You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

27 May 2022

An Adaptive Control Scheme for Data-Driven Traffic Migration Engineering on 5G Network

,
and
School of Mathematics and Statistics, Xidian University, Xi’an 710126, China
*
Author to whom correspondence should be addressed.
This article belongs to the Section Mathematics

Abstract

Adaptive control of traffic engineering (TE) based on 5G network function virtualization (NFV) authorizes the efficient and dynamic network resource allocation, whose utilization is increasingly wide and will become more widespread. In this paper, we first devise an adaptive control scheme for data-driven traffic migration engineering (TME) on the 5G virtual network. The proposed TME technology focuses on a 5G enhancing mobile broadband (eMBB) network application scenario and takes the network operating expenditure (OPEX) as the main research target. Firstly, we predict the network traffic of the virtual network through the constructed traffic predicted mathematical model. Then, based on the triangle inequality violation (TIV) theorem, some local network traffic is adaptively migrated when the predicted link traffic exceeds the peak rate. Consequently, the migrations of logical links in the virtual network layer are completed. Finally, our experiments show that the proposed protocol can effectively improve the key performance indicators (KPIs) of the reconfigured network, such as throughput, delay and energy consumption. Furthermore, the Fridman and Holm statistical hypothesis tests are also used to analyze the simulation data, which proves that the proposed approximate TME algorithm has statistical significance.

1. Introduction

The 5G network is a symmetric cellular communication network, which is defined by the 3rd Generation Partnership Project (3GPP) [1]. The multiple-input multiple-output (MIMO) technology of the 5G network provides hardware and software support for the diverse supplies and demands in the development of modern society. The 5G intelligent network is a kind of radio access network (RAN), which has good performance in mass data transmission [2]. The management system of the 5G network can recognize different network interface information. Moreover, the constructed network can meet the demands of KPIs for diversified resource allocation technologies.
Due to the excellent performance of the 5G network, the applications of key technologies based on 5G network are more and more extensive, such as spatial information networking technology, smart city, internet of vehicles, Internet of Things (IoT), artificial intelligent (AI), soft computing, fog radio access network optimization, user plane functions in 5G networks, beyond wireless networks and the depth of open-source networks [3,4,5,6]. And these technologies can serve aerospace, navigation, transportation, navigation, positioning, emergency rescue, intelligent life and other aspects. Moreover, the technologies mentioned above have high requirements for the network of high-level dynamicity, low latency and reliable transmission and high-density device access.
Involved with standards, specifications, modes, tools and data sets, another key requirement for the 5G network is the rapid allocation of network resources in order to achieve optimal performance [7]. That is, the 5G network requires the optimal configuration and allocation of network resources such as communication, computing and storage [8].
This paper intends to virtualize a 5G network in consideration of eMBB network application scenarios, and then builds an adaptive TME system for reconfiguring the 5G virtual network. In order to meet the optimal network resource allocation and the adaptive control of network energy consumption at the same time, we provide a solution of 5G virtual network energy management to adaptively control the energy consumption. Firstly, we map the mobile communication software definition network (SDN) devices to open virtual switches (OVSs) and predict the link traffic on the virtual network at time t by using the Shannon’s second theorem, which related to previous time t 1 . Then, we modify the predicted traffic model by two steps. Finally, based on the TIV theorem [9], we perform traffic migration when the predicted traffic exceeds the peak rate in a virtual link. Through the above traffic prediction and migration engineering, it is expected to reduce traffic congestion and improve the efficiency of the network energy management, delay and throughput.
The main contributions of this paper are the following:
(1)
In this paper, the TE problem is considered as the principal aspect of resource allocation in the 5G virtual network. We simply establish the associated traffic topological model through comprehensive consideration of traffic prediction and migration to complete the optimization task of data transmission;
(2)
A simple and efficient TE technology is proposed for the network slicing. To improve the efficiency of data traffic migration, a modified adaptive traffic prediction model is used to predict the traffic in the virtual link of the network. Then, based on the triangle inequality violation theorem, some local network traffic is adaptively migrated when the predicted link traffic exceeds the peak rate. Finally, the migrations of logical links in the virtual network layer are completed;
(3)
To the best of our knowledge, this is an early effort in considering how to change the configuration of the virtual slices in a timely fashion, while including the TE, such as latency, throughput and resource allocation of the network.
The remainder of this paper is arranged as follows. In Section 2, we present the related work and the current state of the art for this paper. In Section 3, the network model and problem formulation are introduced, and then the proposed problem is modeled and solved mathematically. Section 4 is the simulation validation and the analysis of the results. Section 5 illustrates the statistical analysis of the proposed algorithm. Finally, Section 6 concludes the paper and provides a discussion on future work in the related research issues.

3. SDN-Driven Traffic Migration Engineering (TME) Model

3.1. Network Model and Problem Formulation

In this paper, the issues considered in the elaboration of the network mainly include the following aspects: (1) An initial value of energy resources for each traffic control devices (i.e., OVSs), which needs to consume a certain amount of energy resources to monitor and forward data traffic; (2) Throughput of the network; (3) The average delay of the network, namely E2E latency; (4) The OPEX of the network, that is, the optimal number of the used OVSs within 1 km2 of the physical layer in order to achieve the best effects of (1)–(3) at the same time. That is to say, we achieve the optimal resource allocation under the optimal KPIs and the minimum OPEX in the eMBB application scenarios. The network model and problem formulation are described as follows.
In the actual physical layer network, the actual position of SDN devices with communication function is random and dynamic, and the mapping symmetric OVSs in corresponding virtual networks also have the characteristics of dynamism and randomness. In this paper, we set up a random virtual network for the study of our problem, and the topology of the virtual network is shown in Figure 1. The blue nodes in Figure 1 represent OVSs, and the central location (red ⋆) is the virtual macro base station (MBS) of the virtual network. Additionally, all OVSs in the network transmit the data traffic to the base station through multihop communications.
Figure 1. The virtual slice network model.
Let G ( V , E , B , R ) denote a weighted virtual network protocol, where V represents the set of OVSs; E represents the set of links (edges) and each link is associated with weights B and R. Table 1 summarizes the notations used in this paper.
Table 1. Notations.

3.2. The Description of TME

The optimization of network resource allocations based on TE is a complicated multi-objective, multiconstraint and non-convex optimization problem [15]. The prediction and migration processes are limited by the traffic controller and the constraints of different KPIs, such as peak rate and latency. In addition, a dynamic traffic prediction and migration framework is designed for network slices, which needs to be flexible enough and allows the network resource allocation among slices, customers, or services according to different purposes, or specific operational requirements in different application scenarios. As the 5G network services need to be improved in terms of time latency and node energy efficiency, one of the above optimization problems must be solved in order to supply resources to slices successfully [16]. In order to allocate the network resources through the joint optimization of resources and TE, we must complete the resource scheduling through the high-capacity network link interconnection by distributed computing. Finally, the resources are allocated optimally through the optimal configuration and the optimal migration of TE [21]. Based on the basic theory research of network [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33], we aim to break through the bottleneck of network resource allocation technology. Therefore, we turn to developing a service protocol framework, which is conducive to the development of the above technologies and provides theoretical and technical reference for the development of the above technologies through the exploration of new methods and theories.
The general meaning of traffic migration in virtual network slice layers is shown in Figure 2.
Figure 2. Traffic migration in virtual network slice layer.
The detailed descriptions for traffic migration are as follows. When the traffic in logical link ( u , v ) exceeds its peak rate, the virtual link will suffer from data congestion and lead to the increase of the data transmission latency and even the losses of data. Therefore, we need to migrate the traffic in virtual logical link ( u , v ) . However, the migration is limited to the power of OVS and we can only find and establish a new data transmission link in the neighbor of OVS u. If we find an appropriate OVS v 1 in η ( u ) whose traffic does not exceed the peak rate of the newly built virtual link and this link also has a low time latency, then the traffic in ( u , v ) will be migrated to the newly built link ( u , v 1 ) . Finally, we complete the traffic migration and delete the original link ( u , v ) , and then use the newly built link ( u , v 1 ) for data traffic transmission.

3.3. Traffic Prediction Model

The network traffic prediction is very important for traffic migration. As the initial traffic monitoring value is very important for traffic prediction, each OVS has the responsibility for traffic monitoring in this paper. Assume the initial traffic monitoring value in link ( u , v ) E is T 0 , and the traffic in virtual link ( u , v ) E at time t is related to instants { 1 , 2 , , t 1 } . Therefore, we construct the traffic prediction model in link ( u , v ) E at time t, which is shown below
τ u , v t = T 0 + ω 1 × X u , v 1 × τ u , v 1 + ω 2 × X u , v 2 × τ u , v 2 + + ω t 1 × X u , v t 1 × τ u , v t 1 ,
where ω 1 , ω 2 , , ω t 1 are the adaptive control coefficients of the network traffic, satisfying ω 1 + ω 2 + + ω t 1 = 1 and 0 < ω 1 , ω 2 , , ω t 1 < 1 . The values of ω 1 , ω 2 , , ω t 1 can be achieved by actual simulated traffic. In this paper, we fix ω 1 and provide a degradation traffic coefficient d such that ω t = d × ω t 1 , which is similar to the pheromone degradation mode in the ant colony algorithm.
For convenience, we introduce two vectors
W u , v t 1 = ω 1 X u , v 1 ω 2 X u , v 2 ω t 1 X u , v t 1 ,
and
T u , v t 1 = τ u , v 1 , τ u , v 2 , , τ u , v t 1 .
Therefore, Equation (1) is rewritten as
τ u , v t = T 0 + T u , v t 1 W u , v t 1 .
The traffic prediction model (4) needs to be modified due to the signal noise. Here, we use a traffic modification coefficient ρ ( 0 < ρ < 1 ) to improve the traffic prediction model (4).
A two-step-modification traffic optimization model is elaborated on in this section. First, we modify the data traffic in link ( u , v ) E at time t, which is related to original predicted traffic τ u , v t and the maximum allowed traffic (peak rate) R u , v t . Then, the accuracy of traffic prediction is improved based on the above-predicted traffic at instants t and t 1 . The specific two-step traffic modification model is described as below.
Step 1. Denote the first modified value of the predicted traffic in link ( u , v ) E as
τ u , v t _ _ = τ u , v t + ρ × ( R u , v t τ u , v t ) .
According to Shannon’s second theorem, peak rate R u , v t is related to bandwidth B u , v , signal transmitting power P u , v t and channel noise power δ as follows
R u , v t = B u , v × log 2 1 + P u , v t B u , v × δ .
In real network traffic, we always use signal-to-noise ratio S N R u , v t instead of P u , v t B u , v × δ . Therefore, Formula (6) can be transformed into
R u , v t = B u , v × log 2 ( 1 + S N R u , v t ) .
Substituting (7) into (6),the traffic prediction model (5) is changed to
τ u , v t _ _ = τ u , v t + ρ × ( B u , v × log 2 ( 1 + S N R u , v t ) τ u , v t ) = ( 1 ρ ) × τ u , v t + ρ × B u , v × log 2 ( 1 + S N R u , v t ) .
Step 2. Denote the second modified value of the predicted traffic as τ u , v t , which is updated by τ u , v t 1 _ _ and τ u , v t _ _ in virtual link ( u , v ) E as follows
τ u , v t = ρ × τ u , v t 1 _ _ + τ u , v t _ _ .
By substituting (8) into (9), the final traffic prediction model is changed to
τ u , v t = τ u , v t + ρ × [ τ u , v t 1 τ u , v t + B u , v × log 2 ( 1 + S N R u , v t 1 ) ] + ρ 2 × [ B u , v × log 2 ( 1 + S N R u , v t ) τ u , v t 1 ] .
After the above two-step modifications, the network traffic can adaptively migrate the virtual link traffic that exceeds the peak rate. The specific migration rules are described in Section 3.4.

3.4. Adaptive Traffic Migration Control Model

Referring to Figure 2, the main principle of adaptive traffic migration control model is described below.
After the data traffic prediction, the traffic prediction value τ u , v t in link ( u , v ) E is obtained at time t. Next, we compare peak rate R u , v t with τ u , v t in link ( u , v ) E . If the traffic in this link satisfies τ u , v t < R u , v t , we do not migrate the data traffic in link ( u , v ) E ; otherwise, the data traffic needs to be migrated. When predicted traffic τ u , v t in link ( u , v ) E exceeds peak rate R u , v t , it is necessary to find a new link in η ( u ) (the neighbors of OVS u), which meets the requirements of traffic and low latency, for replacing ( u , v ) to complete the traffic transmission work. In this paper, we use the TIV principle to complete the traffic migration work, which is shown in Figure 3.
Figure 3. Diagram of TIV migration Principle.
Assume there are two OVSs v 1 , v 2 η ( u ) , satisfying τ u , v t + τ u , v 1 t < R u , v 1 t , τ u , v t + τ u , v 2 t < R u , v 2 t . We use D to represent the data traffic transmission latency of the link. If D ( u , v 2 ) < D ( u , v 1 ) + D ( v 1 , v 2 ) , which does not violate the TIV principle, then we can migrate the traffic to link ( u , v 2 ) E and delete link ( u , v ) E directly, which is shown as Migration link (2) in Figure 3. Otherwise, if D ( u , v 2 ) > D ( u , v 1 ) + D ( v 1 , v 2 ) , which violates the TIV principle, then the traffic cannot be migrated to the shortest link ( u , v 2 ) E , and it is necessary to migrate the traffic in link ( u , v ) E to link u v 1 v 2 , so as to complete the traffic migration locally.
Algorithm 1 gives the pseudocode of the proposed TME algorithm in this paper.
Here, we give the specific process description of Algorithm 1, which is shown as follows:
Step 1: In TME, we input the coordinates and simulation parameters of each OVS in the network and the network will output the simulation results, such as the lifetime, throughput and latency. Initialize the network, use the greedy scheme to construct the data transmission links with the shortest path and run the network one time (lines 1–2).
Step 2: For all OVSs, we predict traffic τ u , v t of link ( u , v ) E at time t (lines 3–13).
Step 3: After the two-step modification of the traffic prediction, we migrate some traffics if the predicted traffics exceed the peak rate, so as to complete the traffic migration in the congestion link to a nearby link. Then, we finish the link reconfiguration in virtual network slicing (lines 14–18).
Algorithm 1 The TME algorithm.
Require:
  The coordinates and simulation parameters of each OVS and MBS.
Ensure:
  The lifetime, throughput of the network and the residual energy resources of each OVS.
 1: Initialization: Initialize the virtual network slicing.
 2: Virtual network topology construction: Use the greedy strategy to construct the virtual network link model with the shortest delay and run the network for the first time.
 3: for All OVSs do
 4:   if There is an OVS damaged or no energy resource. then
 5:    Terminate running the network and output data.
 6:   else if Predict traffic τ u , v t of link ( u , v ) E at time t. then
 7:    The original model of the first traffic prediction:
 8:     τ u , v t _ _ = τ u , v t + ρ × ( R u , v t τ u , v t )
 9:    Calculate the peak rate at time t:
 10:     τ u , v t _ _ = ( 1 ρ ) × τ u , v t + ρ × B u , v × log 2 ( 1 + S N R u , v t )
 11:    The second modification of the model:
 12:     τ u , v t = ρ × τ u , v t 1 _ _ + τ u , v t _ _
 13:     τ u , v t = τ u , v t + ρ × [ τ u , v t 1 τ u , v t + B u , v × log 2 ( 1 + S N R u , v t 1 ) ] + ρ 2 × [ B u , v × log 2 ( 1 + S N R u , v t ) τ u , v t 1 ]
 14:    while τ u , v t R u , v t do
 15:     Use the TIV principle for traffic migration
 16:    end while
 17:   end if
 18: end for

3.5. Complexity Analysis of the Algorithm

Theorem 1.
The complexity of the TME algorithm is O ( 2 N + | E | + N 2 ) , where | E | denotes the number of links in the network.
Proof of Theorem 1.
Firstly, the algorithm traverses all OVSs once according to the minimum delay, and the complexity is O ( N ) . Then, we have a traffic prediction for all the virtual links and the process traverses all the links once and all OVSs twice. The complexity of this process is thus O ( | E | + N 2 ) . Finally, in the process of traffic migration, all OVSs are traversed once and the complexity is O ( N ) . Therefore, the run-time complexity of the TME algorithm is O ( 2 N + | E | + N 2 ) totally. □

4. Validation and Result Analysis

In order to verify the effectiveness of the TME algorithm, we repeated the simulation experiment several times, and then it was compared with the original TE (TE without traffic prediction and migration) algorithm and the classical network TE algorithms: A* Search [21] and HPR [33]. This paper focuses on KPIs such as network throughput, run time and average delay of data traffic transmission. When the network runs one time, we count one round. The simulation environment was a Win7 64-bit system with CPU being Intel Core i5-7500 3.4 GHz, and memory being 4.00 GB. The simulation software used in this research were Visual C++ 6.5 and MATLAB 2017B. Table 2 shows the simulation parameters.
Table 2. Simulation parameters.

4.1. The Peak Rates under Different SNRs

The peak rate of the logical link in the virtual network layer determines the traffic upper limit of the link. Figure 4 shows the peak rate under different SNRs. We can see from Figure 4 that the higher the SNRs are, the higher the traffic upper limit is allowed by the logical link.
Figure 4. The peak rates under different SNRs.

4.2. KPIs with Different Numbers of OVSs

Referring to the input data in Reference [33] in our experiments, we randomly input 50–400 OVSs in the virtual network slicing and output the network run time, throughput and average delays. The other simulation parameters are shown in Table 2. Figure 5 shows the comparison results of network run time under different numbers of OVSs in virtual network slicing. We can see from Figure 5 that the network runs for the longest time when there are 250 OVSs in the network. This is because when there are fewer OVSs and the transmission distance increases, OVSs will consume the energy resources very rapidly. Meanwhile, when there are more OVSs and the network generates more data, each link needs to bears more data traffic transmission tasks. Both of the above cases will lead to the excessive energy resource consumption of OVSs. From the point of view of OPEX, when there are 250 OVSs, the virtual network has the optimal performance.
Figure 5. Network run time under different numbers of OVSs.
Nonetheless, the proposed TME algorithm always has the longest network run time compared with the HPR, TE and A* Search algorithms. In addition, the maximum value of running time can be reached with 250 OVSs, and the network running time of the proposed TME algorithm can be up to 206 rounds, while of the HPR, TE and A* Search algorithms are 127, 100 and 124, respectively. Obviously, the performance of the proposed TME algorithm is almost improved double that of the other three algorithms. This is because the TME algorithm migrates the links if the predicted traffic exceeds the peak rates, and thus balances the local traffic load and reduces the consumption of energy resources, as well. It is an iterative process from local optimization to global optimization. This process effectively inhibits the excessive energy consumption of OVSs caused by traffic overload of local links and prolongs the service time of all OVSs in the whole virtual network at the same time.
Figure 6 shows the network throughput with different numbers of OVSs in the virtual network. We can see from Figure 6 that the network throughput increases gradually as the numbers of OVS increase. This is because each OVS is responsible for monitoring and transmitting the traffic data, and the traffic increases as the numbers of OVSs increase. Regardless, the network throughput of the proposed TME algorithm is always more than that of the HPR, TE and A* Search algorithms as the number of OVSs increases. The TME controls the loss of traffic and improves the throughput of the network effectively. From the point of view of the network local link, the overloads of data traffic for the HPR, TE and A* Search algorithms can lead to data losses, thus reducing the network throughput.
Figure 6. Network throughput with different numbers of OVSs.
Figure 7 shows the network average delays with different numbers of OVSs in virtual network and the inconsistency of the average delays as the numbers of OVSs increase. We can see from Figure 7 that the minimum delays occur with 250 OVSs in the network for all algorithms, and the reasons are the same as the network run time. The traffic transmission distance will be longer if the number of OVSs is smaller, and the OVS needs much more time to transmit the traffic. The more OVSs there are, the more data traffic needs to be transmitted, which will lead to an increase of time delay. From the point of view of the delay of 5G network, the optimal number of equipment supported by one MBS within 1 km2 in the physical layer is 200–300 in our simulation environment. Regardless, the delay of the TME algorithm is always the lowest and the fluctuation of TME is small at the same time, which also benefits from the migration of local traffic. Migrating the traffic in congested links can significantly improve the quality of data transmission and reduce the delay of data transmission.
Figure 7. Network average delays with different numbers of OVSs.

4.3. KPIs with 250 OVSs under Different SNRs

Figure 8a–c show the comparison results of KPIs with 250 OVSs in the virtual network layer under different SNRs. As the TE and A* Search algorithms do not perform traffic migration, the influence of SNRs on the channel is not considered in the simulation. It can be seen from Figure 8a–c that when the SNR is 10–15 dm, the TME and HPR algorithms reach the optimal performance of network run time, throughput and delay. Therefore, the TME algorithm reaches the optimal state when SNR is 10–15 dm and the number of OVSs is 250 with the set simulation parameter in this paper.
Figure 8. KPIs with 250 OVSs under different SNRs. (a) KPI (Run time). (b) KPI (Throughput). (c) KPI (Average delay).

4.4. The Residual Energy Resources and Their Variance

The simulation results in the previous section show that the network performance is optimal when SNR is 10 dm and the number of OVSs in the network is 250. Then, the overall energy resource consumption of the virtual network is simulated under the optimal state.
Figure 9 shows the variation of the average residual energy resources of the network as the running time increases. The network will stop when the OVS is damaged or energy resources depletion occurs in the virtual layer. We can see from Figure 9 that the proposed TME algorithm has the most residual energy resources out of the HPR, TE and A* Search algorithms under the same run time. Figure 10 presents the variance of energy consumption as the run time increases. The TME algorithm has the smallest variance, which reflects the balance of energy resource consumption and indicates that the data traffic load of OVSs in the virtual network layer is relatively balanced. This result verifies the effectiveness of the TME algorithm in traffic prediction migration from the perspective of traffic balance, and the reasons are described in detail in Section 4.
Figure 9. The residual energy resources under 10 dm and 250 OVSs.
Figure 10. The variance of residual energy resources with 10 dm SNR and 250 OVSs.

5. Statistical Analysis of Algorithm Performance

This paper presents a hypothesis test for the problem of network OPEX from a statistical analysis perspective. We used Friedman and Holm tests to verify the effectiveness of the proposed TME algorithm for the consumption of energy resources.

5.1. Friedman Test

The Friedman test was applied to obtain the mean ranks of A* Search, TE, HPR and TME algorithms in terms of average residual energy resources of the network. The results are shown in Table 3.
Table 3. Friedman test.
The higher the average residual energy resources of the network is, the better the algorithm is. According to the results in Table 3, the TME algorithm is superior to the other three algorithms.

5.2. Holm Test

In order to further test whether the proposed TME algorithm is significantly better than the other three algorithms, the Holm test was used simultaneously in this study. We only considered the average residual energy resources when the network runs 100 rounds. We checked whether there is a significant difference between the TME algorithm and the other three algorithms with α = 0.05 . The results are shown in Table 4.
Table 4. Holm test.
The above results show that the TME algorithm proposed in this paper is statistically significant different from the other three algorithms, that is, the TME algorithm is significantly better than the other three algorithms.

6. Conclusions and Future Work

In this paper, we perform adaptive control of network traffic prediction and modification in the process of slice reconfiguring, and then use the TIV theorem to migrate the traffic if the link traffic exceeds the peak rate. The adaptive migration process completes the reconfiguration of the logical virtual link, and thus completes the reconfiguration of the virtual networks and the allocation of resources more efficiently. Aiming at the eMBB application scenario, the effectiveness of the proposed algorithm is verified from the perspectives of network OPEX and KPIs, such as network run time, delay and throughput. The performance of the configuration is measured and compared with the other two algorithms, and the effectiveness of the proposed TME approximate algorithm is analyzed from a statistical point of view.
There are many different domains where the advanced optimization algorithms (e.g., heuristics, metaheuristics, machine learning algorithm, deep convolutional neural network) have been applied as solution approaches, such as online learning, scheduling, multi-objective optimization, transportation, medicine, data classification, and others [34,35,36,37,38]. Inspired by these applications, we will try to use some advanced optimization algorithms to solve the TE-based optimization problems in our future research work. We will also construct the dynamic slicing migration strategy to meet the resource allocation requirements by using the advanced optimization algorithms.

Author Contributions

Conceptualization, Z.Z.; Investigation, Z.Z.; Methodology, X.M.; Supervision, Z.Z.; Validation, X.M.; Writing—original draft, Z.Z.; Writing—review & editing, X.M. and Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Fundamental Research Funds for the Central Universities (No. JB210707) and the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (No. ICT2022B39).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data (including the simulation parameters and simulation program) used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Huang, Y.; Xu, X.; Li, N.; Ding, H.; Tang, X. Prospect of 5G intelligent networks. IEEE Wirel. Commun. 2020, 27, 4–5. [Google Scholar] [CrossRef]
  2. Yaqoob, M.; Gemikonakli, O.; Ever, E. Modelling heterogeneous future wireless cellular networks: An analytical study for interaction of 5G femtocells and macro-cells. Future Gener. Comput. Syst. 2021, 114, 82–95. [Google Scholar] [CrossRef]
  3. Shahzadi, R.; Ali, M.; Khan, H.Z.; Naeem, M. UAV assisted 5G and beyond wireless networks: A survey. J. Netw. Comput. Appl. 2021, 189, 103114. [Google Scholar] [CrossRef]
  4. Chen, L.B.; Jiang, Z.H.; Yang, D.Q. Fog radio access network optimization for 5G leveraging user mobility and traffic data. J. Netw. Comput. Appl. 2021, 191, 103083. [Google Scholar] [CrossRef]
  5. Leyva, I.; Cervello, C. Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks. J. Netw. Comput. Appl. 2022, 197, 103269. [Google Scholar] [CrossRef]
  6. Qu, K.; Zhuang, W.; Ye, Q.; Shen, X.; Li, X.; Rao, J. Traffic engineering for service-oriented 5G networks with SDN-NFV integration. IEEE Netw. 2020, 34, 234–241. [Google Scholar] [CrossRef]
  7. Tipantuna, C.; Hesselbach, X. Adaptive energy management in 5G network slicing: Requirements, architecture, and strategies. Energies 2020, 13, 3984. [Google Scholar] [CrossRef]
  8. Lin, K.; Li, C.; Rodrigues, J.J.P.C.; Pace, P.; Fortino, G. Data-driven joint resource allocation in large-scale heterogeneous wireless networks. IEEE Netw. 2020, 34, 163–169. [Google Scholar] [CrossRef]
  9. Kawahara, R.; Lua, E.K.; Uchida, M.; Kamei, S.; Yoshino, H. On the quality of triangle inequality violation aware routing overlay architecture. In Proceedings of the IEEE INFOCOM 2009, Rio De Janeiro, Brazil, 19–25 April 2009. [Google Scholar]
  10. Chergui, H.; Verikoukis, C. Big data for 5G intelligent network slicing management. IEEE Netw. 2020, 34, 56–61. [Google Scholar] [CrossRef]
  11. Fossati, F.; Moretti, S.; Perny, P.; Secci, S. Multi-resource allocation for network slicing. IEEE/ACM Trans. Netw. 2020, 28, 1311–1324. [Google Scholar] [CrossRef]
  12. Chang, Z.; Zhang, D.; Hamalaine, T.; Han, Z.; Ristaniemi, T. Incentive mechanism for resource allocation in wireless virtualized networks with multiple infrastructure providers. IEEE Trans. Mob. Comput. 2020, 19, 103–115. [Google Scholar] [CrossRef] [Green Version]
  13. Addad, R.A.; Bagaa, M.; Taleb, T.; Dutra, D.L.C.; Flinck, H. Optimization model for cross-domain network slices in 5G networks. IEEE Trans. Mob. Comput. 2020, 19, 1156–1169. [Google Scholar] [CrossRef] [Green Version]
  14. Chiha, A.; Van der Wee, M.; Colle, D.; Verbrugge, S. Network slicing cost allocation model. J. Netw. Syst. Manag. 2020, 28, 627–659. [Google Scholar] [CrossRef]
  15. Borylo, P.; Tornatore, M.; Jaglarz, P.; Shahriar, N.; Chołda, P.; Boutaba, R. Latency and energy-aware provisioning of network slices in cloud networks. Comput. Commun. 2020, 157, 1–19. [Google Scholar] [CrossRef]
  16. Chuah, T.C.; Lee, Y.L. Intelligent RAN slicing for broadband access in the 5G and big data era. IEEE Commun. Mag. 2020, 58, 69–75. [Google Scholar] [CrossRef]
  17. Shahriar, N.; Taeb, S.; Chowdhury, S.R.; Zulfiqar, M.; Tornatore, M.; Boutaba, R.; Mitra, J.; Hemmati, M. Reliable slicing of 5G transport networks with bandwidth squeezing and multi-path provisioning. IEEE Trans. Netw. Service Manag. 2020, 17, 1418–1431. [Google Scholar] [CrossRef]
  18. Carpio, F.; Bziuk, W.; Jukan, A. Scaling migrations and replications of Virtual Network Functions based on network traffic. Compt. Netw. 2022, 203, 108582. [Google Scholar] [CrossRef]
  19. Pozza, M.; Nicholson, P.K.; Lugones, D.F.; Rao, A.; Flinck, H.; Tarkoma, S. On reconfiguring 5G network slices. IEEE J. Sel. Areas Commun. 2020, 38, 1542–1554. [Google Scholar] [CrossRef]
  20. Zhong, H.; Xu, J.; Cui, J.; Sun, X.; Gu, C.; Liu, L. Prediction-based dual-weight switch migration scheme for SDN load balancing. Compt. Netw. 2022, 205, 108749. [Google Scholar] [CrossRef]
  21. Dow, E.M.; Matthews, J.N. WAYFINDER: Parallel virtual machine reallocation through A* search. Memet. Comput. 2016, 8, 255–267. [Google Scholar] [CrossRef]
  22. Han, F.; Wang, M.; Cui, Y.; Li, Q.; Liang, R.; Liu, Y.; Jiang, Y. Future Data Center Networking: From Low Latency to Deterministic Latency. IEEE Netw. 2022, 36, 52–58. [Google Scholar] [CrossRef]
  23. Shaer, I.; Sidebottom, G.; Haque, A.; Shami, A. Efficient execution plan for egress traffic engineering. Comput. Netw. 2021, 190, 107938. [Google Scholar] [CrossRef]
  24. Wang, Z.; Hu, J.; Min, G.; Zhao, Z.; Wang, J. Data-augmentation-based cellular traffic prediction in edge-computing-enabled smart city. IEEE Trans. Industr. Inform. 2021, 17, 4179–4187. [Google Scholar] [CrossRef]
  25. Lin, K.; Xu, X.; Gao, H. TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT. Comput. Netw. 2021, 190, 107974. [Google Scholar] [CrossRef]
  26. Wang, H.; Wang, L.; Zhao, S.; Yue, X. Multi-dimensional prediction model for cell traffic in city scale. Intern. J. Pattern Recognit. Artif. Intell. 2021, 35, 2150010. [Google Scholar] [CrossRef]
  27. Liu, R.W.; Nie, J.; Garg, S.; Xiong, Z.; Zhang, Y.; Hossain, M.S. Data-driven trajectory quality improvement for promoting intelligent vessel traffic services in 6G-enabled maritime IoT systems. IEEE Internet Things J. 2021, 8, 5374–5385. [Google Scholar] [CrossRef]
  28. Lee, C. Self-detecting traffic interference control for multi-zone services under 5G-based cellular networks. Sensors 2021, 21, 2409. [Google Scholar] [CrossRef]
  29. Mesodiakaki, A.; Maniotis, P.; Gatzianas, M.; Vagionas, C.; Pleros, N.; Kalfas, G. A gated service MAC protocol for sub-ms latency 5G fiber-wireless mmwave C-RANs. IEEE Trans. Wirel. Commun. 2021, 20, 2502–2515. [Google Scholar] [CrossRef]
  30. Golkarifard, M.; Chiasserini, C.F.; Malandrino, F.; Movaghar, A. Dynamic VNF placement, resource allocation and traffic routing in 5G. Comput. Netw. 2021, 188, 107830. [Google Scholar] [CrossRef]
  31. Agarwal, S.; Malandrino, F.; Chiasserini, C.F.; De, S. VNF placement and resource allocation for the support of vertical services in 5G networks. IEEE/ACM Trans. Netw. 2019, 27, 433–446. [Google Scholar] [CrossRef] [Green Version]
  32. Naseer, S.; Ali, R.; Dominic, P.; Saleem, Y. Learning Representations of Network Traffic Using Deep Neural Networks for Network Anomaly Detection: A Perspective towards Oil and Gas IT Infrastructures. Symmetry 2020, 12, 1882. [Google Scholar] [CrossRef]
  33. Bagga, M.; Dutra, D.L.C.; Taleb, T.; Samdanis, K. On SDN-Driven Network Optimization and QoS Aware Routing Using Multiple Paths. IEEE/ACM Trans. Wirel. Commun. 2020, 19, 4700–4714. [Google Scholar] [CrossRef]
  34. Zhao, H.; Zhang, C. An online-learning-based evolutionary many-objective algorithm. Inform. Sci. 2020, 509, 1–21. [Google Scholar] [CrossRef]
  35. Pasha, J.; Dulebenets, M.; Fathollahi-Fard, A.M.; Tian, G.; Lau, Y.; Singh, P.; Liang, B. An integrated optimization method for tactical-level planning in liner shipping with heterogeneous ship fleet and environmental considerations. Ade. Eng. Inform. 2021, 48, 101299. [Google Scholar] [CrossRef]
  36. Dulebenets, M. An Adaptive Polyploid Memetic Algorithm for scheduling trucks at a cross-docking terminal. Inform. Sci. 2021, 565, 390–421. [Google Scholar] [CrossRef]
  37. Liu, Z.; Wang, Y.; Huang, P. A many-objective evolutionary algorithm with angle-based selection and shift-based density estimation. Inform. Sci. 2020, 509, 400–419. [Google Scholar] [CrossRef] [Green Version]
  38. Dulebenets, M.; Pasha, J.; Kavoosi, M.; Abioye, O.; Ozguven, E.; Moses, R.; Boot, W.; Sando, T. Multiobjective Optimization Model for Emergency Evacuation Planning in Geographical Locations with Vulnerable Population Groups. J. Manag. Eng. 2020, 509, 04019043. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.