Next Article in Journal
Adaptive Emergency Call Service for Disaster Management
Previous Article in Journal
Body Motion Sensor Analysis of Human-Induced Dynamic Load Factor (DLF) for Normal Walks on Slender Transparent Floors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Peer–Peer Communication Using Novel Slice Handover Algorithm for 5G Wireless Networks

1
Department of ECE, Ramco Institute of Technology, Rajapalayam 626117, Tamilnadu, India
2
Data Analytics Lab, Department of AD, Ramco Institute of Technology, Rajapalayam 626117, Tamilnadu, India
3
Department of Computer Engineering, Sungkyul University, Anyang 14097, Republic of Korea
4
Department of Computer Science Engineering, Sanjivani College of Engineering, Kopargaon 423603, Maharashtra, India
5
University Centre for Research & Development, Department of Computer Science & Engineering, Chandigarh University, Gharuan, Mohali 140413, Punjab, India
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2022, 11(4), 82; https://doi.org/10.3390/jsan11040082
Submission received: 30 August 2022 / Revised: 17 November 2022 / Accepted: 25 November 2022 / Published: 29 November 2022

Abstract

:
The goal of 5G wireless networks is to address the growing need for network services among users. User equipment has progressed to the point where users now expect diverse services from the network. The latency, reliability, and bandwidth requirements of users can all be classified. To fulfil the different needs of users in an economical manner, while guaranteeing network resources are resourcefully assigned to consumers, 5G systems plan to leverage technologies like Software Defined Networks, Network Function Virtualization, and Network Slicing. For the purpose of ensuring continuous handover among network slices, while catering to the advent of varied 5G application scenarios, new mobility management techniques must be adopted in Sliced 5G networks. Users want to travel from one region of coverage to another region without any fading in their network connection. Different network slices can coexist in 5G networks, with every slice offering services customized to various QoS demands. As a result, when customers travel from one region of coverage to another, the call can be transferred to a slice that caters to similar or slightly different requirements. The goal of this study was to develop an intra- and inter-slice algorithm for determining handover decisions in sliced 5G networks and to assess performance by comparing intra- and inter-slice handovers. The proposed work shows that an inter-slice handover algorithm offers superior quality of service when compared to an intra-slice algorithm.

1. Introduction

Since the introduction of the first generation of wireless technology, the telecommunications industry has grown at an exponential rate. The industry’s growth can be attributed to an increase in customer demand for network services. Users requesting network services have a wide range of needs, including streaming videos and audio, sending and receiving multimedia files, and making online transactions. These services necessitate network providers providing high levels of QoS, while resourcefully consuming network resources.
In this regard, 5G networks use different kinds of technologies and Network Slicing to accommodate the varying needs of users. Network slicing is the rational division of a physical network structure into multiple autonomous virtual networks, each of which is designed to meet the needs of specific users. The use of radio resources is improved through network slicing, which ensures that only the resources required are readily available. Network slicing ensures that the networks make optimum use of network resources. In order to deliver acceptable QoS, mobility management is a major difficulty in 5G networks where continuous connectivity, smooth at cell borders, is anticipated.
The capacity to retain a link when a call shifts from one to another is known as mobility management. When the user moves from one region to another while a call is in progress, the network’s responsibility is to keep the call active, while shifting it from one to another cell. The process of transferring a call to a cell that supports a similar network is known as horizontal handoff, whereas the process of transferring a call to a cell that supports a different network is known as vertical handover. In 5G, calls can be reassigned to slices that support similar use cases in a procedure known as intra-slice handover, or to slices that support dissimilar use cases in a procedure known as inter-slice handover.
The 5G networks incorporate well-organized algorithms to guarantee that fewer calls are rejected or missed around handoffs and that the numeral of handoffs executed is reduced in order to provide smooth connectivity during a handover. For the purpose of giving significance to handoff calls and sustaining excellent QoS, the vertical handover algorithm employs distinct bandwidth reservation methods.
The origins of mobile communication can be traced back to Guglielmo Marconi’s pioneering effort in long-distance radio transmission. Since Guglielmo’s time, the technology behind mobile communication has advanced dramatically. The number of subscribers and mobile technologies has seen the most significant developments in wireless technologies [1]. The following 2G networks were built on digital technologies such as Time Division Multiple Access. Then, 3G networks offered high data rates and multimedia features. After that, 4G network combined 3G and secure internet to enable wireless mobile internet.
The main goal of 5G networks is to provide high bandwidth, low latency, and always-on connectivity. The increased number of devices requesting services from wireless networks resulted in a rise in the number of wireless network research studies conducted in academia.
Wireless technology has progressed through multiple generations and continues to do so. The term “generation” refers to how the system evolves in terms of pace, technology, and frequency. Each generation is defined by its own set of capabilities, skills, and characteristics that set it apart from the one before it. The initial generation of wireless technology was known as 1G. Frequency reuse was the key technique underpinning 1G, and it was solely castoff voice conversations [2].
Falowo et al. offered a JCAC algorithm. wherein call admission circumstances are made depending on the choices of the user [3]. The proposed method was tested in scenarios where users paid the minimum for their favorite services. The method was simulated using a Markov Chain to see how effective it was in lowering service costs, and the results showed that the technique could reduce service costs significantly.
Chen et al. [4] offered a Markov chain model and a sensitivity analysis-based, threshold-based call admission control system. The sensitivity evaluation is used to bind the number of recompilations that the algorithm performs, and the Markov model is utilized to find the best policy. The approach outperformed the guarded channel and complete sharing algorithms when tested in event-driven systems.
Alfoudi et al. presented modular mobility management, in which every slice has a unique module that levers its mobility needs and implements the slice mobility management policies [5]. The suggested method is based on a joint abstraction that allows the slices to end up sharing resources. Every user is given a slice ID to help with continuous connectivity and when the user is transferred to another RAN, the slice ID is used to identify which slice provides the greatest service. User satisfaction is great and resource use is efficient.
Falowo et al. [6] suggested an AJCAC system that can be utilized to improve system deployment, reduce call blocking and dropping probabilities and ensure that all allowed calls have their QoS needs met. The method was simulated, and the results were compared to those of a non-adaptive JCAC, revealing a 20% increase in system utilization.
Lee et al. used a distributed reinforcement learning approach in [7], which allows the equipment to acquire the policies for optimal multi-connectivity configuration and choose the best RAT. The authors suggest a Q-learning-based method because of its capacity to learn the appropriate policy without prior knowledge of its surroundings. When implemented with learning, reinforcement learning algorithms take into account immediate costs, as well as future expenses. The algorithm was designed to find the best policy that reduces total cost.
The level of reference signal received power (RSRP) is monitored by users in reinforcement learning, and the strongest base station with the highest power is chosen. Simulations are used to assess the algorithm’s performance, which is then compared to that of a lone connection RAT selection method and a dual-link RAT selection algorithm [7]. The effects demonstrated that the suggested reinforcement learning algorithm outperformed the single and dual connectivity algorithms, in terms of reliability and QoS. However, despite its benefits, the program’s most significant disadvantage was its difficult implementation.
Yajnanarayana et al. presented a reinforcement learning-based handover approach [8]. The system employs a centralized reinforcement learning agent that handles network capacities from the user equipment and uses the data to determine the best handover choice in order to maximize lasting utility. The proposed scheme was assessed and related to conventional handover algorithms, with the findings indicating a 20 percent rise in the efficiency of creating the correct handover decision.

2. The 5G Networks

The 5G wireless network is the most recent and is an all-IP network that is expected to serve a variety of industries, including defense organizations, and medical and manufacturing industries [9]. It is envisaged that 5G satisfies user QoS necessities in various applications, providing broad coverage so that users have a seamless connection, even at cell borders [10]. The 5G system uses the network slicing method, which allows service providers to virtualize networks on a common infrastructure to freely deploy their services.

2.1. Network Slicing

The 5G network supports a wide range of use cases and offers tailored services among users to meet a variety of QoS criteria. In the context of 5G networks, network slicing is defined as a procedure in which network resources are packed and allotted in an isolated manner to distinct users with different requirements [11]. A slice is a set of resources bundled to suit certain user needs in terms of the slice’s quality of service. The purpose of network slicing is to maximize resource deployment by only supplying resources on an on-demand basis.
The promoting feature of network slicing is network resource virtualization, which allows different service providers to share physical infrastructure in a versatile and dynamic way, permitting them to optimally use network resources. Since virtual networking is part of the Software Defined Networks, which intends to move present networks to a software-based model [12], network slicing is expected to be more efficient. The 5G networks include specific slices designed for the network’s primary use cases, such as eMBB, uRLLC and mMTC. To provide users with the finest QoS and security, the slices are segregated from one another.

2.2. Use Cases of 5G Network

The ITU and 5GPPP have divided 5G network use cases into three major areas based on the demands of each use case. The use cases are divided into two categories: eMBB and mMTC. Each use case has its own set of needs that are unique to it.

2.2.1. Ultra-Reliable Low Latency Communication

The uRLLC slice is customized for mission-critical applications, such as those that demand small latency, high dependability, and security. Mission-critical applications demand a constant flow of information and are less patient with delays, the optimal latency is less than 1ms, and transmission rates are up to 10 Gbps. Telemedicine and self-driving cars are two examples of applications that can benefit from the uRLLC slice.

2.2.2. Enhanced Mobile Broadband

The eMBB slice is intended to address the shortcomings of preceding wireless network generations. The major purpose of eMBB is to improve connection at cell boundaries and deliver quicker, invariable networks with 1 Gbps speed and less than 1 ms latency. Augmented Reality, Virtual Reality and high-quality video streaming are examples of eMBB.

2.2.3. Massive Machine Type Communication

The mMTC slice is built to support a wide range of IoT devices. IoT gadgets are continually connected and their uplink is featured by low throughput and data transfer rate. Since IoT devices have minimal end-to-end latency requirements, the mMTC slice provides latency of less than 10 ms with the least bit rate of 0.5 Mbps. Smart home and smart city devices are examples of applications that can use the mMTC slice.

2.3. The 5G Network Slicing Enabling Technologies

Network slicing makes use of the following to create a communication service where slices may be produced periodically.
Software Defined Network: SDN is described by the physical structure that contains the network control plane and forwarding plane. The separation allows for more flexibility and provides a global perspective of the entire network, as well as means to respond to network changes [13]. SDN is used to build a virtualized control plane that uses intelligent network management techniques to bridge the gap between network management and service allocation.
Containers: Containers are built on the concept of OS-level virtualization and are used instead of hypervisor-based virtual machines [13]. It runs on the operating system and allows for greater application compactness. Containers include Dockers, Linux-Vserver, and OpenVZ. VMs and Containers are used in 5G networks to operate VNFs that are connected together, creating a 5G network slice.
Network Function Virtualization (NFV): NFV is a technique that can be cast off to virtualize network operations. Such as Virtual Private Networks and Firewalls on product hardware, breaking the old hardware–software paradigm [13]. NFV transfers network functions to service providers, who run them on shared infrastructure, making it simple to manage the addition, removal, or update of functions for customers without having to physically visit their location. NFV ensures the performance of Virtual Network Functions (VNFs) operations in the context of 5G, including small latency and failure rate [13].
Standard Interfaces, such as OpFlex [14] and OpenFlow [15], enable direct network control programming. The SDN controller dynamically manages the slices by combining slices that fit the identical context using a set of established rules.
Multiple Edge Computing (MEC): MEC is a technology that allows application and content providers to leverage cloud services at the mobile network’s edge [16]. By processing data, MEC makes it possible to carry ultra-low latency to mission-critical applications. The deployment of MEC improves network resource utilization by hosting applications at the network edge.
Cloud Computing: Cloud computing is a term that describes the technology that is used to supply computer services via the internet, storage databases, and applications. According to Mujumbi et al. [17], service providers can be classified as Infrastructure Providers or Service Providers. InPs’ main responsibility is to maintain cloud and lease services depending on usage. SPs are in charge of renting resources from InPs and assigning them to various users.
Network Hypervisors: This abstracts the physical infrastructure into virtual network slices.
Virtual Machines: Virtual Machines enable the virtualization of physical resources, agreeing the user to run a self-governing OS with functions segregated on the host, yet sharing crucial resources.

2.4. Network Slicing Challenges

The idea of network slicing is not without its drawbacks. Numerous difficulties are encountered as a result of the concept being a novel issue in academics and industry, resulting in disagreements over the best method to execute the technology.
Security: As 5G wireless networks deliver services to intelligent devices, new intelligent security procedures are required to protect the services from cyber-attacks, such as Denial of Service. Security can be achieved by network virtualization or through slice management security.
Mobility Management: Mobility management is accustomed to ensuring that ongoing calls are not disrupted while users move at different speeds. For applications that demand minimal latency, seamless and quick handover is a must. To execute seamless handover, it is necessary to maintain track of location and estimate the route most likely to be taken and time spent at a specific RAT. The deployment is difficult since it necessitates coordination among many MVNOs.
Resource Allocation: 5Gs is innovative, so it is challenging to assign network resources. The allocation mechanisms used in 5G are in charge of deciding which resources are instantiated, prioritizing slices, and permitting MVNOs to coordinate.
Isolation: Isolation in network slices refers to confirming that variations in one slice do not affect changes in other slices. As channel quality changes in an unpredictable manner, implementing isolation in network slices is tricky.

3. System Design

The sliced network design enables the establishment of logically distinct networks that share infrastructure, letting slices provide specific use cases. The developed method is based on the formulae and representations used by Falowo in [18], and the handover decision algorithm is evaluated using a numerical technique, based on the Markov decision process. Our proposed scheme makes use of the network module developed in Matlab and Python to calculate the outputs and depict the graphs. The Operating System was the following: Windows 10, Processor: Intel® Core™ i7-1265UL Processor, RAM: 16 GB DDR3, Storage: 500 GB SSD.

3.1. Network Model

Network slicing is a concept that permits many self-contained networks to be built on a maximum of a single shared infrastructure. Infrastructure Providers (InPs) are the owners of shared infrastructure and are responsible for supplying resources to tenants. Tenants receiving resources from InPs include Mobile Virtual Network Operators (MVNOs). In sliced networks, resource distribution is accomplished through a tiered approach that encompasses both InPs and MVNOs. They are positioned at distinct stages of the organization and have diverse resource allocation responsibilities. InPs distribute resources to MVNOs, who then distribute the resources to different slices.
A sliced network has the following three separate slices, each with its own set of needs: eMBB, mMTC, and uRLLC. The slices have resources allotted to them for their specialized use cases, but they are not responsible for taking any calls. The CAC algorithm is realized at the MVNO level, which is responsible for taking calls from various users. When a call is accepted to the eMBB slice in one MVNO it is then handed over to the eMBB slice in another MVNO or the uRLLC slices an MVNO.

Assumptions of Network Model

During the implementation of the network model, the following assumptions were made.
  • In order to maximize radio resource utilization, the MVNO gives all slices equal priority when allocating resources.
  • Users are prioritized at each slice based on their arrival time.
  • Since its UEs are not mobile, the mMTC slice does not support handoff calls.
  • In eMBB and uRLLC, handoff calls take precedence over new calls.
  • Each user has their own set of requirements.
  • In a slice, users are evenly dispersed.

3.2. Call Admission Control (CAC) Model

The following were the goals of the proposed CAC algorithm for sliced 5G networks:
  • Guaranteed QoS.
  • Priority given to handoff calls.
  • Reduced Call blocking and dropping probabilities.
Imagine an InP that provides the groundwork to a group of MVNOs, where M is the number of MVNOs:
M = {1, 2,…, |M|}
Each MVNO has a total of Ym slices, which is given by:
Ym = {1, 2, …,|Ym|}
with every slice isolated from others in the same network. All call arriving processes are assumed to be Poisson processes.
A use case and capacity are assigned to each slice of the virtual network. The highest number of radio resources that the slice can give is referred to as the slice’s capacity. According to other studies, radio resources are supplied in terms of multiplexing techniques. Nevertheless, the capacity is obtainable in terms of Basic Bandwidth Units (BBUs) for the purposes of this study. A use case is a collection of services with comparable criteria, such as eMBB. The MVNO can take a call requesting services and assign it to a slice based on the call’s requirements. A video streaming device, for example, can issue a service request, and the MVNO admits it to the eMBB slice. The MVNO examines the slice conditions in terms of load during call admission.
Inter-slice handover occurs when a call is transferred to a slice that supports distinct use cases, such as an eMBB call to an uRLLC slice, while intra-slice handover occurs when a call is transferred to a slice that supports the same use case, such as an mMTC call to an mMTC slice. As the qualifications for the uRLLC slice are stricter, they cannot be permitted any slices. Calls are conditioned for eMBB such that the uRLLC slice can be met; therefore, they can be passed to the uRLLC slice. Calls for the mMTC slice have a wide range of needs that can be met by both the eMBB and uRLLC slices; thus, they can be distributed to either. Calls are permitted to a slice only if the slice has sufficient radio resources to meet the call’s necessities without interfering with other permitted calls; otherwise, the call is forwarded to some other slice, blocked, or dropped.
The slice and use-case considered are shown in Figure 1. The slices are mentioned as eMBB, mMTC and uRLLC, respectively.
Each slice ym ∈ Ym which fits to an MVNO, m, has a capacity signified by By, and the total capacity is:
Bm = Σ By
Every slice has a group of users W y m . The users firmly rely on the slice given by:
W y m = { 1 ,   2 ,   , | W y m | }
Each user w∈ W demands a bandwidth of Bu when accepted to the slice, and the slice distributes a fraction Fy of its overall bandwidth to the subscriber. The likelihood of a subscriber w ∈ W pertaining to a slice ym ∈ Ym that belongs to MVNO m is based on the assumption that users are uniformly distributed:
pb = 1/Ym
As consumers are less tolerant of dropped handoff calls in slices that help them, handoff calls are given priority over new calls in slices that support them (eMBB and uRLLC).

4. Results and Discussion

The call blocking and call dropping probability are castoff to evaluate the algorithm under various scenarios specified by network characteristics. The algorithm was tested under the settings, and the results were plotted on graphs created with Python’s matplotlib module. The call blocking/dropping probabilities for each slice were used to compare the performance of the two implemented techniques. Table 1 shows the call blocking/dropping of various 5G network slices.

4.1. Capacity Impact on eMBB Call Blocking/Dropping Probability

In intra-slice and inter-slice handover, Figure 2 depicts the call blocking and dropping probability with respect to capacity. Inter-slice offered the finest QoS because it ha the lowermost blocking and dropping probabilities with the interslice of at least 36% lower than the intra-slice, and the interslice of at least 89 percent lower than the intra slice.
Calls for the eMBB slice could also be permitted in the uRLLC slice during inter-slice handover, so when a call cannot be accepted in the eMBB slice, it is transferred to the uRLLC slice before even being blocked or dropped, leading to fewer calls being blocked or dropped in inter-slice handover than in intra-slice handover.

4.2. Capacity Impact on mMTC Call Blocking Probability

The chart in Figure 3 illustrates that inter-slice handover had a blocking probability that was continuously lower than intra-slice handover by at least 88 percent. Calls for the mMTC slice could also be allowed in the eMBB and uRLLC slices, so when a call could not be allowed in the mMTC slice, it was passed to a few of the slices that had enough capacity to handle it before being blocked, leading to fewer calls being blocked in inter-slice handover than in intra-slice handover, where calls could not be passed to other slices.

4.3. Capacity Impact on uRLLC Call Blocking/Dropping Probability

Contrary to what was reported in Section 4.1 and Section 4.2, intra-slice handover call blocking and dropping probability was at least 45 percent lower than inter-slice handover call blocking, and 42 percent lower than the inter-slice handover call dropping, shown in Figure 4. Since the uRLLC slice accommodated calls from extra slices during inter-slice handover, the slice did not have adequate bandwidth dedicated for uRLLC calls, resulting in more calls being blocked and missed during inter-slice handover.

5. Conclusions

The physical network is sliced into many virtual networks in sliced 5G wireless networks, each tailored to cater to certain services. It is possible to implement two alternative methods by considering different slice handover situations. In the intra-slice handover technique, there is really no handover among slices, but there is handover between slices in the inter-slice handover algorithm. The analytical findings of the simulations revealed that when the incoming call rate increased, the call blocking and dropping probabilities increased in intra-slice handover. The rate at which the probability of a call arriving increased indicated that the network would be unable to deliver high QoS to users. As a result, the inter-slice handover technique was simulated, allowing calls to be routed to various slices. The blocking and dropping probability were dramatically reduced in inter-slice handover networks with the same arrival rates, indicating that a network with inter-slice handover can offer superior QoS to customers when compared to intra-slice handover.

Author Contributions

Conceptualization, A.J.P. and P.G.; methodology, A.J.P.; software, A.J.P.; validation, A.J.P., P.G., V.S. and S.L.; formal analysis, V.S. and S.L.; investigation, A.V. and K.M.; resources, K.M.; data curation, A.V., V.S. and S.L.; writing—original draft preparation, A.J.P., P.G., V.S., A.V. and S.L.; writing—review and editing, A.J.P., P.G., V.S. and S.L.; visualization, K.M.; supervision, R.M.; project administration, R.M. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2021R1F1A1063319).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gawas, U. An Overview on Evolution of Mobile Wireless Communication Networks: 1G–6G. Int. J. Recent Innov. Trends Comput. Commun. 2015, 3, 3130–3133. [Google Scholar]
  2. Bulbul, A.-M.; Biswas, S.; Hossain, M.B.; Biswas, S. Past, Present and Future of Mobile Wireless Communication. IOSR J. Electron. Commun. Eng. 2017, 12, 55–88. [Google Scholar]
  3. Falowo, O.E.; Chan, A.H. Joint Call Admission Control Algorithms: Requirements, Approaches, and Design Considerations. Comput. Commun. 2008, 31, 1200–1217. [Google Scholar] [CrossRef]
  4. Chen, H.; Cheng, C.-C.; Yeh, H.-H. Guard-Channel-Based Incremental and Dynamic Optimisation on Call Admission Control for Next-Generation QoS-Aware Heterogeneous Systems. IEEE Trans. Veh. Technol. 2008, 57, 3064–3081. [Google Scholar] [CrossRef]
  5. Alfoudi, D.A.S.; Mohammed, D.; Abayomi, O.; Rubem, P.; Myoung, L.G. Mobility Management Architecture in Different RATs Based Network Slicing. In Proceedings of the 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), Krakow, Poland, 16–18 May 2018; Volume 19, pp. 270–274. [Google Scholar]
  6. Falowo, O.E.; Chan, H.A. Adaptive Bandwidth Management and Joint Call Admission Control to Enhance System Utilisation and QoS in Heterogeneous Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2007, 2007, 034378. [Google Scholar] [CrossRef] [Green Version]
  7. Haeyoung, L.; Vahid, S.; Moessner, K. Machine Learning Based RATs Selection Supporting Multi-Connectivity for Reliability; Institute for Communication Systems (ICS), Springer – Cognitive Radio-Oriented Wireless Networks: Cham, Switzerland, 2019; pp. 31–41. [Google Scholar]
  8. Falowo, O.E.; Chan, H.A. Join call admission control algorithm to enhance connection-level QoS in heterogeneous cellular networks. In Proceedings of the AFRICON 2007, Windhoek, South Africa, 26–28 September 2007; pp. 1–7. [Google Scholar]
  9. Yajnanarayana, V.; Rydén, H.; Hévizi, L.; Jauhari, A.; Cirkic, M. 5G Handover using Reinforcement Learning. In Proceedings of the 2020 IEEE 3rd 5G World Forum (5GWF), Bangalore, India, 10–12 September 2019; Volume 1. [Google Scholar]
  10. Oladejo, S.O.; Falowo, O.E. 5G Network Slicing: A Multi-Tenancy Scenario. In Proceedings of the 2017 Global Wireless Summit (GWS), Cape Town, South Africa, 15–18 October 2017; pp. 88–92. [Google Scholar]
  11. Zhang, H.; Lui, N.; Chu, X.; Long, K. Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges. IEEE Commun. Mag. 2017, 55, 138–145. [Google Scholar] [CrossRef]
  12. Jiang, M.; Condoluci, M.; Mahmoodi, T. Network slicing management & prioritization in 5G Mobile Systems. In Proceedings of the European Wireless, Oulu, Finland, 18–20 May 2016; pp. 1–6. [Google Scholar]
  13. 5G Network Slicing. Available online: https://www.viavisolutions.com/en-us/5g-network-slicing (accessed on 30 August 2022).
  14. Barakabitze, A.; Ahmad, A.; Hines, A.; Mijumbi, R. 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Comput. Netw. 2019, 167, 106984. [Google Scholar] [CrossRef]
  15. Smith, M.; Dvorkin, M.; Laribi, Y.; Pandey, V.; Garg, P.; Weidenbache, N. Optiflex Control Protocol. Internet Engineering Task Force Internet-Draft: 21 April 2016. Available online: https://datatracker.ietf.org/doc/pdf/draft-smith-opflex-02 (accessed on 30 August 2022).
  16. Kolasani, L.A.; Ramamurthy, B. Network Innovation using OpenFlow: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 493–512. [Google Scholar]
  17. Carella, G.A.; Pauls, M.; Magedanz, T.; Cilloni, M.; Bellavista, P.; Foschini, L. Prototyping NFV-based multiaccess edge computing in 5G ready networks with open baton. In Proceedings of the IEEE Conference on Network Softwarization (NetSoft), Bologna, Italy, 3–7 July 2017; pp. 1–4. [Google Scholar]
  18. Mijumbi, R.; Serrat, J.; Gorricho, J.-L.; Bouten, N.; De Turck, F.; Boutaba, R. Network Function Virtualisation: State of the Art and research challenges. IEEE Commun. Surv. Tutor. 2016, 18, 239–279. [Google Scholar] [CrossRef]
Figure 1. Use Cases.
Figure 1. Use Cases.
Jsan 11 00082 g001
Figure 2. Call Blocking/Dropping Probability of eMBB Intra and Inter Slice.
Figure 2. Call Blocking/Dropping Probability of eMBB Intra and Inter Slice.
Jsan 11 00082 g002
Figure 3. Call Blocking Probability of mMTC Intra and Inter Slice.
Figure 3. Call Blocking Probability of mMTC Intra and Inter Slice.
Jsan 11 00082 g003
Figure 4. Call Blocking/Dropping Probability of uRLLC Intra and Inter Slice.
Figure 4. Call Blocking/Dropping Probability of uRLLC Intra and Inter Slice.
Jsan 11 00082 g004
Table 1. Call Blocking/Dropping Probability on network Slices of 5G.
Table 1. Call Blocking/Dropping Probability on network Slices of 5G.
SlicesCall Blocking/Dropping Probability
Inter SliceIntra Slice
eMBB_BP0.04570.1379
eMBB_DP0.00340.0699
uRLLC_BP0.23510.1185
uRLLC_DP0.11860.0615
mMTC_BP0.00160.034
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Pazhani.A, A.J.; Gunasekaran, P.; Shanmuganathan, V.; Lim, S.; Madasamy, K.; Manoharan, R.; Verma, A. Peer–Peer Communication Using Novel Slice Handover Algorithm for 5G Wireless Networks. J. Sens. Actuator Netw. 2022, 11, 82. https://doi.org/10.3390/jsan11040082

AMA Style

Pazhani.A AJ, Gunasekaran P, Shanmuganathan V, Lim S, Madasamy K, Manoharan R, Verma A. Peer–Peer Communication Using Novel Slice Handover Algorithm for 5G Wireless Networks. Journal of Sensor and Actuator Networks. 2022; 11(4):82. https://doi.org/10.3390/jsan11040082

Chicago/Turabian Style

Pazhani.A, Azhagu Jaisudhan, P. Gunasekaran, Vimal Shanmuganathan, Sangsoon Lim, Kaliappan Madasamy, Rajesh Manoharan, and Amit Verma. 2022. "Peer–Peer Communication Using Novel Slice Handover Algorithm for 5G Wireless Networks" Journal of Sensor and Actuator Networks 11, no. 4: 82. https://doi.org/10.3390/jsan11040082

APA Style

Pazhani.A, A. J., Gunasekaran, P., Shanmuganathan, V., Lim, S., Madasamy, K., Manoharan, R., & Verma, A. (2022). Peer–Peer Communication Using Novel Slice Handover Algorithm for 5G Wireless Networks. Journal of Sensor and Actuator Networks, 11(4), 82. https://doi.org/10.3390/jsan11040082

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop