for this algorithm. Recall that Δ T s is the total relative (to the entire censored period of operation of the studied system) duration that the s -th virtual network segment was in the overload state, %. As the value of the argument, i.e., the total amount of system resource involved, increases and as the intensities of new incoming requests and the processing of received incoming requests are the same for all virtual network segments, there is a tendency to overload them rapidly. Moreover, the third segment Δ T 3   =   f C suffers the most because of the primary guaranteed amount of allocated system resources, the smallest being ( R ¯ 3   =   75 Mbps). However, let us compare the graphs of the functions shown in Figure 3 and Figure 5. It becomes evident that despite the progressive overload with the growth of the argument C , the e-commerce-oriented ecosystem of the 5Ge base station continues to fulfill its functional purpose. This fact empirically proves the adequacy of the profile of the mathematical model given in Section 3.2 and the functionality and efficiency of the algorithms presented in Section 3.3 and Section 3.4.

6. Conclusions

At the end of 2020, the number of Internet users exceeded the 4.5 10 9 . If we talk about the balance between stationary and mobile means of e-commerce information interaction, the boundary between these poles is increasingly mixed in the direction of the latter. The traffic consumed by user terminals is also overgrowing. All of these trends prove the need for the evolution of mobile communication generations, in particular, the transition from 4G to 5G. According to the specifications, the latter should be implemented into flexible services for traffic management, improving the efficiency of which will remain an actual task.
For the first time, the current article proposed a mathematical model for the operation process of an e-commerce-oriented ecosystem of a 5Ge base station, the information environment of which supports the operation of independent virtual network segments that provide terminal–segment information interaction services. In contrast to the existing ones, the presented model describes the studied process as a multi-pipeline queuing system, the inputs of which are coordinated with the flows of requests for communication with the relevant virtual network segments. The distribution of total resources between weighted virtual network segments in the simulated system was conducted dynamically by the appropriate software control mechanism. It considers the address intensities of new incoming requests and the maintenance of received incoming requests but throughout the scale of the information environment of the 5Ge base station ecosystem. Based on the created mathematical model, the functional algorithm for the forced termination of an active terminal–segment information interaction session in an overloaded virtual network segment and the control mechanism of the distribution of the released system resources between other virtual network segments were formulated by taking the degree of their overload into account.
The simulation and computational experiments showed that the implemented forced termination algorithm and system resource management mechanism allowed the 5Ge base station to continue receiving incoming requests despite the overload of individual virtual network segments. It was empirically shown that the proposed services were effectively scaled concerning the value of the system resources that were generally available for allocation and the allocation method within which the guaranteed amounts of system resources for individual virtual network segments were.
Further research will focus on the formalization of qualitative metrics based on the values of the parameters, from which it will be possible to order the activation process of the system audit.

Author Contributions

Conceptualization, V.K.; methodology, V.K.; software V.K.; validation, I.I.; formal analysis, V.K.; investigation, V.K.; writing—original draft preparation, V.K.; writing—review and editing, I.I.; supervision, V.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Most data are contained within the article. All of the information is available upon request due to restrictions, e.g., privacy or ethics.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chettri, L.; Bera, R. A Comprehensive Survey on Internet of Things (IoT) toward 5G Wireless Systems. IEEE Internet Things J. 2020, 7, 16–32. [Google Scholar] [CrossRef]
  2. Shafique, K.; Khawaja, B.A.; Sabir, F.; Qazi, S.; Mustaqim, M. Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios. IEEE Access 2020, 8, 23022–23040. [Google Scholar] [CrossRef]
  3. Ghosh, A.; Maeder, A.; Baker, M.; Chandramouli, D. 5G Evolution: A View on 5G Cellular Technology beyond 3GPP Release 15. IEEE Access 2019, 7, 127639–127651. [Google Scholar] [CrossRef]
  4. Alsaeedy, A.A.R.; Chong, E.K.P. Mobility Management for 5G IoT Devices: Improving Power Consumption with Lightweight Signaling Overhead. IEEE Internet Things J. 2019, 6, 8237–8247. [Google Scholar] [CrossRef]
  5. Fan, K.; Jiang, W.; Li, H.; Yang, Y. Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Trans. Ind. Inform. 2018, 14, 1656–1665. [Google Scholar] [CrossRef]
  6. Hosseinzadeh, M.; Lansky, J.; Rahmani, A.M.; Trinh, C.; Safkhani, M.; Bagheri, N.; Huynh, B. A New Strong Adversary Model for RFID Authentication Protocols. IEEE Access 2020, 8, 125029–125045. [Google Scholar] [CrossRef]
  7. Ding, K.; Jiang, P. RFID-based production data analysis in an IoT-enabled smart job-shop. IEEE/CAA J. Autom. Sin. 2018, 5, 128–138. [Google Scholar] [CrossRef]
  8. Sharma, V.; Hashmi, M. On the Seamless Integration and Co-Existence of Chipless RFID in Broad IoT Framework. IEEE Access 2021, 9, 69839–69849. [Google Scholar] [CrossRef]
  9. Sethia, D.; Gupta, D.; Saran, H. NFC Secure Element-Based Mutual Authentication and Attestation for IoT Access. IEEE Trans. Consum. Electron. 2018, 64, 470–479. [Google Scholar] [CrossRef]
  10. Ulz, T.; Pieber, T.; Höller, A.; Haas, S.; Steger, C. Secured and Easy-to-Use NFC-Based Device Configuration for the Internet of Things. IEEE J. Radio Freq. Identif. 2017, 1, 75–84. [Google Scholar] [CrossRef] [Green Version]
  11. Shaikh, F.K.; Zeadally, S.; Exposito, E. Enabling Technologies for Green Internet of Things. IEEE Syst. J. 2017, 11, 983–994. [Google Scholar] [CrossRef]
  12. Alzahrani, B.A.; Mahmood, K.; Kumari, S. Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure. IEEE Access 2020, 8, 76357–76367. [Google Scholar] [CrossRef]
  13. Teslyuk, V.; Beregovskyi, V.; Denysyuk, P.; Teslyuk, T.; Lozynskyi, A. Development and Implementation of the Technical Accident Prevention Subsystem for the Smart Home System. Int. J. Intell. Syst. Appl. (IJISA) 2018, 10, 1–8. [Google Scholar] [CrossRef]
  14. Lounis, K.; Zulkernine, M. Attacks and Defenses in Short-Range Wireless Technologies for IoT. IEEE Access 2020, 8, 88892–88932. [Google Scholar] [CrossRef]
  15. Qin, H.; Cao, B.; He, J.; Xiao, X.; Chen, W.; Peng, Y. Cross-Interface Scheduling Toward Energy-Efficient Device-to-Gateway Communications in IoT. IEEE Internet Things J. 2020, 7, 2247–2262. [Google Scholar] [CrossRef]
  16. Jiang, W.; Yin, Z.; Liu, R.; Li, Z.; Kim, S.M.; He, T. Boosting the Bitrate of Cross-Technology Communication on Commodity IoT Devices. IEEE/ACM Trans. Netw. 2019, 27, 1069–1083. [Google Scholar] [CrossRef]
  17. Yu, X.; Li, C.; Zhang, J.; Letaief, K.B. Stochastic Geometry Analysis of Multi-Antenna Wireless Networks; Springer: Berlin/Heidelberg, Germany, 2019; Volume 178, ISBN 978-981-13-5879-1. [Google Scholar]
  18. Hussain, S.R.; Mehnaz, S.; Nirjon, S.; Bertino, E. Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. IEEE Trans. Mob. Comput. 2018, 17, 927–944. [Google Scholar] [CrossRef]
  19. Obelovska, K.; Panova, O.; Karovič, V., Jr. Performance Analysis of Wireless Local Area Network for a High-/Low-Priority Traffic Ratio at Different Numbers of Access Categories. Symmetry 2021, 13, 693. [Google Scholar] [CrossRef]
  20. Rondón, R.; Mahmood, A.; Grimaldi, S.; Gidlund, M. Understanding the Performance of Bluetooth Mesh: Reliability, Delay, and Scalability Analysis. IEEE Internet Things J. 2020, 7, 2089–2101. [Google Scholar] [CrossRef] [Green Version]
  21. Lovón-Melgarejo, J.; Castillo-Cara, M.; Huarcaya-Canal, O.; Orozco-Barbosa, L.; García-Varea, I. Comparative Study of Supervised Learning and Metaheuristic Algorithms for the Development of Bluetooth-Based Indoor Localization Mechanisms. IEEE Access 2019, 7, 26123–26135. [Google Scholar] [CrossRef]
  22. Pirayesh, H.; Sangdeh, P.K.; Zeng, H. Coexistence of Wi-Fi and IoT Communications in WLANs. IEEE Internet Things J. 2020, 7, 7495–7505. [Google Scholar] [CrossRef]
  23. Wang, W.; Chen, Y.; Wang, L.; Zhang, Q. Sampleless Wi-Fi: Bringing Low Power to Wi-Fi Communications. IEEE/ACM Trans. Netw. 2017, 25, 1663–1672. [Google Scholar] [CrossRef]
  24. Yalcinkaya, E.; Maffei, A.; Onori, M. Application of Attribute Based Access Control Model for Industrial Control Systems. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 2017, 9, 12–21. [Google Scholar] [CrossRef] [Green Version]
  25. Palattella, M.R.; Dohler, M.; Grieco, A.; Rizzo, G.; Torsner, J.; Engel, T.; Ladid, L. Internet of Things in the 5G Era: Enablers, Architecture, and Business Models. IEEE J. Sel. Areas Commun. 2016, 34, 510–527. [Google Scholar] [CrossRef] [Green Version]
  26. Ge, X.; Zhou, R.; Li, Q. 5G NFV-Based Tactile Internet for Mission-Critical IoT Services. IEEE Internet Things J. 2020, 7, 6150–6163. [Google Scholar] [CrossRef]
  27. Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges. IEEE Access 2018, 6, 3619–3647. [Google Scholar] [CrossRef]
  28. Lin, Y.; Huang, T.; Tsai, S. Enhancing 5G/IoT Transport Security Through Content Permutation. IEEE Access 2019, 7, 94293–94299. [Google Scholar] [CrossRef]
  29. Yu, L.; Li, Z.; Liu, J.; Zhou, R. Resources Sharing in 5G Networks: Learning-Enabled Incentives and Coalitional Games. IEEE Syst. J. 2021, 15, 226–237. [Google Scholar] [CrossRef]
  30. She, C.; Duan, Y.; Zhao, D.; Quek, T.Q.S.; Li, Y.; Vucetic, B. Cross-Layer Design for Mission-Critical IoT in Mobile Edge Computing Systems. IEEE Internet Things J. 2019, 6, 9360–9374. [Google Scholar] [CrossRef] [Green Version]
  31. Baz, A.; Al-Naja, A.A.; Baz, M. Statistical model for IoT/5G networks. In Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, Sapporo, Japan, 7–10 July 2015; pp. 109–111. [Google Scholar] [CrossRef]
  32. Bisikalo, O.V.; Kovtun, V.V.; Sholota, V.V. The information system for Critical Use Access Process Dependability Modeling. In Proceedings of the 9th International Conference on Advanced Computer Information Technologies (ACIT), Ceske Budejovice, Czech Republic, 5–7 June 2019; pp. 5–8. [Google Scholar] [CrossRef]
  33. Bisikalo, O.V.; Kovtun, V.V.; Kovtun, O.V.; Danylchuk, O.M. Mathematical modeling of the availability of the information system for critical use to optimize control of its communication capabilities. Int. J. Sens. Wirel. Commun. Control. 2021, 10, 505–517. [Google Scholar] [CrossRef]
  34. Bisikalo, O.V.; Kovtun, V.V.; Kovtun, O.V. Modeling of the Estimation of the Time to Failure of the information system for Critical Use. In Proceedings of the 10th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany, 13–15 May 2020; pp. 140–143. [Google Scholar] [CrossRef]
  35. Bisikalo, O.V.; Chernenko, D.S.; Danylchuk, O.M.; Kovtun, V.V.; Romanenko, V.B. Information technology for TTF optimization of an information system for critical use that operates in aggressive cyber-physical space. In Proceedings of the International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), Kharkiv, Ukraine, 6–9 October 2020; pp. 323–329. [Google Scholar] [CrossRef]
  36. Bisikalo, O.V.; Kovtun, V.V.; Kovtun, O.V.; Romanenko, V.B. Research of safety and survivability models of the information system for critical use. In Proceedings of the 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, 14–18 May 2020; pp. 7–12. [Google Scholar] [CrossRef]
  37. Patil, M.T.; Rao, M.Y. Building a Template for Intuitive Virtual E-Commerce Shopping Site in India. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 2018, 10, 45–59. [Google Scholar] [CrossRef] [Green Version]
  38. Mbaye, M.; Diallo, M.; Mboup, M. LU-Based Beamforming Schemes for MIMO Systems. IEEE Trans. Veh. Technol. 2017, 66, 2214–2222. [Google Scholar] [CrossRef]
  39. Chen, J.; Hu, J.; Zhou, J. Hardware and Energy-Efficient Stochastic LU Decomposition Scheme for MIMO Receivers. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2016, 24, 1391–1401. [Google Scholar] [CrossRef]
  40. Saeidi, S. A Multi-objective Mathematical Model for Job Scheduling on Parallel Machines Using NSGA-II. Int. J. Inf. Technol. Comput. Sci. 2016, 8, 43–49. [Google Scholar] [CrossRef] [Green Version]
  41. Kumar, U.S.; Reddy, E.S. Dimension Reduction using Orthogonal Local Preserving Projection in Big data. Int. J. Intell. Syst. Appl. 2019, 11, 69–77. [Google Scholar] [CrossRef]
  42. Tanwar, H.S. Implementation of Fair-exchange and Anonymous Online E-cash Protocol for E-commerce. Int. J. Inf. Technol. Comput. Sci. 2016, 8, 66–74. [Google Scholar] [CrossRef]
Figure 1. Services that can be implemented on the technological basis of 5G generation communication networks [17].
Figure 1. Services that can be implemented on the technological basis of 5G generation communication networks [17].
Jtaer 16 00158 g001
Figure 2. The UML activity diagram of the experiment on the simulation of the operation of the 5Ge base station, the information environment of which supports the process of virtual network segments.
Figure 2. The UML activity diagram of the experiment on the simulation of the operation of the 5Ge base station, the information environment of which supports the process of virtual network segments.
Jtaer 16 00158 g002
Figure 3. Functional dependence D s = f C for the studied ecosystem of the 5Ge base station.
Figure 3. Functional dependence D s = f C for the studied ecosystem of the 5Ge base station.
Jtaer 16 00158 g003
Figure 4. Functional dependence R ¯ s = f C for the studied ecosystem of the 5Ge base station.
Figure 4. Functional dependence R ¯ s = f C for the studied ecosystem of the 5Ge base station.
Jtaer 16 00158 g004
Figure 5. Functional dependence Δ T s = f C for the studied ecosystem of the 5Ge base station.
Figure 5. Functional dependence Δ T s = f C for the studied ecosystem of the 5Ge base station.
Jtaer 16 00158 g005
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kovtun, V.; Izonin, I. Study of the Operation Process of the E-Commerce Oriented Ecosystem of 5Ge Base Station, Which Supports the Functioning of Independent Virtual Network Segments. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 2883-2897. https://doi.org/10.3390/jtaer16070158

AMA Style

Kovtun V, Izonin I. Study of the Operation Process of the E-Commerce Oriented Ecosystem of 5Ge Base Station, Which Supports the Functioning of Independent Virtual Network Segments. Journal of Theoretical and Applied Electronic Commerce Research. 2021; 16(7):2883-2897. https://doi.org/10.3390/jtaer16070158

Chicago/Turabian Style

Kovtun, Viacheslav, and Ivan Izonin. 2021. "Study of the Operation Process of the E-Commerce Oriented Ecosystem of 5Ge Base Station, Which Supports the Functioning of Independent Virtual Network Segments" Journal of Theoretical and Applied Electronic Commerce Research 16, no. 7: 2883-2897. https://doi.org/10.3390/jtaer16070158

APA Style

Kovtun, V., & Izonin, I. (2021). Study of the Operation Process of the E-Commerce Oriented Ecosystem of 5Ge Base Station, Which Supports the Functioning of Independent Virtual Network Segments. Journal of Theoretical and Applied Electronic Commerce Research, 16(7), 2883-2897. https://doi.org/10.3390/jtaer16070158

Article Metrics

Back to TopTop