Network Slicing

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (30 November 2022) | Viewed by 7648

Special Issue Editors

Division of Wireless Communication and Radio Positioning, University of Kaiserslautern, Kaiserslautern, Germany
Interests: 5G/B5G/6G networks; timely and reliable communication; multi-access edge computing; network slicing; non-stationary signal processing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Electrical Engineering and Information Technology, University of Napoli Federico II, Naples, Italy
Interests: networking; network security; real-time multimedia applications; standardization; network orchestration
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, Central Michigan University, Mount Pleasant, MI 48859, USA
Interests: beyond 5G networking; tactile internet; communication networks (mobile, multimedia, software-defined); computer-mediated education
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Network slicing, as the most significant enabling technology of the 5G era, allows multiple logical networks (network slices) to share the same telecommunication network infrastructure. It brings to 5G networks enhancements in flexibility, resource efficiency, and security; and thereby identifies 5G with a capability of specialization with respect to highly heterogeneous service types. Empowered by network slicing, 5G systems are capable of fulfilling the extreme performance requirements of emerging use scenarios such as ultra-reliable low-latency communications (URLLC), and create novel business paradigms such as Slice-as-a-Service (SlaaS).

Shifting from the classical one-size-fits-all network topology for mixed data traffic to use-case-dependent network slice specification, from the layer-by-layer hierarchical designing approach to the cross-layer design towards end-to-end performance, the deployment of network slicing fundamentally changes the way we design, construct, operate, and manage mobile networks. Thereby, it raises technical challenges in all perspectives related to networking, including architectural design, technical enablers, business issues, optimization methods, and security concerns. In this Special Issue we solicit original papers in areas including but not limited to:

  • Architectural design of network slicing for industrial verticals;
  • End-to-end network slicing;
  • Energy efficiency of sliced networks;
  • Machine learning and artificial intelligence for network slicing;
  • Network slicing framework for the integration of terrestrial and non-terrestrial networks;
  • Network slicing with heterogeneous radio access technologies;
  • New business models in network slicing;
  • Privacy and security in network slicing;
  • Resource provisioning, orchestration, and management for network slicing;
  • Service-level agreement design for sliced networks;
  • Sliced network operation and management;
  • Technologies of software-defined networks and network function virtualization.

This is a joint special issue with Network.

Dr. Bin Han
Prof. Dr. Simon Pietro Romano
Prof. Dr. Patrick Seeling
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • network slicing
  • cross-layer design
  • E2E
  • heterogeneous networks
  • network function virtualization

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

27 pages, 4768 KiB  
Article
Traffic Classification for Network Slicing in Mobile Networks
by Álvaro Gabilondo, Zaloa Fernández, Roberto Viola, Ángel Martín, Mikel Zorrilla, Pablo Angueira and Jon Montalbán
Electronics 2022, 11(7), 1097; https://doi.org/10.3390/electronics11071097 - 30 Mar 2022
Cited by 10 | Viewed by 3651
Abstract
Network slicing is a promising technique used in the smart delivery of traffic and can satisfy the requirements of specific applications or systems based on the features of the 5G network. To this end, an appropriate slice needs to be selected for each [...] Read more.
Network slicing is a promising technique used in the smart delivery of traffic and can satisfy the requirements of specific applications or systems based on the features of the 5G network. To this end, an appropriate slice needs to be selected for each data flow to efficiently transmit data for different applications and heterogeneous requirements. To apply the slicing paradigm at the radio segment of a cellular network, this paper presents two approaches for dynamically classifying the traffic types of individual flows and transmitting them through a specific slice with an associated 5G quality-of-service identifier (5QI). Finally, using a 5G standalone (SA) experimental network solution, we apply the radio resource sharing configuration to prioritize traffic that is dispatched through the most suitable slice. The results demonstrate that the use of network slicing allows for higher efficiency and reliability for the most critical data in terms of packet loss or jitter. Full article
(This article belongs to the Special Issue Network Slicing)
Show Figures

Figure 1

Review

Jump to: Research

23 pages, 2613 KiB  
Review
Next-Generation Blockchain-Enabled Virtualized Cloud Security Solutions: Review and Open Challenges
by Mueen Uddin, Anjum Khalique, Awais Khan Jumani, Syed Sajid Ullah and Saddam Hussain
Electronics 2021, 10(20), 2493; https://doi.org/10.3390/electronics10202493 - 13 Oct 2021
Cited by 5 | Viewed by 3151
Abstract
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, [...] Read more.
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing for facilities and amenities for businesses and multinational corporations. The enormous elastic on-demand cloud provisioning resources and services and datasets are processed and stored in tier-level virtualized cloud data centres operated by third-party service providers called cloud owners. The primary issue with these cloud service providers is to provide and maintain data security, privacy, and confidentiality and service availability and data support for end-users. This paper reviews, highlights, and discusses some of the common cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. We then provided blockchain-enabled solutions for virtualized cloud platforms involving both the end-users and cloud service providers (CSP) to address and solve various security and privacy-related vulnerabilities. These solutions will help the data centre industry to improve its virtualized cloud services and resource provisioning facilities. Finally, we discussed different blockchain-related implementation challenges in cloud infrastructures. Full article
(This article belongs to the Special Issue Network Slicing)
Show Figures

Figure 1

Back to TopTop