Another important concept corresponds to the topic of resource allocation. Networks often have limited resources, typically in terms of bandwidth capacity and power. Therefore, optimizing resource allocation undoubtedly helps in efficiently assigning resources to meet the user demands. This is very important in modern networks (5G, 5G+, and 6G), where the number of user devices and the amount of data to be transmitted grow rapidly.
Scheduling is another area of optimization. Tasks or data flows must be efficiently scheduled to ensure that resources are used to avoid conflicts on many networks. For example, consider a cloud computing network where tasks must be scheduled on available servers in such a way that the waiting times are minimized and the throughputs are simultaneously maximized. Network optimization usually involves the use of mathematical formulations and algorithms to solve these types of models. These procedures commonly include linear programming, integer programming, and heuristic methods that have an inherent computational cost to solve them optimally or nearly optimally. This allows researchers and decision makers to develop models that can represent the complex behavior of networks. In particular, the basics of optimization in network research deal with improving network performance. Consequently, minimizing delays, maximizing throughput, or managing resources efficiently is part of the game. Since networks continuously grow and become more and more complex, it is clear that optimization approaches, including modeling and solution procedures, play a key role while ensuring that these systems work under optimal conditions.
3.4. Types of Network Models
Networks are fundamental to optimizing and analyzing real complex systems. Usually, these studies are represented by using graphs composed of vertices and links that connect some of the nodes. In turn, this allows one to facilitate the analysis and optimization of networks. Depending on the structural evolution of networks over time, they can be classified as static, where the structure remains unchanged, or dynamic, where nodes and connections change over time. In general, in terms of optimization, there are centralized and distributed approaches, where a single node or entity makes global decisions, or where multiple nodes cooperate to find local solutions that optimize the system as a whole. Network models play a key role in optimizing and analyzing real complex systems. The representation of networks using graphs allows the modeling of various real-world problems in different domains such as communication, transportation, and social networks. Several fundamental optimization problems in graph theory are highly relevant to network science and operations research. In the following, we present and describe some key models and their mathematical formulations, which could be easily adapted to 5G, 5G+, and 6G technologies to further contribute to the domain of future network sciences [
59,
61].
Given a graph
, with a set of vertices
V and a set of links
E, the maximum clique problem consists of finding the largest subset of vertices
such that all vertices in
S are pairwise connected. Its mathematical formulation is as follows.
where
is a binary decision variable equal to 1 if node
is selected as part of the clique and 0 otherwise.
The maximum independent set problem consists of finding the largest subset of vertices
such that no two vertices in
S are adjacent. In this formulation,
is a binary variable equal to 1 if node
i is included in the independent set and 0 otherwise. Its formulation is as follows.
Notice that there exists a strong relationship between the two optimization problems: the maximum clique and the maximum independent set problems. The first one finds the maximal clique over all possible cliques in the graph. The second one finds the maximal independent set among all independent sets of the same graph. Surprisingly, finding a maximal clique is equivalent to finding a maximal clique in the same complement graph. Both problems have proven to be NP-hard.
This is another interesting classic graph optimization problem. It can be described as follows: given a graph
with demand points
V and
p candidate facility locations, and a set of edges
E, the p-median problem aims to find optimal locations to place or install
p facilities out of
to minimize the total weighted distance between demand points and customers to each facility. The formulation can be written as follows:
In problem (
12)–(
16), (
12) minimizes the total distances between customer
and facility
. The latter is performed using the binary variable
and the symmetric distance matrix
for all
and
. In this model,
is a binary variable equal to 1 if the client node
i is assigned to the facility
j, and
is 1 if the facility
j is opened. Then, the constraints (
13) ensure that each customer is assigned to a unique facility node. Similarly, constraints (
14) impose that a customer
can only be assigned to a unique and open facility node
. Next, the constraint (
15) guarantees that the sum of facilities should be equal to
p. Finally, the constraints (
16) denote the domain of the decision variables.
This problem appears as a variant of the p-median problem by introducing a fixed cost
for all
, i.e., for the open facility at location
j. The rest of the variables and parameters retain the same meaning as in the p-median model, including
and
. Then, the goal is to minimize the total installation and assignment cost without specifying a fixed number of facilities. The formulation is as follows:
In model (
17)–(
20), the objective function (
17) minimizes the installation cost and the total distance between customers and open facilities. The only difference from the p-median problem is that model (
17)–(
20) does not impose a fixed input parameter
p of the facilities. The rest is analogous to the p-median and thus self-explanatory.
The Minimum Spanning Tree (MST) problem aims to connect all nodes in a connected graph with the minimum total edge weight without forming cycles in the output solution of the problem. Given an input connected graph
. In this model,
is a binary variable equal to 1 if the edge
is selected in the spanning tree and 0 otherwise. The parameter
represents the cost or weight associated with the edge
. The term
denotes the subset of edges whose both endpoints lie within the subset of nodes
. One of its formulations can be written as [
61]:
This is an exponential formulation due to the exponential number of subtour elimination constraints in (
23). The objective function (
21) minimizes the total connectivity costs of the output solution tree. Finally, the constraints (
23) avoid cycles in the tree solution obtained. Another related problem is known in graph optimization as the traveling salesman problem (TSP).
The TSP aims to find a Hamiltonian cycle consisting of the largest cycle that unites all nodes of the input connected network. The Hamiltonian cycle should be the shortest route that visits each node of the graph exactly once and returns to the starting point. Similarly to MST, there are several equivalent formulations in the literature [
61]. The problem requires an input graph
where
A denotes a set of arcs instead of edges. Consequently, for each edge
in E, we replace each edge by the two arcs
and
in
A. In this model,
is a binary variable equal to 1 if the arc
is part of the tour and 0 otherwise. The parameter
represents the travel cost or distance from node
i to node
j. The set
corresponds to the arcs whose endpoints are both within a subset
. To be coherent, in the following we also present an exponential formulation.
In model (
25)–(
29), the objective function (
25) minimizes the total cost of connectivity. Constraints (
26) and (
27) ensure that each node has one incoming and one outgoing arc. Constraints (
28) avoid cycles except for the size cycle
, thus forming the Hamiltonian cycle.
Notice that all these formulations are classic graph optimization models from the operations research domain. Consequently, they provide many opportunities to construct new novel modeling approaches for the generic field of network science. In particular, for future wireless communication networks. They can be adapted to problems in the domains of 5G, 5G+ and 6G communications, transportation networks, logistics, and supply chain management. The maximum clique and maximum independent set are classic models that can be used and adapted for all the above-mentioned infrastructures required in social networks, bioinformatics, and so on. Similarly, p-median and facility location problems are key models to enrich the domains of optimizing infrastructures in wireless networks. The minimum spanning tree has been used and can be used for many other modern network design topologies for communication and energy optimization problems. Finally, TSP is a fundamental problem for ring infrastructures in communications, logistics, and planning.
Recently, advances in graph neural networks (GNNs) have offered powerful tools for dynamic network modeling in 6G environments [
69]. Despite static graph optimization, GNNs enable the learning of node and edge representations over time, allowing real-time adaptations to changing topologies, device mobility, and stochastic interference. Many architectures, such as graph attention networks (GATs), spatial-temporal GNNs, and message passing neural networks (MPNNs), have been applied to predict routing, resource allocation, and user association in mobile networks. Similarly, processing network graphs under uncertainty, such as fluctuating connectivity or unreliable links, can benefit from probabilistic graph models, robust GNN training, and Bayesian graph learning techniques. These methods complement traditional OR models by providing learning-based adaptability in dynamic and uncertain 6G scenarios [
70,
71,
72,
73].
In general, networks can be categorized as static or dynamic. In the former case, this occurs when the topology remains constant over time. In the latter case, the nodes and edges evolve, which directly influences the optimization strategies. Examples of both types of networks include mobile telecommunications networks, social networks online, autonomous vehicle systems, and many others. Below, we present two classic mathematical formulations to better illustrate how the time dimension can be incorporated in operations research problems involving networks: the dynamic shortest path problem and another one for the dynamic facility location problem.
The dynamic shortest path problem consists of finding the shortest path in a network where the edge weights change over time. Formally, given a graph
with time-dependent edge costs
, the main goal is to minimize the travel cost between a source
s and a destination
d. In this formulation,
is a binary variable equal to 1 if the arc
is selected in the path and 0 otherwise. The parameter
denotes the time-dependent cost of arc traversing
at time
t. The node
s represents the source and
d the destination. The set
A is the set of directed arcs derived from the network topology. The model can be written as follows:
where the objective function (
30) minimizes the changing costs. The remaining constraints are static and determine the flow to be directed in such a way that the shortest path is obtained [
59,
61].
3.5. Centralized and Distributed Optimization
Observe that network optimization using graph theory allows us to deal with the fundamental problems in communications. Notice that over time, networks can be static, which means that the topology remains fixed or dynamic due to mobility, failures, or network movements. In addition, note that network optimization can be used in a centralized or distributed manner. In centralized optimization, a single global entity makes decisions with full access to the data, guaranteeing that the optimal solution will be obtained, although it can be computationally expensive and not easily scalable.
Distributed optimization, on the other hand, allows us to make decisions from multiple agents cooperating simultaneously, making the network more robust and scalable. Although it may require efficient communication between nodes. An example of a more dynamic network can be represented with a time-indexed graph
, where
and
change their coordinates and connection links at each time step
t. Following the idea of a typical dynamic shortest path problem, it can be formulated as follows.
In this dynamic formulation,
is a binary variable equal to 1 if arc
is used at time
t and 0 otherwise. The cost function
represents the time-dependent cost of traversing the arc
at time
t, and
denotes the set of available arcs at time
t. Similarly,
is the set of active nodes at time
t, and
is the net flow demand at node
i at time
t. Optimization is performed on a finite time horizon
T.
Distributed optimization uses many nodes to update their decisions on time using local information and communication with their neighbors. A distributed problem for resource allocation can be formulated as follows.
where the variable
is the decision at node
i,
is the neighborhood of
i, and
denotes the communication weights in a cooperative algorithm. The input parameter
can be a non-linear function related to the cost of installation, depending on the decision variable
x. Similarly,
can be associated with resource allocation costs depending on the decision variables
and
. Next,
denotes the communication weight used in the consensus constraint. A consensus approach is a distributed method in which local nodes make decisions based on communication with their neighbors, useful in decentralized networks such as blockchain. or software-defined networks (SDN).
3.6. Lessons Learned and Technique Limitations
Several important lessons and limitations can be observed from optimization techniques based on the reviewed work.
For example, classical optimization approaches such as linear and integer programming are still commonly used for structured problems, including routing and facility location, since these methods offer solid mathematical foundations and guarantee optimal solutions. However, they do not scale to large networks and often require long computational efforts in terms of CPU time to be solved optimally.
Metaheuristic methods such as genetic algorithms (GA), particle swarm optimization (PSO), and tabu search are commonly used when exact methods are too slow. These methods are more flexible and provide good quality solutions in complex environments like wireless sensor networks in reasonable CPU time efforts. However, they do not guarantee optimality and their performance often depends on careful parameter tuning.
Machine learning (ML) and deep reinforcement learning (DRL) techniques are increasingly popular for problems that involve uncertainty, high-dimensional data, and dynamic conditions, such as those found in 6G, IoT, and edge computing. These techniques can adapt in real time and learn from data. However, they require large training datasets, high computational resources, and often lack interpretability.
In general, we observe that classical methods are underused in areas like resilience and robustness optimization. This suggests a research opportunity that combines the theoretical strength of operations research with the adaptability of modern AI methods. In summary, each family of techniques has its own strengths and weaknesses. Understanding these trade-offs is key to selecting the best method for each network optimization problem.
3.7. Observed Gaps in Benchmarking and Poor Consistency Across Reviewed Works
Table 1,
Table 2,
Table 3,
Table 4,
Table 5 and
Table 6 present a solid classification of recent works using OR and AI techniques. However, an important limitation observed is the lack of standardized benchmarking and consistent evaluation procedures. For example, several works report significant improvements in latency and energy efficiency. However, these metrics are measured using different numbers of nodes in the networks considered, different traffic models, or simulation environments. Consequently, individual works such as [
4,
11,
23] claim performance gains using reinforcement learning or deep learning; their results are not directly comparable due to differing experimental settings and baseline experiments. Moreover, some works rely on established classical formulations (e.g. MILP or ILP) as benchmarks [
5,
8], but many others do not report comparisons with standard baselines. The latter makes it difficult to assess the true advantages of the proposed approaches. To address this gap, we suggest the potential use of a minimal comparative framework in future studies, perhaps including:
Same network topologies (for example, ring, tree, random graphs with 100 to 500 nodes).
Standardized metrics (e.g., end-to-end delay in ms, energy per bit in J, task drop rate %).
Clear reporting of computational cost (e.g., run-time, number of iterations).
Baseline algorithms (e.g., MILP from [
59], PSO from [
60] or rule-based heuristics).
Although the scope of this review is not to enforce a benchmarking standard, we emphasize that such a framework would be highly beneficial for reproducibility and to evaluate the progress of hybrid OR-AI techniques in various applications related to 6G. Finally, public simulation platforms such as Mininet [
3] or solver tools such as CPLEX [
2] can also contribute to comparable experiments, provided that their use is clearly documented. Shared datasets and open code repositories would also support the transition from theoretical modeling to practical, scalable deployment in next-generation networks.
As illustrated in
Figure 5, even when similar metrics, such as latency improvement, are reported in recent studies, the lack of standardized conditions, such as network size, baseline methods and traffic models, prevents a meaningful comparison. This further reinforces the urgent need for a shared benchmarking framework to support reproducibility, fair evaluation, and methodological transparency in the field of network optimization.
To support future comparative studies, we propose the following minimal benchmarking framework for optimization in wireless networks.
Network topologies: Use standard graphs such as ring, tree, and random topologies with sizes ranging from 100 to 500 nodes.
Evaluation metrics: Report latency (ms), energy per bit (J), and task drop rate (%) using consistent baselines.
Computational reporting: Include CPU time, iteration counts, and convergence thresholds.
Baseline methods: Compare against classical models (e.g., MILP, PSO) and simple heuristics.
These elements can help promote reproducibility and fair comparison among AI and OR-based optimization methods, as shown in
Table 8.
3.8. Resource Allocation and Scheduling in Networks
Resource allocation and scheduling in networks are important problems in distributed systems. In particular, telecommunications, cloud computing, and sensor networks aim to efficiently distribute bandwidth, power, and processing times among several nodes, minimizing costs, and maximizing network bit rates.
Let
represent a network with a set of nodes
V and a set of user edges
E representing links with limited bandwidth
. The goal of the optimization problem is to assign the bandwidth where the variable
represents the amount of bandwidth allocated to the link
, and
is the minimum bandwidth demand for node
i, thus ensuring the required capacity constraints. In this model,
is a binary variable that indicates whether node
i is active or not. The parameter
denotes the total capacity of the link
in the network graph. A generic model can then be written as
The variables in this model can be defined as
: Binary variable for each node i. if the node i is activated or selected. if the node i is not active.
: Non-negative variable for each edge . Represents the flow or allocation from node i to node j, which is bounded from above by .
Finally, the objective function maximizes the maximum number of active nodes. The constraints for all ensure the minimum demand for each activated node. Next, the constraints for all ensure that the links are not saturated.
The set of tasks
T needs to be assigned to a set of servers
S to minimize the overall completion time in a cloud computing system. Consider that the processing times
for tasks
on the server
s are limited by the amount of capacity
of each server. Then, a mathematical formulation can be written as follows.
In this model,
is a binary variable equal to 1 if the task
is assigned to the server
. Generic models of this type can provide a solid reference for solving real-world resource allocation and scheduling problems in networked systems. In particular, this model minimizes the worst bandwidth allocation while ensuring that each user’s demand is met within the network’s capabilities. Another example is a model that minimizes the total task completion time by efficiently distributing tasks across servers with limited capacity in a cloud task scheduling situation. In particular, in this model, the binary variable
indicates if the task
is assigned to server
or not. The parameter
represents the weight or cost of allocating the task
t to the server
s, and
is the maximum capacity of the server
s. The objective function goal is thus to minimize the worst charge accumulated among all servers. This can be expressed as
. The first constraint ensures that each task
t is assigned to a unique server. The second ensures that the sum of the weights of the tasks assigned to a server does not exceed the capacity
.
Resilience and robustness optimization in networks focus on designing optimal infrastructures capable of dealing with failures and attacks while simultaneously ensuring service. Resilience is the quality of the network’s ability to recover from disruptions. At the same time, robustness guarantees the capacity to maintain network operation under difficult conditions. As such, graph-based models help optimize these relevant aspects by minimizing the impact of failures against strategic attacks, connectivity, and functionality.
The following model ensures that the network remains operational after the failure of a subset of critical connections. In this model,
is a binary variable equal to 1 if the link
is included in the resilient design.
where
represents the set of all possible connection failures, ensuring that at least one path remains in good condition. The variable
for all
equals one if the edge
is still operating; otherwise it equals zero. The input matrix
denotes the cost of choosing the edge
. Constraints (
34) ensure that any subset
is considered. Finally, constraints (
35) are domain constraints for the decision variables.
This model minimizes the worst-case connectivity loss when an adversary removes a set of critical nodes. In this robust optimization model,
is a binary variable equal to 1 if node
i remains functional under attack and 0 otherwise. The parameter
k represents the minimum number of nodes that must fail for a subset
S to be considered compromised. The set
contains all vulnerable or critical subsets
that are evaluated under attack scenarios. The model is
where
denotes all possible attack scenarios. The idea in this model is to simply maximize the total number of remaining nodes while in an attack
,
k nodes have been removed. This is achieved by the constraints (
37). Finally, the constraints (
38) define the domain of the decision variables. These models provide a structured framework to make the network resilient and robust against failures and strategic attacks.
3.10. Wireless and Mobile Networks Optimization
The optimization of wireless and mobile networks is highly relevant for improving the efficiency and performance of real-time communications. Since users are constantly moving and signal conditions vary, these aspects pose challenges in terms of coverage, resource allocation, and interference management. Since mathematical formulations consider dynamic user locations, frequency assignments, and network management, they play a key role in ensuring the quality of service. In addition, the network infrastructure, such as the location of the base station or the routing of the data transmission route, is also crucial in the performance of mobile and 6G networks.
Power control in wireless networks seeks to determine the optimal transmission power for each node to minimize interference while maintaining communication quality. In this formulation,
denotes the transmission power of node
i. The parameter
models the level of interference caused by node
i on node
j, while
represents the gain or attenuation factor of the channel between
i and
j. The value
is the minimum signal threshold required at the receiver node
j to maintain acceptable quality. The power for each node is limited between
and
. It is stated as
In model (
39)–(
41), the objective is to minimize the power interaction between each pair of nodes
. Here, the parameter
denotes the channel gain between each pair of nodes. Constraints (
40) ensure that a minimum power is required for each node
. Finally, the constraints (
41) indicate that each power node
for each
should be between parameters
and
.
In the base station location problem, the goal is to optimize the location of base stations while providing user coverage to mobile users. It also considers the constraints for maintaining available resources and coverage areas. In this formulation,
is a binary variable equal to 1 if a base station is installed at candidate location
, and
is equal to 1 if the user
is served by the station
i. The parameter
denotes the installation cost on site
i. The set
V contains potential base station sites, and
U represents the set of users requiring service. It is stated as
In model (
42)–(
46), the objective function is to minimize the installation costs
for each
, which is achieved using the binary variable
for all
. All users
must be assigned to a particular and unique facility
. All of this is ensured by the remaining constraints, which are equal to the facility location problem previously explained. Thus, we omitted the detailed explanation of each of the constraints here.
3.11. Energy Efficiency in Wireless Networks
Since data traffic and connectivity demands increase, it is essential to design algorithms and models that minimize energy consumption while maintaining the quality of service. In the following, we present two examples of modeling power allocation in wireless networks and network resource allocation, respectively.
In wireless networks, power allocation is essential to improve efficiency while maintaining the quality of service at high levels. The problem can be formulated as an optimization problem to minimize total power consumption. In this model,
is the transmission power of node
, where
N is the set of transmitting nodes. The variable
represents the signal-to-noise ratio at node
i, and
is the minimum required SNR threshold for reliable communication. The parameter
denotes the channel gain between node
i and its receiver. Consequently, the following optimization problem can be stated.
where the total power consumption is minimized in the objective (
47). Next, constraints (
48) ensure that the signal-to-noise ratio of each node
must be greater than or equal to a predefined threshold
. Then, the constraints (
49) indicate that the power of each node can be calculated as shown in the ratio formula where
denotes channel gain. Finally, each power must be nonnegative, which is achieved by the constraints (
50).
This model considers the problem of resource allocation in a multicell wireless network where the goal is to maximize energy efficiency by assigning bandwidth and power to users, also ensuring fair distribution. In this model,
denotes the transmission rate of node
, and
is its associated transmission power. The objective is to maximize global energy efficiency, defined as the total rate per unit of power. The function
maps each rate to its required power, typically based on channel characteristics or modulation schemes. The parameter
B is the total available bandwidth or the aggregate rate budget for the network. The model is stated as
The objective function (
51) maximizes the sum of the total capacities
over the sum of the total powers
of each node
. Next, constraints (
52) limit that the sum of the total capacity should not exceed the value
B, which is the total available bandwidth in the network. The generic constraints (
53) illustrate the relationship between capacity and power. Finally, the constraints (
54) ensure that the capacity and power variables must be nonnegative.