Next Article in Journal
Decision Evolution and Governance Optimization in Duty-Free Quota Abuse Smuggling: A Multi-Agent Risk Avoidance Perspective
Previous Article in Journal
Research on Longitudinal Dynamics of 20,000-Ton Heavy Haul Trains Considering Braking Characteristics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resource Allocation for Network Slicing in 5G/RSU Integrated Networks with Multi-User and Multi-QoS Services

1
China Mobile Group Guangdong Co., Ltd., Guangzhou 510623, China
2
Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China
3
Institute of Data and Information, Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
Mathematics 2026, 14(1), 159; https://doi.org/10.3390/math14010159
Submission received: 1 December 2025 / Revised: 23 December 2025 / Accepted: 26 December 2025 / Published: 31 December 2025

Abstract

Network slicing in 5G systems enables different Quality of Service (QoS) for heterogeneous Vehicle-to-Everything (V2X) applications, yet efficiently allocating resource blocks from both 5G base stations and roadside units (RSUs) across multiple slices remains challenging. Existing approaches either pre-assign users to slices or rely on population-based metaheuristic algorithms that cannot guarantee deterministic real-time performance within the stringent 20 ms latency requirements of vehicular networks. This study formulates the resource allocation problem as an integer programming model that jointly optimizes slice selection and resource allocation to maximize weighted system transmission rate while satisfying heterogeneous QoS constraints. We develop a constructive heuristic algorithm that employs a hierarchical allocation strategy prioritizing 5G resources before RSU resources, coupled with a backfilling mechanism to exploit the remaining resource block capacity. Numerical experiments across abundant 5G and limited resource scenarios demonstrate the algorithm’s effectiveness. First, comparing against Random baseline validates the optimization model’s value, achieving 21.4–24.9% higher weighted throughput in an abundant 5G scenario and 42.5–51.0% improvement under a limited resource scenario. Second, performance evaluation with 500 users shows the proposed constructive heuristic achieves optimal solutions in abundant 5G resource scenarios and 3.5–5.7% optimality gaps in limited resource scenarios, while maintaining an execution time of under 20 ms, which satisfies real-time requirements and executes faster than Gurobi, Simulated Annealing and Round-Robin. Third, scalability analyses across 400–700 users demonstrate favorable performance scaling, as the optimality gap decreases from 5.3% to 3.4% with execution times consistently below 20 ms. The proposed heuristic achieves the highest service admission count while maintaining near-optimal system weighted transmission rate performance, ranking second only to Gurobi solver. Compared with other baseline algorithms, the proposed heuristic delivers a superior balance between solution quality and computational efficiency, confirming its real-time feasibility for large-scale V2X network deployments.

1. Introduction

The rapid evolution of intelligent transportation systems and the proliferation of connected vehicles have ushered in a new era of V2X communication, fundamentally transforming road safety, traffic efficiency, and mobility services. Modern vehicular networks generate an unprecedented diversity of applications ranging from safety-critical collision avoidance and autonomous driving control to bandwidth-intensive infotainment streaming and massive-scale traffic information collection. Each of these applications imposes distinct and often conflicting QoS requirements, including Ultra-Reliable Low-Latency Communication (URLLC) for safety applications, Enhanced Mobile Broadband (eMBB) for multimedia services, and Massive Machine-Type Communication (mMTC) for sensor data aggregation. Accommodating such heterogeneous service demands within a unified communication infrastructure poses formidable challenges for resource management in next-generation vehicular networks. This complexity necessitates granular QoS provisioning across the protocol stack, particularly at the Physical and MAC layers, to facilitate rigorous service isolation [1,2,3]. The fundamental significance of such hierarchical differentiation lies in its capacity to decouple the inherently contradictory performance objectives of heterogeneous V2X services. In a shared wireless environment, a “one-size-fits-all” approach is insufficient; without targeted differentiation, high-throughput eMBB traffic would inevitably compromise the deterministic low-latency essential for URLLC safety alerts. Consequently, layered QoS mechanisms are not merely an optimization but a safety-critical prerequisite, ensuring that life-saving signaling remains shielded from resource contention while maintaining overall network efficiency.
The emergence of 5G network slicing technology provides a promising architectural paradigm to address this heterogeneity challenge [4,5]. Network slicing enables the creation of multiple virtual networks on shared physical infrastructure, with each slice customized to support specific service characteristics and QoS requirements [6,7]. As illustrated in Figure 1, a network slicing architecture can logically partition resources into three specialized slices: the eMBB slice supporting high-bandwidth services such as in-car video streaming, the mMTC slice handling massive low-rate connections for vehicle sensor data uploading, and the URLLC slice ensuring ultra-low latency and high reliability for autonomous driving control. Each slice operates on the same physical infrastructure layer while maintaining service isolation and providing differentiated QoS guarantees. By orchestrating these dedicated slices through a centralized traffic platform, operators can provide service guarantees tailored to diverse vehicular applications, enabling vehicles with heterogeneous service requirements to access appropriate network resources dynamically.
However, realizing effective network slicing in vehicular environments introduces three critical challenges that existing approaches [3,7] have yet to fully address. First, the interdependency between slice selection and resource allocation remains underexplored. Traditional approaches typically pre-assign services to slices based solely on service categories (e.g., all safety messages to the URLLC slice, all entertainment traffic to the eMBB slice), then perform resource allocation within each slice independently. This separation fails to account for dynamic load imbalances across slices and overlooks opportunities for services with mixed QoS requirements to flexibly access multiple slice types. When traffic patterns fluctuate or certain slices become congested, static assignment strategies cannot redistribute load effectively, leading to resource fragmentation where some slices remain underutilized while others face capacity shortages. Second, the integration of heterogeneous 5G and RSU infrastructure requires coordinated orchestration strategies. In typical urban vehicular networks, communication infrastructure comprises both 5G base stations providing wide-area coverage with higher mobility support and RSUs deployed at intersections offering high-capacity, low-latency communication within limited coverage zones. While existing research has explored resource allocation in either 5G networks or RSU-assisted systems separately, efficient joint orchestration of these heterogeneous resources across multiple network slices, exploiting their complementary coverage and capacity characteristics, remains an open challenge. The dynamic and mobile nature of vehicular scenarios further complicates this orchestration: vehicles move rapidly across coverage areas, service demands fluctuate unpredictably with traffic patterns, and radio propagation characteristics vary significantly between deployment scenarios. Third, meeting stringent real-time constraints demands algorithms with deterministic execution guarantees. The 3rd Generation Partnership Project (3GPP) specifications mandate 20 ms end-to-end latency for safety-critical V2X services [8], imposing strict requirements on resource allocation decision cycles. While reinforcement learning (RL) methods have demonstrated impressive adaptability to dynamic vehicular environments, their training convergence times and decision latencies remain unpredictable, potentially violating real-time requirements during critical safety scenarios. Population-based metaheuristic algorithms similarly lack deterministic runtime bounds, with execution times varying significantly across problem instances. Safety-critical vehicular applications require resource allocation algorithms that guarantee solution delivery within predictable time windows, ensuring consistent performance regardless of network complexity or operational conditions.
Addressing these three challenges, this paper proposes a novel resource allocation framework that jointly optimizes slice selection and resource allocation to maximize weighted system transmission rate in sliced vehicular networks. The framework enables direct user-to-slice access where services are not pre-assigned to slices but instead dynamically matched to appropriate slices during the allocation process based on real-time QoS requirements and current resource availability across all slices. The core contribution lies in a constructive heuristic algorithm that: (1) jointly determines service-to-slice assignments and resource distributions through utility-driven prioritization, (2) coordinates 5G and RSU resource blocks via a hierarchical allocation strategy that prioritizes 5G resources before activating RSU capacity to exploit their complementary characteristics, and (3) guarantees solution delivery within strict real-time bounds (20 ms decision cycles). A two-phase allocation mechanism further enhances performance, where the first phase performs priority-based allocation for initially assigned services, while the second phase implements backfilling to serve previously rejected requests using residual capacity, thereby improving overall system throughput and resource utilization.
The remainder of this paper is organized as follows. Section 2 reviews related work on network slicing and resource allocation for vehicular communications. Section 3 formulates the mathematical optimization model, defining the problem, constraints and objective function. Section 4 presents the constructive heuristic algorithm with a detailed pseudocode. Section 5 presents comprehensive experimental results evaluating algorithm performance under various scenarios and parameter settings. Finally, Section 6 concludes the paper with a summary of contributions and directions for future research.

2. Literature Review

Resource allocation in 5G network slicing for vehicular communications has attracted considerable attention, as modern vehicular networks must efficiently distribute limited resources among heterogeneous users with diverse QoS requirements. The emergence of V2X communication introduces unprecedented service heterogeneity, ranging from safety-critical URLLC for collision avoidance and emergency braking to bandwidth-intensive eMBB for in-vehicle infotainment and High-Definition (HD) map updates, along with mMTC for dense sensor data aggregation and traffic monitoring [4,5]. Network slicing has emerged as a key enabling technology that creates logically isolated virtual networks over shared physical infrastructure, with each slice tailored to specific service characteristics [6]. Research efforts addressing resource allocation in sliced vehicular networks fall broadly into three categories: optimization-based methods that provide formal performance guarantees, learning-based frameworks that adapt to dynamic environments, and hybrid strategies that combine both paradigms.
Optimization-based approaches formulate resource allocation as mathematical programming problems to achieve optimal or near-optimal solutions under specified constraints. Su et al. [7] surveyed resource allocation in 5G network slicing, classifying optimization models into general, economic/game-theoretic, and prediction-based categories to address objectives such as throughput, latency, and fairness. Building on these principles, Chen et al. [3] proposed a service-oriented dynamic resource slicing framework for vehicular networks, integrating joint resource block allocation and power control through Lyapunov optimization. Their JRPSV algorithm adaptively adjusts slice resources between eMBB and URLLC services to maximize long-term system capacity while ensuring queue stability. Lee et al. [9] proposed a dynamic network slicing framework for multitenant heterogeneous cloud radio access networks (H-CRANs) that uses convex optimization to maximize resource utilization while ensuring tenant-specific QoS. The two-level scheme optimizes admission control, user association, and resource allocation, achieving higher throughput, fairness, and QoS than baseline methods. Game-theoretic formulations have also been explored: Cui et al. [10] applied a Stackelberg game model where roadside units act as leaders allocating resources to URLLC and eMBB slices as followers, minimizing Age-of-Information and delay for URLLC traffic while ensuring eMBB throughput requirements, achieving 30% improvement in URLLC freshness and delay performance compared to rigid slicing allocations.
The complexity and rapid variability of vehicular networks have motivated artificial intelligence-driven resource management approaches for adaptive network slicing. RL enables systems to learn slicing policies from experience without explicit global optimization models, discovering resource sharing strategies that outperform fixed or greedy allocations as network conditions evolve. Albonda and Pérez-Romero [2] proposed an RL-based radio access network (RAN) slicing strategy for heterogeneous networks supporting eMBB and V2X services, combining offline Q-learning to discover effective slicing policies with lightweight runtime heuristics for allocation decisions, thereby achieving more efficient spectrum utilization between broadband and vehicular slices compared to static proportional splitting. Subsequent research has extensively applied Deep Reinforcement Learning (DRL) for end-to-end network slicing orchestration. Dong et al. [11] introduced a hierarchical DRL framework to jointly optimize inter-slice and intra-slice resource allocation, where a high-level agent periodically adjusts slice-wise resource partitions (allocating bandwidth or time slots to URLLC, eMBB, and mMTC slices) while lower-level agents handle user scheduling within each slice. By modeling the problem as a two-level Markov Decision Process (MDP), this approach learns to coordinate slicing decisions across different timescales, reducing queueing delays for latency-sensitive traffic while avoiding resource waste. Multi-Agent Reinforcement Learning (MARL) has been explored to reflect the distributed nature of vehicular networks: Cui et al. [12] presented a MARL-based slicing framework where each base station acts as an independent agent using multi-agent deep deterministic policy gradient algorithms to allocate local spectrum and computing resources. Li et al. [13] developed a Deep Q-Network algorithm for multi-slice scenarios that jointly considers radio access and core network capacities to maximize user access rates. Machine learning has also enabled predictive slice provisioning: Abood et al. [14] proposed a Long Short-Term Memory (LSTM)-based time-series prediction framework that forecasts each slice’s future resource demand from historical traffic patterns, enabling proactive resource reservation that improves utilization and maintains lower latency and higher reliability for vehicular services as mobility causes rapid load fluctuations.
Hybrid approaches combining optimization techniques with machine learning methods have emerged to address multifaceted challenges in vehicular network slicing. Khan et al. [15] proposed a clustering-based slicing solution for highway scenarios that groups vehicles dynamically and assigns cluster leaders for Vehicle-to-Vehicle (V2V) relay communication in autonomous driving slices, while RSUs handle infotainment traffic via Vehicle-to-Infrastructure (V2I) links, achieving low latency and high reliability for safety-critical messages through slice-aware resource partitioning. Recent work has explored hierarchical frameworks that decompose resource allocation across multiple decision layers. Qiao et al. [16] developed a two-layer hierarchical learning approach where global inter-slice orchestration determines resource partitioning among slices while local intra-slice scheduling optimizes user-level allocation within each slice, employing proximal policy optimization to adapt to dynamic traffic patterns while satisfying heterogeneous QoS constraints. Cui et al. [17] investigated hierarchical resource orchestration across distributed and centralized network units, coordinating spectrum and computing resource allocation to support multiple service types with differentiated QoS guarantees. Hazarika et al. [18] extended hierarchical slicing to three tiers—first partitioning by 3GPP service class (URLLC/eMBB/mMTC), then by vehicle type, and finally by specific applications—integrating federated deep reinforcement learning to enable distributed learning across network nodes while preserving data privacy.
While these approaches have demonstrated significant progress, several opportunities exist to further enhance network slicing frameworks for vehicular communications. First, jointly optimizing slice selection and resource allocation decisions presents a promising direction beyond predetermined user-to-slice mappings. Rather than statically assigning all safety messages to a URLLC slice and all entertainment traffic to an eMBB slice, dynamic slice selection can better balance load distribution and improve system performance, particularly as vehicles generate mixed traffic with heterogeneous QoS requirements. Second, complementing learning-based methods with deterministic heuristics addresses distinct deployment scenarios and requirements. RL excels in long-term adaptation to evolving traffic patterns and network conditions, yet safety-critical vehicular applications such as cooperative platooning or collision avoidance that demand strict latency bounds (3GPP specifies 20 ms for certain safety applications) require algorithms with predictable real-time performance. Constructive heuristics can serve alongside learning-based approaches by providing deterministic response times without extensive training data or retraining when network conditions change abruptly, offering complementary reliability and stability for real-time vehicular slice control where execution time guarantees are paramount.
To explore these complementary opportunities, this study proposes a constructive heuristic algorithm that jointly optimizes slice selection and resource allocation across heterogeneous 5G base station and roadside unit infrastructure while guaranteeing deterministic execution within strict real-time constraints. The proposed algorithm employs a hierarchical allocation strategy, ensuring solution delivery within the 20 ms decision cycles required for V2X safety applications, while enabling dynamic slice selection to improve load balancing and system performance. This approach is designed to operate in conjunction with learning-based frameworks, providing fast, predictable decision-making for safety-critical scenarios, while learning-based methods can optimize long-term resource utilization and adaptation. The optimization model is presented in the following section.

3. Model Formulation

3.1. Problem Settings and Assumptions

This model addresses resource allocation on the network side of each slice in a V2X communication system. We consider a scenario where each user may request multiple services, with each service having specific QoS requirements. The resource allocation is performed periodically, and within each allocation cycle, the number of available 5G and RSU resource blocks for each slice is assumed to be known.
The key assumptions underlying this model are as follows:
  • Each user can simultaneously request multiple services with heterogeneous QoS demands.
  • Resource allocation decisions are made at regular intervals (allocation cycles).
  • The capacity of 5G and RSU resource blocks for each network slice is determined at the beginning of each cycle and remains constant throughout that cycle.
  • Services are assigned to network slices based on QoS compatibility, where a service can only be admitted to a slice if the slice’s QoS characteristics meet or exceed the service’s requirements.
  • Resource allocation follows a hierarchical strategy: 5G resource blocks are allocated first, and RSU resource blocks are utilized only when 5G resources are exhausted.
While the above assumptions simplify the problem for mathematical tractability, they are aligned with practical requirements in V2X systems. In particular, our formulation assumes fixed resource blocks and approximately static QoS requirements and service demands within one scheduling cycle. This approximation is justified because the scheduling interval is 20 ms, which is significantly shorter than the typical timescale of mobility-induced channel evolution and demand fluctuations in V2X scenarios. Therefore, within a 20 ms cycle, the demand and QoS requirements can be reasonably treated as quasi-static approximations for resource allocation decisions.

3.2. Mathematical Model

The notation used throughout this paper is summarized in Table 1.
max k K i I j J i w i j k v i j k 5 G x i j k 5 G + v i j k R S U x i j k R S U
s . t . x i j k = x i j k 5 G + x i j k R S U , i I , j J i , k K ,
i I j J i x i j k 5 G r k 5 G , k K ,
i I j J i x i j k R S U r k R S U , k K ,
i I j J i x i j k R S U M y k , k K ,
i I j J i x i j k 5 G r k 5 G M 1 y k , k K ,
x i j k r i j k r e q z i j k , i I , j J i , k K ,
x i j k r i j k r e q z i j k , i I , j J i , k K ,
z i j k a i j k , i I , j J i , k K ,
k K z i j k 1 , i I , j J i ,
x i j k , x i j k 5 G , x i j k R S U Z + , i I , j J i , k K ,
y k { 0 , 1 } , k K ,
z i j k { 0 , 1 } , i I , j J i , k K .
To demonstrate the model formulation, we present an illustrative example. Consider a scenario with two users ( I = { 1 , 2 } ), where user 1 requests an autonomous driving service ( J 1 = { 1 } ) with QoS requirements R e l i a b i l i t y 11 = 99.999 % and L a t e n c y 11 = 20 ms, requiring r 11 r e q = 10 RBs, and user 2 requests a video streaming service ( J 2 = { 1 } ) with R e l i a b i l i t y 21 = 99 % and L a t e n c y 21 = 100 ms, requiring r 21 r e q = 20 RBs. The network provides three slices ( K = { U R L L C , e M B B , m M T C } ) with characteristics: URLLC ( R e l i a b i l i t y U R L L C = 99.999 % , L a t e n c y U R L L C = 10 ms, r U R L L C 5 G = 100 RBs, r U R L L C R S U = 50 RBs) and eMBB ( R e l i a b i l i t y e M B B = 99 % , L a t e n c y e M B B = 50 ms, r e M B B 5 G = 150 RBs, r e M B B R S U = 80 RBs).
The model first evaluates QoS compatibility: For user 1’s service, a 11 , U R L L C = 1 since ( 99.999 % 99.999 % ) ( 20 ms 10 ms ) , while a 11 , e M B B = 0 because the eMBB slice cannot meet the 20 ms latency requirement. For user 2’s service, both a 21 , U R L L C = 1 and a 21 , e M B B = 1 satisfy QoS compatibility.
Given priority weights w 11 , U R L L C = 10 , w 21 , e M B B = 5 and transmission rates v 11 , U R L L C 5 G = 500 kbps/RB, v 21 , e M B B 5 G = 700 kbps/RB, the model then determines: (1) slice assignments by solving z 11 , U R L L C = 1 , z 21 , e M B B = 1 to maximize weighted throughput under constraint (10), ensuring each service accesses only one slice; (2) resource allocations x 11 , U R L L C 5 G = 10 RBs, x 21 , e M B B 5 G = 20 RBs under constraints (7) and (8), meeting exact service demands; and (3) resource prioritation with x 11 , U R L L C R S U = 0 and x 21 , e M B B R S U = 0 following the hierarchical allocation constraints (5) and (6), prioritizing 5G resources. The resulting weighted system throughput is 10 × 500 × 10 + 5 × 700 × 20 = 120,000 kbps.

3.3. Model Description

The objective function (1) maximizes the weighted system transmission rate (i.e., weighted throughput) across all users, services, and network slices. The priority weights w i j k enable flexible differentiation among service classes and users. To prevent the long-term starvation of low-priority services, our framework relies on the dynamic configurability of these priority weights. Since the resource allocation executes every 20 ms, the central controller (e.g., the One Traffic Platform) can monitor the waiting time or rejection count of services. For temporal fairness, if a low-priority service (e.g., Infotainment) is rejected for multiple consecutive cycles, the platform can dynamically increase its weight in the next cycle. This “human-in-the-loop” or “platform-level” adjustment allows operators to balance the system between strict safety prioritization and long-term fairness, ensuring that even low-priority tasks eventually receive a resource window.
The model incorporates the following constraints:
Resource composition constraint (2): For each service admitted to a slice, the total allocated resource blocks must equal the sum of 5G and RSU resource blocks assigned to that service.
5G capacity constraint (3): The total number of 5G resource blocks allocated across all services within each slice cannot exceed the slice’s available 5G capacity.
RSU capacity constraint (4): Similarly, the total RSU resource blocks allocated within each slice must not exceed the slice’s RSU capacity.
Hierarchical allocation constraints (5) and (6): These constraints enforce the priority allocation strategy where 5G resources are fully utilized before RSU resources are deployed. Constraint (5) ensures RSU resources can only be used (i.e., y k = 1 ) when activated, while constraint (6) ensures that if RSU resources are not used ( y k = 0 ), the 5G capacity must be fully allocated.
Service demand satisfaction constraints (7) and (8): When a service is assigned to a slice ( z i j k = 1 ), the allocated resources must exactly match the service’s required resource blocks r i j k r e q . If the service is not assigned to the slice ( z i j k = 0 ), no resources are allocated.
QoS matching constraint (9): A service can only be admitted to a slice if the slice’s QoS characteristics (reliability and latency) meet or exceed the service’s requirements, as indicated by a i j k = 1 .
Single slice assignment constraint (10): Each service of each user can be assigned to at most one network slice, preventing service duplication across slices.
Variable domain constraints (11)–(13): These constraints define the feasible domains for all decision variables, where resource allocations are non-negative integers and assignment indicators are binary.

4. Heuristic Algorithm for V2X Resource Allocation

Given the NP-hard nature of the resource allocation problem and the stringent real-time constraints in vehicular networks (20 ms decision cycles), we develop a novel constructive heuristic algorithm tailored to this problem. The algorithm operates in two main phases: (1) a first-phase allocation that determines service-to-slice assignments and performs resource distribution based on resource availability, and (2) a second-phase backfilling mechanism that leverages residual capacity to serve previously unallocated service requests.

4.1. Algorithm Overview

The proposed constructive heuristic algorithm consists of four key components:
  • Service-to-Slice Assignment: Determines which network slice each service request should access based on QoS compatibility and potential utility contribution.
  • Resource Scenario Detection: Analyzes resource availability within each slice to classify the allocation scenario and select the appropriate distribution strategy.
  • First-Phase Resource Allocation: Distributes 5G and RSU resource blocks to admitted services following prioritized strategies tailored to resource availability scenarios.
  • Second-Phase Backfilling: Attempts to serve initially rejected requests using residual capacity across all slices.
The algorithm ensures compliance with the constraint that 5G resource blocks must be allocated before RSU resources, exploiting the fact that in most cases, a single resource type suffices to satisfy user demands. This hierarchical allocation strategy maximizes utilization of the preferred 5G infrastructure while maintaining RSU resources as a supplementary capacity buffer.
Algorithm 1 presents the overall structure of the heuristic algorithm. For each scheduling cycle, the algorithm loads valid service requests (those satisfying QoS matching constraints), performs service-to-slice assignment, executes first-phase resource allocation for each slice, and conducts second-phase backfilling for unserved requests.
Algorithm 1 Overall Heuristic Algorithm
  1:
procedure OverallHeuristicAlgorithm( D , S )
  2:
  Input:  D : Service dataset with detailed information about V2X service requests
  3:
  Input:  S : Network slices dataset with capacity information
  4:
  Output: Allocation results for each scheduling cycle with objective values
  5:
   R e s u l t s
  6:
  for each scheduling cycle τ  do
  7:
     v a l i d S e r v i c e s LoadValidServices ( D , τ )           ▹ a i j k = 1
  8:
     s l i c e s LoadSlices ( S , τ )
  9:
     s e r v i c e A s s i g n m e n t s ServicetoSliceAssignment ( v a l i d S e r v i c e s )
10:
     a l l S e r v i c e K e y s extract all user-service combinations from s e r v i c e A s s i g n m e n t s
11:
     a l l o c a t e d S e r v i c e s
12:
     r e m a i n i n g C a p a c i t i e s initialize from slice data
13:
    for all  s s l i c e s  do
14:
       a s s i g n e d T o S l i c e { s e r v i c e s e r v i c e A s s i g n m e n t s | s e r v i c e . s l i c e = s . i d }
15:
      if  a s s i g n e d T o S l i c e  then
16:
         s c e n a r i o DetectResourceScenario ( a s s i g n e d T o S l i c e , s )
17:
         a l l o c a t i o n s SliceResourceAllocation(assignedToSlice, s, scenario)
18:
         a l l o c a t e d S e r v i c e s a l l o c a t e d S e r v i c e s a l l o c a t i o n s
19:
        Update r e m a i n i n g C a p a c i t i e s
20:
      end if
21:
    end for
22:
     s u c c e s s f u l l y A l l o c a t e d S e r v i c e s extract keys from a l l o c a t e d S e r v i c e s
23:
     u n s e r v e d S e r v i c e K e y s a l l S e r v i c e K e y s s u c c e s s f u l l y A l l o c a t e d S e r v i c e s
24:
    if  u n s e r v e d S e r v i c e K e y s  then
25:
       n e w l y A l l o c a t e d S e r v i c e s
26:
       Second-PhaseBackfilling ( u n s e r v e d S e r v i c e K e y s , r e m a i n i n g C a p a c i t i e s )
27:
       a l l o c a t e d S e r v i c e s a l l o c a t e d S e r v i c e s n e w l y A l l o c a t e d S e r v i c e s
28:
    end if
29:
     t o t a l O b j e c t i v e s e r v i c e a l l o c a t e d S e r v i c e s s e r v i c e . o b j e c t i v e C o n t r i b u t i o n
30:
     R e s u l t s R e s u l t s { ( τ , t o t a l O b j e c t i v e , a l l o c a t e d S e r v i c e s ) }
31:
  end for
32:
  return  R e s u l t s
33:
end procedure

4.2. Service-to-Slice Assignment

The first critical step determines which service requests should be admitted to which network slices. The algorithm processes only combinations where a i j k = 1 , ensuring satisfaction of the QoS matching constraint—services can only access slices whose QoS characteristics meet or exceed their requirements.
Since the hierarchical allocation strategy prioritizes 5G resources before RSU resources, and in most scenarios only one resource type suffices to satisfy service demands, we evaluate each service-slice combination using two complementary perspectives. For each valid ( i , j , k ) combination, we first compute the absolute throughput contribution under each resource type:
S c o r e 5 G ( i , j , k ) = w i j k × v i j k 5 G × r i j k r e q .
S c o r e R S U ( i , j , k ) = w i j k × v i j k R S U × r i j k r e q .
These scores represent the weighted throughput contribution if the service is fully satisfied using only 5G or only RSU resources, respectively. We then derive the per-resource-block efficiency by dividing by the required resource blocks:
E f f i c i e n c y 5 G ( i , j , k ) = S c o r e 5 G ( i , j , k ) r i j k r e q = w i j k × v i j k 5 G .
E f f i c i e n c y R S U ( i , j , k ) = S c o r e R S U ( i , j , k ) r i j k r e q = w i j k × v i j k R S U .
These efficiency metrics quantify the weighted throughput gain per resource block consumed, enabling comparison of services with different resource demands.
To establish allocation priorities, we construct two aggregate metrics for each service-slice combination:
t o t a l _ u t i l i t y = max ( S c o r e 5 G ( i , j , k ) , S c o r e R S U ( i , j , k ) ) .
r e s o u r c e _ e f f i c i e n c y = max ( E f f i c i e n c y 5 G ( i , j , k ) , E f f i c i e n c y R S U ( i , j , k ) ) .
The t o t a l _ u t i l i t y metric selects the maximum absolute throughput contribution achievable using either resource type, representing the service’s potential value to system performance. The r e s o u r c e _ e f f i c i e n c y metric selects the maximum per-resource-block efficiency, favoring services that deliver high throughput gains relative to their resource consumption.
The algorithm performs a two-level sorting of all valid service-slice combinations: primary sorting by t o t a l _ u t i l i t y in descending order (prioritizing high-value services), with ties broken by r e s o u r c e _ e f f i c i e n c y in descending order (favoring resource-efficient services). This hierarchical sorting balances maximizing absolute system throughput while promoting efficient resource utilization.
To satisfy constraint (10) ( k K z i j k 1 ), the algorithm retains only the highest-scored combination for each unique ( u s e r i , s e r v i c e j ) pair, eliminating duplicate slice assignments for the same service. This greedy selection yields the initial service-to-slice assignment for the first allocation phase.
Algorithm 2 formalizes this procedure, evaluating all QoS-compatible slices for each service, computing utility metrics, performing two-level sorting, and selecting unique assignments.
Algorithm 2 Service to Slice Assignment
  1:
procedure ServicetoSliceAssignment( v a l i d S e r v i c e s )
  2:
   c o m b i n a t i o n s
  3:
  for each unique service ( u , i ) in v a l i d S e r v i c e s  do
  4:
     o p t i o n s GetValidSlicesForService( v a l i d S e r v i c e s , u, i)
  5:
    for each option o o p t i o n s  do
  6:
       r r e q o . r r e q         ▹ Unified resource requirement
  7:
       m a x 5 G U t i l i t y o . w e i g h t × o . v 5 G × r r e q
  8:
       m a x R S U U t i l i t y o . w e i g h t × o . v R S U × r r e q
  9:
       t o t a l U t i l i t y max ( m a x 5 G U t i l i t y , m a x R S U U t i l i t y )
10:
       r e s o u r c e E f f i c i e n c y t o t a l U t i l i t y / r r e q
11:
       c o m b i n a t i o n s c o m b i n a t i o n s
12:
         { ( u , i , o . s l i c e _ i d , t o t a l U t i l i t y , r e s o u r c e E f f i c i e n c y , o ) }
13:
    end for
14:
  end for
15:
  Sort c o m b i n a t i o n s by ( t o t a l U t i l i t y , r e s o u r c e E f f i c i e n c y ) in descending order
16:
   a s s i g n m e n t s
17:
   a s s i g n e d S e r v i c e s
18:
  for each c c o m b i n a t i o n s  do
19:
    if ( c . u s e r _ i d , c . s e r v i c e _ i d ) a s s i g n e d S e r v i c e s then
20:
       a s s i g n m e n t s a s s i g n m e n t s { c }
21:
       a s s i g n e d S e r v i c e s a s s i g n e d S e r v i c e s { ( c . u s e r _ i d , c . s e r v i c e _ i d ) }
22:
    end if
23:
  end for
24:
  return a s s i g n m e n t s
25:
end procedure

4.3. Resource Scenario Detection and Allocation Strategies

Following service-to-slice assignment, the algorithm examines resource availability within each slice to determine the appropriate allocation strategy. For each slice k, we compute the ratio of available 5G capacity to total demand from assigned services:
ρ k 5 G = r k 5 G ( i , j ) S k r i j k r e q ,
where S k denotes the set of services assigned to slice k. Based on this ratio, two distinct resource scenarios are identified:
  • Abundant 5G Scenario ( ρ k 5 G 1 ): Sufficient 5G resources exist to satisfy all service demands without activating RSU resources.
  • Limited 5G/RSU Scenario ( ρ k 5 G < 1 ): 5G resources are insufficient, necessitating strategic allocation of both 5G and RSU resource blocks.
Algorithm 3 presents the resource scenario detection procedure, which computes the capacity-to-demand ratio and determines the appropriate allocation strategy.
Algorithm 3 Detect Resource Scenario
  1:
procedure DetectResourceScenario( a s s i g n e d S e r v i c e s , s l i c e I n f o )
  2:
   r 5 G c a p a c i t y s l i c e I n f o . r 5 G
  3:
   r R S U c a p a c i t y s l i c e I n f o . r R S U
  4:
   t o t a l D e m a n d 5 G s a s s i g n e d S e r v i c e s s . r r e q
  5:
   ρ 5 G r 5 G c a p a c i t y / max ( t o t a l D e m a n d 5 G , 1 )
  6:
  if ρ 5 G 1 then
  7:
    return A B U N D A N T _ 5 G
  8:
  else
  9:
    return L I M I T E D _ 5 G
10:
  end if
11:
end procedure
Based on the detected scenario, Algorithm 4 dispatches to the appropriate allocation strategy.
Algorithm 4 Slice Resource Allocation
  1:
procedure SliceResourceAllocation( a s s i g n e d S e r v i c e s , s l i c e I n f o , s c e n a r i o )
  2:
   s l i c e I d s l i c e I n f o . i d
  3:
   r 5 G c a p a c i t y s l i c e I n f o . r 5 G
  4:
   r R S U c a p a c i t y s l i c e I n f o . r R S U
  5:
  if s c e n a r i o = A B U N D A N T _ 5 G then
  6:
    return Abundant5G( a s s i g n e d S e r v i c e s , r 5 G c a p a c i t y , r R S U c a p a c i t y , s l i c e I d )
  7:
  else
  8:
    return 5G/RSUStrategy( a s s i g n e d S e r v i c e s , r 5 G c a p a c i t y , r R S U c a p a c i t y , s l i c e I d )
  9:
  end if
10:
end procedure

4.3.1. Abundant 5G Allocation Strategy

When 5G resources are abundant, the algorithm employs a simple on-demand allocation strategy. Since the model constraints prioritize 5G resource allocation and no RSU activation is required, each service receives exactly its required number of 5G resource blocks: x i j k 5 G = r i j k r e q and x i j k R S U = 0 . This straightforward approach maximizes resource utilization while ensuring service reliability.
Algorithm 5 details the abundant 5G allocation procedure. Services are sorted by their total utility contribution, and resources are allocated on demand until capacity is exhausted.
Algorithm 5 Abundant 5G Resource Allocation
  1:
procedure Abundant5GResourceAllocation( s e r v i c e s , r 5 G c a p a c i t y , r R S U c a p a c i t y , s l i c e I d )
  2:
   x 5 G { i : 0 i { 0 , 1 , , | s e r v i c e s | 1 } }    ▹ 5G allocation per service
  3:
   z { i : 0 i { 0 , 1 , , | s e r v i c e s | 1 } }        ▹ Service activation
  4:
   t o t a l 5 G A l l o c a t e d 0
  5:
  Sort s e r v i c e s by w e i g h t × v 5 G × r r e q in descending order
  6:
  for each service i in sorted s e r v i c e s  do
  7:
     r r e q s e r v i c e s [ i ] . r r e q
  8:
    if r r e q > 0 and t o t a l 5 G A l l o c a t e d + r r e q r 5 G c a p a c i t y  then
  9:
       x 5 G [ i ] r r e q
10:
       z [ i ] 1
11:
       t o t a l 5 G A l l o c a t e d t o t a l 5 G A l l o c a t e d + r r e q
12:
    end if
13:
  end for
14:
   y 0                         ▹ No RSU
15:
   x R S U { i : 0 i { 0 , 1 , . . . , | s e r v i c e s | 1 } }
16:
   a l l o c a t e d
17:
  for each service i in s e r v i c e s  do
18:
    if z [ i ] = 1 then
19:
       c o n t r i b u t i o n s e r v i c e s [ i ] . w e i g h t ×
20:
        ( s e r v i c e s [ i ] . v 5 G × x 5 G [ i ] + s e r v i c e s [ i ] . v R S U × x R S U [ i ] )
21:
       a l l o c a t i o n allocationresults
22:
       a l l o c a t e d a l l o c a t e d { a l l o c a t i o n }
23:
    end if
24:
  end for
25:
  return a l l o c a t e d
26:
end procedure

4.3.2. Limited 5G/RSU Allocation Strategy

For scenarios where 5G capacity is insufficient, a more sophisticated three-step allocation strategy is employed:
Step 1: 5G Resource Prioritization. The algorithm first computes a 5G utility contribution score for each service to establish allocation priority:
S c o r e 5 G c o n t r i b ( i , j , k ) = w i j k × v i j k 5 G .
Services within the same slice are sorted in descending order by S c o r e 5 G c o n t r i b , with ties broken by ascending resource demand r i j k r e q . This ordering prioritizes services with high weighted transmission rates per resource block. The algorithm then allocates 5G resources following this priority sequence, assigning requested amounts on demand until 5G capacity is exhausted. The last service in the priority queue receives any remaining fractional 5G capacity, ensuring complete utilization of 5G resources.
Step 2: Priority Restructuring for RSU Allocation. After 5G allocation, services fall into two categories: those partially satisfied (received some 5G resources but not the full required amount) and those completely unserved (received no 5G resources). The algorithm restructures priorities for RSU allocation:
  • High Priority: Services with partial 5G allocations that still require additional resources to meet their demands. For these services, we calculate the residual demand: r i j k r e s i d u a l = r i j k r e q x i j k 5 G .
  • Low Priority: Services with no 5G allocation, ranked by their RSU utility score:
    S c o r e R S U c o n t r i b ( i , j , k ) = w i j k × v i j k R S U .
Step 3: RSU Resource Distribution. The algorithm first allocates RSU resources to high-priority services (those with partial 5G satisfaction) in order, filling their residual demands. Once all high-priority demands are satisfied or RSU capacity is exhausted, remaining RSU resources are distributed to low-priority services following descending S c o r e R S U c o n t r i b order, with ties broken by ascending demand. This two-tier priority mechanism ensures that services already receiving partial allocations are completed before initiating new service admissions, improving QoS satisfaction rates.
Algorithm 6 implements the complete limited 5G/RSU allocation strategy, incorporating all three steps described above.
Algorithm 6 5G/RSU Strategy for Limited Resources
  1:
procedure 5G/RSUHStrategy( s e r v i c e s , r 5 G c a p a c i t y , r R S U c a p a c i t y , s l i c e I d )
  2:
   x 5 G { i : 0 i { 0 , 1 , , | s e r v i c e s | 1 } }       ▹ 5G allocation per service
  3:
   x R S U { i : 0 i { 0 , 1 , , | s e r v i c e s | 1 } }      ▹ RSU allocation per service
  4:
   z { i : 0 i { 0 , 1 , , | s e r v i c e s | 1 } }           ▹ Service activation
  5:
   a v a i l 5 G r 5 G c a p a c i t y
  6:
   a v a i l R S U r R S U c a p a c i t y
  7:
   c a n d i d a t e s 5 G
  8:
  for each service i in s e r v i c e s  do
  9:
    if s e r v i c e s [ i ] . r r e q > 0 then
10:
       s c o r e s e r v i c e s [ i ] . w e i g h t × s e r v i c e s [ i ] . v 5 G
11:
       c a n d i d a t e s 5 G c a n d i d a t e s 5 G { ( i , s c o r e , s e r v i c e s [ i ] . r r e q ) }
12:
    end if
13:
  end for
14:
  Sort c a n d i d a t e s 5 G by s c o r e descending, then by r e q u e s t ascending
15:
  for each candidate ( i , s c o r e , r e q u e s t ) in c a n d i d a t e s 5 G  do
16:
    if a v a i l 5 G r e q u e s t then
17:
       a l l o c a t e d A m o u n t min ( a v a i l 5 G , r e q u e s t )
18:
       x 5 G [ i ] a l l o c a t e d A m o u n t
19:
       z [ i ] 1
20:
       a v a i l 5 G a v a i l 5 G a l l o c a t e d A m o u n t
21:
    end if
22:
  end for
23:
   c a n d i d a t e s R S U
24:
  for each service i in s e r v i c e s  do
25:
    if s e r v i c e s [ i ] . r r e q > 0 and x 5 G [ i ] > 0 and x 5 G [ i ] < s e r v i c e s [ i ] . r r e q  then
26:
       s c o r e s e r v i c e s [ i ] . w e i g h t × s e r v i c e s [ i ] . v R S U
27:
       r e m a i n i n g D e m a n d s e r v i c e s [ i ] . r r e q x 5 G [ i ]
28:
       c a n d i d a t e s R S U c a n d i d a t e s R S U { ( i , s c o r e , r e m a i n i n g D e m a n d , 1 ) }
29:
    end if
30:
  end for
31:
  for each service i in s e r v i c e s  do
32:
    if  s e r v i c e s [ i ] . r r e q > 0 and x 5 G [ i ] = 0  then
33:
       s c o r e s e r v i c e s [ i ] . w e i g h t × s e r v i c e s [ i ] . v R S U
34:
       c a n d i d a t e s R S U c a n d i d a t e s R S U { ( i , s c o r e , s e r v i c e s [ i ] . r r e q , 2 ) }
35:
    end if
36:
  end for
37:
  Sort c a n d i d a t e s R S U by priority, then by s c o r e descending, then by r e q u e s t ascending
38:
  for each candidate ( i , s c o r e , r e q u e s t , p r i o r i t y ) in c a n d i d a t e s R S U  do
39:
    if a v a i l R S U r e q u e s t then
40:
       x R S U [ i ] r e q u e s t
41:
       z [ i ] 1
42:
       a v a i l R S U a v a i l R S U r e q u e s t
43:
    end if
44:
  end for
45:
   y 1 if i x R S U [ i ] > 0 else 0
46:
   a l l o c a t e d
47:
  for each service i in s e r v i c e s  do
48:
     t o t a l A l l o c a t e d x 5 G [ i ] + x R S U [ i ]
49:
    if  z [ i ] = 1 and t o t a l A l l o c a t e d < s e r v i c e s [ i ] . r r e q  then
50:
       z [ i ] 0             ▹ Deactivate if not fully satisfied
51:
    end if
52:
    if z [ i ] = 1 then
53:
       c o n t r i b u t i o n s e r v i c e s [ i ] . w e i g h t ×
54:
        ( s e r v i c e s [ i ] . v 5 G × x 5 G [ i ] + s e r v i c e s [ i ] . v R S U × x R S U [ i ] )
55:
       a l l o c a t i o n allocationresults
56:
       a l l o c a t e d a l l o c a t e d { a l l o c a t i o n }
57:
    end if
58:
  end for
59:
  return a l l o c a t e d
60:
end procedure

4.4. Second-Phase Backfilling Allocation

The greedy nature of the initial service-to-slice assignment may cause some services to be rejected even though alternative slices with residual capacity could accommodate them. To exploit remaining resources and improve system throughput, the algorithm implements a second-phase backfilling mechanism.
This phase considers all unserved services from the first phase and constructs candidate combinations with all feasible slices (those satisfying QoS compatibility constraints). Each candidate combination is evaluated using the previously defined sorting score max ( S c o r e 5 G , S c o r e R S U ) , and combinations are processed in descending score order. For each candidate:
  • Check if the target slice’s total available capacity (sum of the remaining 5G and RSU resources) can satisfy the service’s demand.
  • If sufficient capacity exists, allocate resources following the hierarchical strategy: first allocate 5G resources up to availability or demand, then supplement with RSU resources if needed.
  • Update the slice’s remaining capacity immediately after allocation.
  • If insufficient capacity exists, proceed to the next highest-scored candidate combination.
This backfilling process continues until all unserved services are either allocated or no feasible candidate combinations remain. By revisiting rejected services and considering alternative slice assignments, the second phase significantly improves resource utilization and system performance.
Algorithm 7 formalizes the second-phase backfilling procedure, which evaluates unserved services against all compatible slices and allocates resources hierarchically when sufficient capacity exists.
Algorithm 7 Second-Phase Backfilling Allocation
  1:
procedure Second-PhaseBackfilling( u n s e r v e d S e r v i c e K e y s , r e m a i n i n g C a p a c i t i e s )
  2:
   n e w l y A l l o c a t e d S e r v i c e s
  3:
   r e a l l o c a t i o n C a n d i d a t e s
  4:
   u n s e r v e d D a t a filter valid data where ( u s e r _ i d , s e r v i c e _ i d ) u n s e r v e d S e r v i c e K e y s
  5:
  for each option o in u n s e r v e d D a t a  do
  6:
     r r e q o . r r e q
  7:
     m a x 5 G U t i l i t y o . w e i g h t × o . v 5 G × r r e q
  8:
     m a x R S U U t i l i t y o . w e i g h t × o . v R S U × r r e q
  9:
     t o t a l U t i l i t y max ( m a x 5 G U t i l i t y , m a x R S U U t i l i t y )
10:
     r e s o u r c e E f f i c i e n c y t o t a l U t i l i t y / r r e q
11:
     c a n d i d a t e I n f o create candidate with service and utility information
12:
     r e a l l o c a t i o n C a n d i d a t e s r e a l l o c a t i o n C a n d i d a t e s { c a n d i d a t e I n f o }
13:
  end for
14:
  if r e a l l o c a t i o n C a n d i d a t e s = then
15:
    return n e w l y A l l o c a t e d S e r v i c e s
16:
  end if
17:
  Sort r e a l l o c a t i o n C a n d i d a t e s by r e s o u r c e E f f i c i e n c y in descending order
18:
   r e a l l o c a t e d S e r v i c e K e y s
19:
  for each candidate c in r e a l l o c a t i o n C a n d i d a t e s  do
20:
     s e r v i c e K e y ( c . u s e r _ i d , c . s e r v i c e _ i d )
21:
    if s e r v i c e K e y r e a l l o c a t e d S e r v i c e K e y s then
22:
      continue
23:
    end if
24:
     s l i c e I d c . s l i c e _ i d
25:
     r r e q c . r r e q
26:
     s l i c e C a p r e m a i n i n g C a p a c i t i e s [ s l i c e I d ]
27:
     x 5 G 0 , x R S U 0
28:
    if s l i c e C a p . r 5 G + s l i c e C a p . r R S U r r e q then
29:
      if s l i c e C a p . r 5 G r r e q then
30:
         x 5 G r r e q
31:
      else if s l i c e C a p . r 5 G > 0 then
32:
         x 5 G s l i c e C a p . r 5 G
33:
         x R S U r r e q s l i c e C a p . r 5 G
34:
      else
35:
         x R S U r r e q
36:
      end if
37:
    else
38:
      continue            ▹ Cannot satisfy full request
39:
    end if
40:
     c o n t r i b u t i o n c . w e i g h t × ( c . v 5 G × x 5 G + c . v R S U × x R S U )
41:
     a l l o c a t i o n I n f o create allocation record with assignment details
42:
     n e w l y A l l o c a t e d S e r v i c e s n e w l y A l l o c a t e d S e r v i c e s { a l l o c a t i o n I n f o }
43:
     r e a l l o c a t e d S e r v i c e K e y s r e a l l o c a t e d S e r v i c e K e y s { s e r v i c e K e y }
44:
     r e m a i n i n g C a p a c i t i e s [ s l i c e I d ] . r 5 G r e m a i n i n g C a p a c i t i e s [ s l i c e I d ] . r 5 G x 5 G
45:
     r e m a i n i n g C a p a c i t i e s [ s l i c e I d ] . r R S U r e m a i n i n g C a p a c i t i e s [ s l i c e I d ] . r R S U x R S U
46:
  end for
47:
  return n e w l y A l l o c a t e d S e r v i c e s
48:
end procedure

4.5. Complexity Analysis

To evaluate the scalability of the proposed constructive heuristic, we analyze its computational and memory complexity. Let | I | denote the number of users, | J | the maximum number of services per user, and | K | the number of network slices.

4.5.1. Computational Complexity

The computational complexity of each algorithm component is analyzed as follows:
  • Service-to-Slice Assignment (Algorithm 2): The algorithm evaluates all valid ( i , j , k ) combinations satisfying the QoS matching constraint in O ( | I | · | J | · | K | ) time. Subsequently, sorting these combinations by utility and efficiency metrics requires O ( | I | · | J | · | K | log ( | I | · | J | · | K | ) ) operations.
  • First-Phase Allocation (Algorithms 5 and 6): For each slice k, the algorithm sorts the assigned services by their utility scores, requiring O ( n k log n k ) time, where n k denotes the number of services assigned to slice k. Summing over all slices yields a total complexity of O ( | I | · | J | log ( | I | · | J | ) ) .
  • Second-Phase Backfilling (Algorithm 7): In the worst case, the algorithm evaluates all unserved services against all compatible slices, constructing and sorting O ( | I | · | J | · | K | ) candidate combinations, resulting in a complexity of O ( | I | · | J | · | K | log ( | I | · | J | · | K | ) ) .
The overall computational complexity is dominated by the sorting operations, yielding O ( | I | · | J | · | K | log ( | I | · | J | · | K | ) ) . This polynomial complexity ensures efficient scalability as the number of users and slices increases, making the algorithm suitable for real-time vehicular network resource allocation.

4.5.2. Memory Complexity

The algorithm maintains data structures for service requests, slice capacities, candidate combinations, and allocation results. The primary memory consumption arises from storing the candidate service-slice combinations and the final allocation decisions, which scales as O ( | I | · | J | · | K | ) . For typical V2X deployment scenarios (for instance, 700 concurrent users, each requesting up to 3 services across 5 network slices), the memory footprint is approximately 1–2 MB, ensuring practical feasibility for deployment on resource-constrained vehicular platforms.

5. Numerical Experiments

This section evaluates the proposed constructive heuristic algorithm through comprehensive experiments designed to assess three critical performance dimensions: solution quality, computational efficiency, and scalability. The experimental framework encompasses two resource availability scenarios (abundant 5G and limited 5G requiring coordinated 5G-RSU allocation), four comparative baseline methods (Gurobi solver, Round-Robin, Random allocation, and Simulated Annealing), and realistic V2X workloads with nine heterogeneous service types distributed across five network slices serving varying user populations. The evaluation begins with a comparative analysis between Gurobi optimal solutions and Random baseline to quantify the fundamental value of intelligent resource allocation, followed by comprehensive baseline performance comparisons and scalability analysis across varying user densities. These experiments aim to validate the algorithm’s capability to deliver near-optimal resource allocation decisions within strict real-time constraints mandated by safety-critical vehicular applications, while demonstrating robust performance across diverse operational conditions.

5.1. Data Generation Methodology

To ensure realistic experimental evaluation, we employ a systematic data generation framework that synthesizes network slice characteristics, user service demands, and resource transmission rates based on 3GPP technical specifications [8] and V2X application requirements.

5.1.1. Network Slice Configuration

The experimental framework instantiates five heterogeneous network slices spanning the complete spectrum of V2X QoS requirements, as detailed in Table 2. URLLC_1 represents the most stringent slice with ultra-high reliability of 0.99999 and extremely low latency of 1ms. URLLC_2 provides slightly relaxed but still critical performance with 0.9999 reliability and 10 ms latency. eMBB_1 delivers high-throughput connectivity with 0.999 reliability and 20 ms latency. eMBB_2 offers moderate performance with 0.99 reliability and 50 ms latency. Finally, mMTC supports massive connectivity with 0.95 reliability and 100 ms latency.
Each slice exhibits heterogeneous transmission rate characteristics for 5G base station and RSU resource blocks. As shown in Table 3, URLLC_1 and URLLC_2 provide transmission rates uniformly sampled from 300 to 600 kbps for 5G resources and 150 to 350 kbps for RSU resources per block. eMBB_1 and eMBB_2 support higher rates from 500 to 900 kbps for 5G blocks and 250 to 500 kbps for RSU blocks. The mMTC slice operates at reduced rates from 200 to 400 kbps for 5G resources and 100 to 250 kbps for RSU resources.

5.1.2. User Service Demand Generation

The experimental framework simulates 500 concurrent vehicular users, each requesting one to three heterogeneous V2X services. Service count distribution follows a realistic traffic pattern: 60% of users request a single service, 30% request two services, and 10% request three services, modeling varying application complexity across vehicle types such as basic sedans versus autonomous vehicles with multiple active safety systems.
We define nine distinct V2X service types with diverse QoS requirements, as detailed in Table 4. Each service type is characterized by specific reliability and latency constraints, priority weight ranges, and resource block demand ranges that govern slice compatibility and resource allocation decisions. EmergencyBrake represents the most stringent service with ultra-high reliability of 0.9999 and 5 ms latency, priority weights ranging from 8 to 10, and resource demands between 1 and 3 blocks, making it compatible only with the highest-performance URLLC slices. CollisionAvoidance and TrafficSignalControl provide critical safety functions with 0.999 reliability at 20 ms and 15 ms latency, respectively, using priority weights from 6 to 9 and 7 to 9, with moderate resource demands. PlatooningControl maintains similar reliability requirements at 25 ms latency with priority weights from 5 to 8 and demands from 3 to 8 blocks for coordinated vehicle movement. SensorSharing and HDMapUpdate operate at 0.99 reliability with 50 ms and 100 ms latencies, using priority weights from 4 to 7 and 2 to 5, and resource demands from 5 to 12 and 10 to 25 blocks, respectively, reflecting bandwidth-intensive data exchange requirements. WeatherAlert and RemoteDiagnostics provide informational services with relaxed reliability of 0.97 and 0.96 at 150 ms and 180 ms latencies, priority weights from 3 to 6 and 2 to 5, and moderate resource demands. Infotainment represents the least critical service with 0.95 reliability at 200 ms latency, the lowest priority weights from 1 to 3, and demands from 8 to 20 blocks for entertainment content delivery.
Each user randomly selects services with equal selection probability across all nine service types, ensuring unbiased workload distribution. For each selected service, the system randomly samples specific reliability and latency requirements within tolerance bounds (e.g., ±2% for reliability, ±10% for latency) to introduce realistic QoS variability while maintaining service type characteristics. Priority weights and resource block demands are uniformly sampled from their respective ranges. This perturbation mechanism models the heterogeneity of real-world vehicular environments where identical service types exhibit slight variations due to vehicle mobility, channel conditions, and application configurations. Critically, each user’s service requirements remain fixed across all network slices and do not change between scheduling cycles, ensuring consistent QoS contract enforcement regardless of the assigned slice. This design reflects practical network slicing principles where service level agreements (SLAs) are established per user rather than per slice.

5.1.3. Resource Capacity Configuration

The two experimental scenarios employ distinct resource capacity configurations to evaluate algorithm behavior under varying infrastructure conditions:
Abundant 5G Scenario: Base station capacity is set sufficiently high to accommodate all service demands using only 5G resources, eliminating the need for RSU activation. This models urban areas with dense macro-cell deployments where infrastructure investment prioritizes cellular coverage. RSU capacity remains available but unused, serving as backup infrastructure. Table 5 presents the detailed resource configuration across ten scheduling cycles, i.e., Transmission Time Intervals (TTIs) 0–9 for the abundant 5G scenario. Each cycle uses a different random seed (0, 10, 20, …, 90) to generate service demand patterns, with 500 concurrent users requesting 3660–3810 services per cycle. Total service demand ranges from 19,851 to 22,265 resource blocks, while available 5G capacity is fixed at 50,000 resource blocks per cycle across all five network slices (10,000 blocks per slice). RSU capacity is limited to 500 resource blocks (100 blocks per slice) to model backup infrastructure. The resulting capacity-to-demand ratios range from 2.27 to 2.54, ensuring that 5G resources alone can satisfy all service requests without RSU activation.
Limited 5G Scenario: Base station capacity is intentionally constrained to approximately 4.5–5.0% of total service demand, necessitating coordinated 5G-RSU resource management. This reflects severely capacity-constrained highway environments where roadside units augment sparse cellular coverage.
Table 6 presents the detailed resource configuration across ten scheduling cycles (TTIs 0–9) for the limited 5G scenario. Each cycle uses a different random seed (0, 10, 20, …, 90) to generate service demand patterns, with 500 concurrent users requesting 3660–3810 services per cycle. Total service demand ranges from 19,851 to 22,265 resource blocks, while available 5G capacity is severely limited to 500 resource blocks per cycle across all five network slices (100 blocks per slice). RSU capacity provides an additional 500 resource blocks (100 blocks per slice) as supplementary infrastructure. The resulting capacity-to-demand ratios range from 0.045 to 0.050 (4.5–5.0%), creating a highly resource-limited environment that requires strategic resource allocation to maximize system performance.

5.2. Comparative Performance Analysis: Gurobi vs. Random Baseline

To establish the fundamental value of our optimization model, we compare the Gurobi optimal solution with a random allocation baseline across both resource scenarios as shown in Figure 2 and Figure 3.
The Random baseline serves as a fundamental performance benchmark representing allocation decisions made without optimization. This baseline randomly shuffles the sequence of service requests and processes them in arbitrary order. For each service, the algorithm randomly selects a QoS-compatible network slice from those with sufficient remaining resource block capacity. Resource allocation within the selected slice follows the same hierarchical 5G-priority strategy: first exhausting available 5G resource blocks before utilizing RSU resource blocks.
In the abundant 5G scenario, Gurobi achieves objective values of approximately 1.6 × 10 7 to 1.7 × 10 7 , while the Random baseline attains 1.2 × 10 7 to 1.3 × 10 7 . From Figure 2, we can see a 21.4% to 24.9% performance gap between Gurobi optimal and Random baseline in each scheduling cycle.
Under limited 5G scenario, Gurobi achieves objective values of approximately 3.25 × 10 6 to 3.5 × 10 6 , while the Random baseline attains an approximately 1.75 × 10 6 to 2 × 10 6 objective value. From Figure 3, there is a 42.5% to 51.0% performance gap between Gurobi optimal and Random baseline in each scheduling cycle.
These results validate the value of our optimization model as it can increase weighted system throughput compared to arbitrary allocation.

5.3. Algorithm Performance Evaluation and Comparison

This subsection compares algorithm performance under a fixed population of 500 users across both resource scenarios, focusing on solution quality, computational efficiency, and service admission characteristics.

5.3.1. Solution Quality and Computational Time

Figure 4, Figure 5, Figure 6 and Figure 7 present a comprehensive comparison of optimality gaps and computational times across all evaluated algorithms. In the abundant 5G scenario (Figure 4 and Figure 5), Figure 4 shows that both the proposed constructive heuristic and Simulated Annealing achieve optimal solutions across all ten scheduling cycles (TTI 0–9), matching Gurobi’s performance. In contrast, Round-Robin exhibits 22.9–25.2% optimality gaps.
Figure 5 analyzes computational time performance across all evaluated algorithms. The proposed constructive heuristic consistently executes within 12–18 ms across all scheduling cycles, safely meeting the 3GPP-mandated 20 ms real-time requirement for vehicular networks. Gurobi requires 258–337 ms per cycle, while Simulated Annealing demands 5380–5964 ms. Round-Robin executes within 250–318 ms and exhibits 22.9–25.2% optimality gaps, demonstrating that neither computational efficiency nor solution quality can match the proposed constructive heuristic.
In the limited 5G scenario (Figure 6 and Figure 7), Figure 6 shows the proposed constructive heuristic maintains optimality gaps between 3.5% and 5.7% across all scheduling cycles. Simulated Annealing maintains gaps ranging from 10.1% to 12.3%, while Round-Robin’s performance deteriorates dramatically, with gaps ranging from 48.7% to 56.5%.
Figure 7 shows the proposed constructive heuristic executes within 13–17 ms, Gurobi requires 365–519 ms, Simulated Annealing demands 6250–6774 ms, and Round-Robin takes 237–286 ms.

5.3.2. Service Admission Success Rates

Figure 8 and Figure 9 analyze service admission success rates. In the abundant 5G scenario (Figure 8), all algorithms achieve nearly 100% admission rates, as available capacity substantially exceeds demand.
Figure 9 reveals the proposed constructive heuristic’s superiority under limited resources, achieving the highest admission rates of 31–35%, exceeding even Gurobi’s optimal solution. Simulated Annealing achieves 30–34% admission rates, while Round-Robin manages only 15–19%, demonstrating roughly half the performance of the proposed constructive heuristic.

5.4. Scalability Analysis

This subsection examines algorithm scalability as user density increases from 400 to 700 concurrent users under the limited 5G scenario. This stress-test configuration evaluates whether algorithms maintain performance characteristics as network load intensifies, analyzing computational time, solution quality, service admission, and objective values.

5.4.1. Computational Time and Solution Quality Scalability

Figure 10 presents computational time evolution across user densities on a logarithmic scale. As user count increases from 400 to 700, all algorithms exhibit longer execution times. The proposed constructive heuristic maintains execution times between 13 ms and 18 ms, remaining below the 20 ms real-time threshold. Gurobi’s execution time grows from 324 ms to 476 ms, Simulated Annealing ranges from 4925 ms to 8079 ms, and Round-Robin ranges from 184 ms to 312 ms.
Figure 11 analyzes solution quality evolution across user densities. As user count increases from 400 to 700, Round-Robin’s optimality gaps increase from 50.9% to 54.3%. Simulated Annealing maintains relatively stable gaps between 10.9% and 11.7%. The proposed constructive heuristic shows decreasing gaps from 5.3% to 3.4%, remaining within 5.5% across all densities.

5.4.2. Service Admission and Objective Value Scalability

Figure 12 shows allocated services as user density increases from 400 to 700. The proposed constructive heuristic allocates 2385 services at 400 users, growing to 2622 services at 700 users, which is approximately a 10% increase. The heuristic tracks Gurobi’s allocation, which ranges from 2355 to 2584 services, with both showing saturation as the system reaches resource limits. Simulated Annealing allocates between 2285 and 2484 services. Round-Robin allocates fewer services, ranging from 1280 to 1351, about half the heuristic’s performance, wasting significant resource capacity.
Figure 13 presents objective value evolution across 400–700 users. The proposed heuristic grows from 3.13 × 10 7 to 3.40 × 10 7 , Gurobi from 3.31 × 10 7 to 3.52 × 10 7 , Simulated Annealing from 2.92 × 10 7 to 3.12 × 10 7 , while Round-Robin remains nearly flat at 1.59 × 10 7 1.61 × 10 7 .
The scalability analysis demonstrates three key findings: (1) Computational efficiency: the proposed heuristic maintains 13–18 ms execution time across all user densities, enabling real-time deployment; (2) Solution quality: it achieves 3.4–5.3% optimality gaps under limited resources, outperforming baseline heuristics; (3) Performance across user densities: the proposed heuristic achieves the highest service admission count, while Gurobi attains the maximum system transmission rate throughput, with the heuristic ranking second and both significantly outperforming other baseline algorithms.

6. Conclusions and Future Work

This study addresses the challenge of real-time and efficient resource allocation for multi-slice V2X networks under heterogeneous QoS requirements. By formulating a joint slice selection and resource allocation model as an integer programming problem, the proposed framework captures both the differentiated service demands of vehicular users and the hierarchical nature of 5G and RSU resources. To achieve real-time feasibility, a constructive heuristic algorithm is developed, featuring a hierarchical allocation strategy that prioritizes 5G resources, followed by RSU resource backfilling. This design enables efficient utilization of heterogeneous network resources while ensuring latency constraints are satisfied within the stringent 20 ms limit required for vehicular communication.
Comprehensive numerical experiments validate the effectiveness and practicality of the proposed approach. In both abundant and limited 5G resource scenarios, the heuristic achieves near-optimal performance, outperforming baseline methods such as Random, Simulated Annealing, and Round-Robin in terms of weighted system throughput and service admission rate. The algorithm consistently maintains execution times under 20 ms, confirming its suitability for delay-sensitive V2X applications. Moreover, scalability analysis demonstrates that the performance gap between the heuristic and optimal Gurobi solutions narrows as the number of users increases, further highlighting the method’s robustness and adaptability to large-scale vehicular networks.
Despite the promising results, this work is currently limited to single-cell scenarios with finite traffic loads and slice sets. Future research will address these limitations and expand the framework in several directions: (i) extending the heuristic to multi-cell environments to handle inter-cell interference and coordinated resource orchestration; (ii) evaluating performance under significantly higher traffic loads and larger slice sets, including a more exhaustive analysis of memory and computational overheads; (iii) incorporating predictive traffic and mobility intelligence for proactive capacity reservation; (iv) co-optimizing radio, edge-compute, and network function resources for end-to-end service chains; and (v) embedding machine learning techniques, such as RL, to enhance decision-making in dynamic vehicular environments.

Author Contributions

Conceptualization, K.S. and W.K.C.; methodology, K.S.; software, H.J.; validation, K.S., J.L. and W.K.C.; formal analysis, K.S.; investigation, K.S. and H.J.; resources, K.S. and J.L.; writing—original draft preparation, K.S.; writing—review and editing, K.S., J.L., H.J. and W.K.C.; visualization, K.S.; supervision, W.K.C.; project administration, W.K.C.; funding acquisition, W.K.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by Major 202310D326 Key Technologies and Application Demonstration of Vehicle-Road-Cloud Integrated Data Platform for Intelligent Vehicle Networking Operations and Management which is part of Major Program of Science and Technology of Shenzhen (Grant No. KJZD20231023100304010).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets presented in this article are not readily available because the data involved in this study originate from fundamental network data or data models provided by telecommunication service provider. The related algorithms developed in this research are intended for applications such as intelligent network operation and maintenance for this telecommunication service provider. Requests to access the datasets should be directed to Wai Kin (Victor) Chan.

Conflicts of Interest

Authors Kun Song and Jining Liu were employed by the company China Mobile Group Guangdong Co., Ltd. The remaining author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
3GPP3rd Generation Partnership Project
5GFifth Generation Mobile Networks
eMBBEnhanced Mobile Broadband
mMTCMassive Machine-Type Communication
URLLCUltra-Reliable Low-Latency Communication
H-CRANHeterogeneous Cloud Radio Access Network
HDHigh-Definition
LSTMLong Short-Term Memory
MARLMulti-Agent Reinforcement Learning
DRLDeep Reinforcement Learning
RLReinforcement Learning
MDPMarkov Decision Process
NPNondeterministic Polynomial time
QoSQuality of Service
RANRadio Access Network
RBResource Block
RSURoadside Unit
SLAService Level Agreement
TTITransmission Time Interval
V2IVehicle-to-Infrastructure
V2VVehicle-to-Vehicle
V2XVehicle-to-Everything

References

  1. Miuccio, L.; Panno, D.; Pisacane, P.; Riolo, S. A QoS-aware and channel-aware Radio Resource Management framework for multi-numerology systems. Comput. Commun. 2022, 191, 299–314. [Google Scholar] [CrossRef]
  2. Albonda, H.D.R.; Pérez-Romero, J. An efficient RAN slicing strategy for a heterogeneous network with eMBB and V2X services. IEEE Access 2019, 7, 44771–44782. [Google Scholar] [CrossRef]
  3. Chen, Y.; Wang, Y.; Liu, M.; Zhang, J.; Jiao, L. Network slicing enabled resource management for service-oriented ultra-reliable and low-latency vehicular networks. IEEE Trans. Veh. Technol. 2020, 69, 7847–7862. [Google Scholar] [CrossRef]
  4. Foukas, X.; Patounas, G.; Elmokashfi, A.; Marina, M.K. Network slicing in 5G: Survey and challenges. IEEE Commun. Mag. 2017, 55, 94–100. [Google Scholar] [CrossRef]
  5. Campolo, C.; Molinaro, A.; Iera, A.; Menichella, F. 5G network slicing for vehicle-to-everything services. IEEE Wirel. Commun. 2018, 24, 38–45. [Google Scholar] [CrossRef]
  6. Mei, J.; Wang, X.; Zheng, K. Intelligent network slicing for V2X services toward 5G. IEEE Netw. 2019, 33, 196–204. [Google Scholar] [CrossRef]
  7. Su, R.; Zhang, D.; Venkatesan, R.; Gong, Z.; Li, C.; Ding, F.; Jiang, F.; Zhu, Z. Resource allocation for network slicing in 5G telecommunication networks: A survey of principles and models. IEEE Netw. 2019, 33, 172–179. [Google Scholar] [CrossRef]
  8. 3rd Generation Partnership Project (3GPP)/ETSI. 5G; Service Requirements for Enhanced V2X Scenarios (3GPP TS 22.186 Version 16.2.0 Release 16). Technical Specification ETSI TS 122 186 V16.2.0, ETSI/3GPP. 2020. Available online: https://www.etsi.org/deliver/etsi_ts/122100_122199/122186/16.02.00_60/ts_122186v160200p.pdf (accessed on 19 December 2025).
  9. Lee, Y.L.; Loo, J.; Chuah, T.C.; Wang, L.C. Dynamic network slicing for multitenant heterogeneous cloud radio access networks. IEEE Trans. Wirel. Commun. 2018, 17, 2146–2161. [Google Scholar] [CrossRef]
  10. Cui, Y.; Yang, X.; He, P.; Wang, R.; Wu, D. URLLC-eMBB hierarchical network slicing for Internet of Vehicles: An AoI-sensitive approach. Veh. Commun. 2023, 43, 100648. [Google Scholar] [CrossRef]
  11. Dong, J.; Gao, S.; Lu, H.; Cao, Y.; Yu, Y.; Ma, X. Joint optimization of resource allocation and tasks scheduling in network slicing enabled internet of vehicles. In Proceedings of the 2022 IEEE 8th International Conference on Computer and Communications (ICCC), Chengdu, China, 9–12 December 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 552–556. [Google Scholar]
  12. Cui, Y.; Shi, H.; Wang, R.; He, P.; Wu, D.; Huang, X. Multi-agent reinforcement learning for slicing resource allocation in vehicular networks. IEEE Trans. Intell. Transp. Syst. 2023, 25, 2005–2016. [Google Scholar] [CrossRef]
  13. Li, T.; Zhu, X.; Liu, X. An end-to-end network slicing algorithm based on deep Q-learning for 5G network. IEEE Access 2020, 8, 122229–122240. [Google Scholar] [CrossRef]
  14. Abood, M.S.; Wang, H.; He, D.; Fathy, M.; Rashid, S.A.; Alibakhshikenari, M.; Virdee, B.S.; Khan, S.; Pau, G.; Dayoub, I.; et al. An LSTM-based network slicing classification future predictive framework for optimized resource allocation in C-V2X. IEEE Access 2023, 11, 129300–129310. [Google Scholar] [CrossRef]
  15. Khan, H.; Luoto, P.; Samarakoon, S.; Bennis, M.; Latva-Aho, M. Network slicing for vehicular communication. Trans. Emerg. Telecommun. Technol. 2021, 32, e3652. [Google Scholar] [CrossRef]
  16. Qiao, K.; Wang, H.; Zhang, W.; Yang, D.; Zhang, Y.; Zhang, N. Resource allocation for network slicing in open RAN: A hierarchical learning approach. IEEE Trans. Cogn. Commun. Netw. 2025, 11, 2584–2600. [Google Scholar] [CrossRef]
  17. Cui, Y.; Yang, X.; He, P.; Wu, D.; Wang, R. O-RAN slicing for multi-service resource allocation in vehicular networks. IEEE Trans. Veh. Technol. 2023, 73, 9272–9283. [Google Scholar] [CrossRef]
  18. Hazarika, B.; Saikia, P.; Singh, K.; Li, C.P. Enhancing vehicular networks with hierarchical O-RAN slicing and federated DRL. IEEE Trans. Green Commun. Netw. 2024, 8, 1099–1117. [Google Scholar] [CrossRef]
Figure 1. Network slicing architecture for vehicular communications. The One Traffic Platform executes resource allocation algorithms and coordinates vehicle services across three specialized network slices (eMBB, mMTC, and URLLC) built upon shared physical infrastructure, ensuring differentiated QoS guarantees.
Figure 1. Network slicing architecture for vehicular communications. The One Traffic Platform executes resource allocation algorithms and coordinates vehicle services across three specialized network slices (eMBB, mMTC, and URLLC) built upon shared physical infrastructure, ensuring differentiated QoS guarantees.
Mathematics 14 00159 g001
Figure 2. Solution quality comparison under abundant 5G scenario: Gurobi optimal vs random baseline showing objective values and performance gaps.
Figure 2. Solution quality comparison under abundant 5G scenario: Gurobi optimal vs random baseline showing objective values and performance gaps.
Mathematics 14 00159 g002
Figure 3. Solution quality comparison under limited 5G scenario: Gurobi optimal vs random baseline showing objective values and performance gaps.
Figure 3. Solution quality comparison under limited 5G scenario: Gurobi optimal vs random baseline showing objective values and performance gaps.
Mathematics 14 00159 g003
Figure 4. Optimality gap comparison between the proposed constructive heuristic, Simulated Annealing, and Round-Robin algorithms under the abundant 5G resource scenario across ten scheduling cycles (TTI 0–9).
Figure 4. Optimality gap comparison between the proposed constructive heuristic, Simulated Annealing, and Round-Robin algorithms under the abundant 5G resource scenario across ten scheduling cycles (TTI 0–9).
Mathematics 14 00159 g004
Figure 5. Computational execution time comparison for all evaluated algorithms under the abundant 5G resource scenario, highlighting the 20 ms real-time threshold required for safety-critical V2X applications.
Figure 5. Computational execution time comparison for all evaluated algorithms under the abundant 5G resource scenario, highlighting the 20 ms real-time threshold required for safety-critical V2X applications.
Mathematics 14 00159 g005
Figure 6. Optimality gap analysis under the limited 5G resource scenario, demonstrating the performance of the proposed heuristic compared to metaheuristic and baseline methods across ten scheduling cycles.
Figure 6. Optimality gap analysis under the limited 5G resource scenario, demonstrating the performance of the proposed heuristic compared to metaheuristic and baseline methods across ten scheduling cycles.
Mathematics 14 00159 g006
Figure 7. Computational execution time comparison under the limited 5G resource scenario, showing deterministic performance within real-time constraints for all evaluated algorithms.
Figure 7. Computational execution time comparison under the limited 5G resource scenario, showing deterministic performance within real-time constraints for all evaluated algorithms.
Mathematics 14 00159 g007
Figure 8. Service admission success rate comparison under the abundant 5G resource scenario, where high capacity allows nearly 100% admission for all evaluated methods across scheduling cycles.
Figure 8. Service admission success rate comparison under the abundant 5G resource scenario, where high capacity allows nearly 100% admission for all evaluated methods across scheduling cycles.
Mathematics 14 00159 g008
Figure 9. Service allocation success rate comparison under the limited 5G resource scenario, highlighting the heuristic’s ability to maximize service satisfaction under severe capacity constraints.
Figure 9. Service allocation success rate comparison under the limited 5G resource scenario, highlighting the heuristic’s ability to maximize service satisfaction under severe capacity constraints.
Mathematics 14 00159 g009
Figure 10. Computational time scalability analysis: execution time vs. user count under the limited 5G scenario (logarithmic scale), with the red line indicating the 20ms real-time threshold.
Figure 10. Computational time scalability analysis: execution time vs. user count under the limited 5G scenario (logarithmic scale), with the red line indicating the 20ms real-time threshold.
Mathematics 14 00159 g010
Figure 11. Solution quality scalability analysis: optimality gap vs. user count under the limited 5G scenario, showing the heuristic’s robust performance as network load increases.
Figure 11. Solution quality scalability analysis: optimality gap vs. user count under the limited 5G scenario, showing the heuristic’s robust performance as network load increases.
Mathematics 14 00159 g011
Figure 12. Service allocation scalability analysis: total allocated services vs. user count under the limited 5G scenario, demonstrating system saturation characteristics.
Figure 12. Service allocation scalability analysis: total allocated services vs. user count under the limited 5G scenario, demonstrating system saturation characteristics.
Mathematics 14 00159 g012
Figure 13. Objective value scalability analysis: weighted system transmission rate vs. user count under the limited 5G scenario, showing performance gains across all user densities.
Figure 13. Objective value scalability analysis: weighted system transmission rate vs. user count under the limited 5G scenario, showing performance gains across all user densities.
Mathematics 14 00159 g013
Table 1. Notation and Definition.
Table 1. Notation and Definition.
NotationDefinition
Sets
ISet of users
J i Set of services for user i
KSet of network slices
Parameters
r k 5 G Available 5G resource blocks for slice k
r k R S U Available RSU resource blocks for slice k
r i j k r e q Resource blocks required to meet QoS of service j of user i on slice k
v i j k 5 G Transmission rate per 5G resource block for service j of user i on slice k
v i j k R S U Transmission rate per RSU resource block for service j of user i on slice k
w i j k Priority weight of service j of user i on slice k
Q O S i j QoS requirements of service j of user i: R e l i a b i l i t y i j , L a t e n c y i j
Q O S k QoS characteristics of slice k: R e l i a b i l i t y k , L a t e n c y k
a i j k Binary indicator: a i j k = 1 if ( R e l i a b i l i t y i j R e l i a b i l i t y k ) ( L a t e n c y i j L a t e n c y k ) , 0 otherwise
MLarge positive constant (big-M parameter)
Decision Variables
x i j k 5 G Number of 5G resource blocks allocated to service j of user i on slice k
x i j k R S U Number of RSU resource blocks allocated to service j of user i on slice k
x i j k Total resource blocks allocated to service j of user i on slice k
y k Binary variable: 1 if slice k uses RSU resource blocks, 0 otherwise
z i j k Binary variable: 1 if service j of user i is served on slice k, 0 otherwise
Table 2. Network slice QoS specifications and resource characteristics.
Table 2. Network slice QoS specifications and resource characteristics.
Slice NameReliabilityLatency (ms)
URLLC_10.999991
URLLC_20.999910
eMBB_10.99920
eMBB_20.9950
mMTC0.95100
Table 3. Transmission rate ranges per resource block across network slices.
Table 3. Transmission rate ranges per resource block across network slices.
Slice Name5G Rate (kbps)RSU Rate (kbps)
URLLC_1(300, 600)(150, 350)
URLLC_2(300, 600)(150, 350)
eMBB_1(500, 900)(250, 500)
eMBB_2(500, 900)(250, 500)
mMTC(200, 400)(100, 250)
Table 4. V2X service types with QoS requirements and resource specifications.
Table 4. V2X service types with QoS requirements and resource specifications.
ServiceReliabilityLatency
(ms)
Priority
Range
Demand
Range
EmergencyBrake0.99995(8, 10)(1, 3)
CollisionAvoidance0.99920(6, 9)(2, 5)
PlatooningControl0.99925(5, 8)(3, 8)
SensorSharing0.9950(4, 7)(5, 12)
HDMapUpdate0.99100(2, 5)(10, 25)
Infotainment0.95200(1, 3)(8, 20)
TrafficSignalControl0.99915(7, 9)(1, 4)
WeatherAlert0.97150(3, 6)(2, 6)
RemoteDiagnostics0.96180(2, 5)(4, 10)
Table 5. Resource configuration across scheduling cycles for abundant 5G scenario.
Table 5. Resource configuration across scheduling cycles for abundant 5G scenario.
TTISeedUsersServicesDemandCap_5GCap_RSUCap/Demand
00500376520,58950,0005002.45
110500381021,98950,0005002.30
220500366019,85150,0005002.54
330500370020,99450,0005002.41
440500368520,42050,0005002.47
550500371020,06450,0005002.52
660500369520,85450,0005002.42
770500377022,26550,0005002.27
880500376522,09650,0005002.29
990500379521,65450,0005002.33
Avg-500371621,07850,0005002.40
Table 6. Resource configuration across scheduling cycles for limited 5G scenario.
Table 6. Resource configuration across scheduling cycles for limited 5G scenario.
TTISeedUsersServicesDemandCap_5GCap_RSUCap/Demand
00500376520,5895005000.049
110500381021,9895005000.045
220500366019,8515005000.050
330500370020,9945005000.048
440500368520,4205005000.049
550500371020,0645005000.050
660500369520,8545005000.048
770500377022,2655005000.045
880500376522,0965005000.045
990500379521,6545005000.046
Avg-500371621,0785005000.048
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Song, K.; Jiang, H.; Liu, J.; Chan, W.K. Resource Allocation for Network Slicing in 5G/RSU Integrated Networks with Multi-User and Multi-QoS Services. Mathematics 2026, 14, 159. https://doi.org/10.3390/math14010159

AMA Style

Song K, Jiang H, Liu J, Chan WK. Resource Allocation for Network Slicing in 5G/RSU Integrated Networks with Multi-User and Multi-QoS Services. Mathematics. 2026; 14(1):159. https://doi.org/10.3390/math14010159

Chicago/Turabian Style

Song, Kun, Hanxiao Jiang, Jining Liu, and Wai Kin (Victor) Chan. 2026. "Resource Allocation for Network Slicing in 5G/RSU Integrated Networks with Multi-User and Multi-QoS Services" Mathematics 14, no. 1: 159. https://doi.org/10.3390/math14010159

APA Style

Song, K., Jiang, H., Liu, J., & Chan, W. K. (2026). Resource Allocation for Network Slicing in 5G/RSU Integrated Networks with Multi-User and Multi-QoS Services. Mathematics, 14(1), 159. https://doi.org/10.3390/math14010159

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop