Publi 6337

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.

Digital Object Identifier 10.1109/ACCESS.2017.DOI

Algorithmics and Modeling Aspects of


Network Slicing in 5G and Beyonds
Network: Survey
FADOUA DEBBABI1,2 , RIHAB JMAL2 , LAMIA CHAARI FOURATI2 ,AND ADLENE KSENTINI.3
1
University of Sousse, ISITCom, 4011 Hammam Sousse,Tunisia (e-mail: [email protected])
2
Laboratory of Technologies for Smart Systems (LT2S) Digital Research Center of Sfax (CRNS), Sfax, Tunisia (e-mail: [email protected]
[email protected] )
3
Eurecom, France (e-mail: [email protected] )
Corresponding author: Rihab JMAL (e-mail:[email protected]).

ABSTRACT One of the key goals of future 5G networks is to incorporate many different services into a
single physical network, where each service has its own logical network isolated from other networks. In
this context, Network Slicing (NS)is considered as the key technology for meeting the service requirements
of diverse application domains. Recently, NS faces several algorithmic challenges for 5G networks. This
paper provides a review related to NS architecture with a focus on relevant management and orchestration
architecture across multiple domains. In addition, this survey paper delivers a deep analysis and a taxonomy
of NS algorithmic aspects. Finally, this paper highlights some of the open issues and future directions.

INDEX TERMS Network Slicing, Next-generation networking, 5G mobile communication, QoS, Multi-
domain, Management and Orchestration, Resource allocation.

I. INTRODUCTION promising solutions to such network re-engineering [3].


A. CONTEXT AND MOTIVATION NS [9] allows the creation of several Fully-fledged virtual
networks (core, access, and transport network) over the
HE high volume of generated traffics from smart sys-
T tems [1] and Internet of Everything applications [2]
complicates the network’s activities and management of cur-
same infrastructure, while maintaining the isolation among
slices.The FIGURE 1 shows the way different slices are
isolated. Each slice integrates a specific use case that supports
rent and next-generation mobile networks. Therefore, net-
diverse verticals such as remote surgery, safety, automotive
work models [3] should be invented to find a solution that
infrastructure, home management, etc. When a failure or an
enables managers to carry out management operations with-
inaccuracy has occurred in one slice it does not affect the
out needs to configure the devices. In this context, the fifth-
other slices. NS will be employed to realize certain relevant
generation (5G) is emerging with the rapid development and
key features of 5G such as the guarantee of a heterogeneous
advancement in cellular networking technology as a com-
performance, the coexistence of diverse business model and
pletely new era for mobile communications. 5G networks are
use cases, as well as the rapid launch of services and appli-
intended to provide a full connection between communities
cations [10]. Several elements must be provided to support
that can overcome the constraints of time and space as well as
the NS paradigm in mobile networks such as the framework
the creation of whole-dimensional interconnections between
of NS aware orchestration, a flexible control system for the
people and things [4]. Also, 5G network has to support
network functions, a persistent framework of QoS/Quality
several services [5], business models [6] and multiple slices
of Experience(QoE) management, and an enhanced manage-
sharing the same infrastructure to attain complete resource
ment algorithm [11]. The basic idea of NS is closely linked
usage, finest level of granularity and satisfy the distinct
to the cloud computing infrastructure as a service (IaaS) [12].
scenarios. Backing all these demands in the same infrastruc-
IaaS shares computing, networking resources and storage
ture necessitates re-engineering of the network architecture
between various tenants and afford entirely functional VN
beyond the present 3rd Generation Partnership Project [7]-
powered by Network Functions Virtualization (NFVs) and
Long Term Evolution [8] (3GPP-LTE) extensions.
software-defined networking (SDN) [13]. Furthermore, NS
Respectively, Network Slicing (NS) is one of the most

VOLUME 4, 2016 1
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

FIGURE 1: 5G Network Slicing

FIGURE 2: Indicative applications of 5G network slicing

requires a rising degree of resilience that has only made by


the recent emergence of NFV and SDN. SDN is based on B. STRUCTURE AND ORGANIZATION OF THE PAPER
the separation of the Control Plane (CP) and the data plane This paper is organized as follows: The scope of the paper
in each network. In this paradigm, the routing operations are and the contribution are provided in section II. Section III
determined by a centralized controller that manages the dif- presents the NS architecture. The taxonomy of NS Algorith-
ferent network components. NFV allows each network func- mics Aspects are discussed in section IV. Section V presents
tion called the Virtual Network Function (VNF), to reduce the open issues and future directions. Finally, conclusions are
the cost of deployment that run on general-purpose hard- drawn in section VI.
ware. Hence, NS presents an integration of several VNFs.
Consequentely, the NS provides not only a scalable, flexible C. LIST OF ACRONYMS
and programmable service but also minimizes Operating The list of acronyms and abbreviations referenced throughout
Expenditure (OPEX) and Capital Expenditure (CAPEX) by this paper is presented in TABLE 1.
efficiently managing and orchestrating VNFs [14]. In fact,
the Virtual Network (VN) slice is implemented on top of II. SCOPE AND CONTRIBUTION
the physical network in a manner that gives the illusion Starting from the philosophy of one size fits all design of
to slice tenants for running their own physical network the network, potential wireless networks will use the NS
[15]. On all physical links that constitute the path, a virtual approach to accommodate applications with a wide range
link among virtual nodes can be performed as a physical of specifications across the same physical network and to
multihop path with reserved bandwidth, where the Virtual efficiently control, allocate and manage the slice resource. In
links can be efficiently created through SDN routers. It is this context, several research papers [15] [16] [17] [18] [19]
possible to implement virtual nodes as VNFs operating on focus on the algorithmic challenges of NS that arise in differ-
general-purpose hardware that forms a cloud infrastructure. ent fields as well as necessitating novel techniques. In [15],
To explain the flexibility offered by NS, we present various authors present the algorithmic aspect of NS that requires
indicative applications (IoT, video service and broadband) in methods from the functional research networking and com-
the FIGURE 2 which illustrates the essential VNFs specific puter science communities. Also, they explain the efficient
for each application and the corresponding network domains NS problem as a virtual network embedding (VNE) problem.
where it could be placed. The VNE is an integer linear program (ILP) that presents
IoT services are implemented with a simplified CP, for an NP-hard problem. Obviously, the basic problem of NS
example, the service of smart meter monitors the energy con- is constrained by the optimization. This problem considers
sumption of houses without using the functionalities of mo- the optimal placement of VNFs at the resource node, and the
bility management. Broadband and traditional voice services reservation of the required interconnection capacity. There-
require hard functionalities of CP such as authentication fore, a lot of literature seeks several heuristics algorithms of
placed at the core cloud and mobility management. Video approximation to solve this issue. Sharma et al. [16] present
delivery services can be improved if caching functionality a native approach for the NS cloud. This approach covers the
and User Plane (UP) are available in the edge cloud, reducing whole network life cycle by incorporating cloud computing
back-haul traffic and improving User Experience (UE). technology and the theory of modern design to create a
structure and innovative architecture for all life cycle phases.
Zhang et al. [17] propose a basic architecture of 5G NS and
2 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

TABLE 1: List of acronyms the basic concept of NS using the LTE network to show
NS Network slicing the usefulness of the proposed architecture by employing
5G Fifth-Generation the existing technological landscape. A novel architecture of
CN Core Network
QoS Quality of Service 5G transport network is proposed in [19]. This architecture
3GPP 3rd Generation Partnership Project incorporates the facets of resource virtualization, network
LTE Long Term Evolution Service Management (SM), and virtual infrastructure, in-
E2E End-to-End
SDN Software Defined Networking tegrating the European Telecommunications Standards In-
VNFs Virtual Network Functions stitute (ETSI) NFV management and network orchestration
QoE Quality of Experience (MANO) system with unified SDN based control.
VNE Virtual Network Embedding
ILP Integer Linear Program Nevertheless, to the best of our knowledge, there is no
ETSI European Telecommunications Standards Institute extensive and detailed survey paper focusing on the topic of
MANO Management and Orchestration NS algorithmic aspects. These works [15] [20] [3] [21] [22]
IaaS Infrastructure as a Service
VNF Virtual Network Function presents the algorithmic challenges rising from the emerging
RAN Radio Acess Network of NS but don’t cover the orchestration architecture across
UP User Plane multiple domains : (1) They provide a limited review related
CP Control Plane
BBU BaseBand Unit to MANO aspects; (2) There is no deep analysis of NS
EC Edge Caching algorithmic aspects except for the description of the NS
IoT Internet of Things optimization problems; (3) No comprehensive descriptions
UE User Experience
OPEX Operating Expenditure of Resource Allocation (RA) aspects; (4) There is no deep
CAPEX Capital Expenditure classification of NS related approaches. More specifically,
NSI Network Slice Instance FIGURE 3 illustrates a real comparison of existing works
OSS/BSS Operating/Business Support System
NSSI Network Slice Subnet Instances with our work. The purple color depict the common point
SLA Service Level Agreement between all works and different points are described briefly
CDN Content Delivery Network in the scheme. The main aim of our work is to give the reader
DASA Dynamic Auto-Scaling Algorithm
NSOS NS Orchestration System a deep vision of the NS algorithmic aspect. Additionally,
ONOS Open Network Operating System we depict a profound classification of proposed works in the
TN Transport Network literature. Our contributions are outlined as follows:
ENI Experiential Network Intelligence (ENI)
NSOS Network Slicing Orchestration System • Present the generic framework of NS architecture.
BSRA Bandwidth Slicing and Resource Allocation • Introduce the most relevant architecture of NS manage-
OFDMA Orthogonal Frequency Division Multiple Access ment and orchestration across multiple domains.
EVNFP Elastic Virtual Network Function Placement
VDC Virtual Data Centers • Discusse the 5G NS algorithmic aspect and depicts a
SECaas Security as a Service deep classification of different approaches.
Implicit Mutual Authentication and Key Establishment
IMAKE-GA
with Service Group Anonymity
PPOA Privacy-Preserving One-way Authentication III. NETWORK SLICING ARCHITECTURE
PPMA Privacy-Preserving Mutual Authentication A. GENERIC ARCHITECTURE OF NETWORK SLICING
SM Service Management Mobility management, virtualization of wireless infrastruc-
RM Resource Management
MM Mobility Management ture and orchestration of End-to-End (E2E) slices are chal-
RA Resource Allocation lenging issues of NS due to the massive variety of appli-
DC Data Center cations and services that require intelligent approaches and
VN Virtual Network
AC Admission Control algorithms. Recent 5G NS research focuses primarily on
OA Optimal Allocation solving issues through effective NS frameworks. FIGURE
4 highlights the generic architecture of 5G NS based on
the study provided in [20]. This architecture includes three
introduce a mobility management scheme between access main layers; infrastructure layer, network function layer, in
networks, potential and sub channel allocation scheme. Also, addition to the service layer.
they present a handover scheme for handover management The Infrastructure Layer: The infrastructure layer refers
between various networks, where the virtualized resource to the physical network infrastructure extends both the CN,
management is dynamically and efficiently responsible for the edge/cloud, and the RAN. Some software-defined tech-
the intra-slice and inter-slice allocation of network resources. niques [23] could be used in order to simplify the resource
A threefold of contributions is described in [18]: First, they abstraction within the RAN and CN. It also includes control,
devise a novel architecture service layer for solving the utiliz- management, deployment of the infrastructure, and the allo-
ing of agnostic architecture where this layer is liable for the cation of resources (radio, storage, computing, network) to
entire network slice Life Cycle Management (LCM). Second, the slices as well as how the higher layers report and handle
they introduce the idea of the Network Application Store these resources.
(NAS) to simplify the complicated procedure of delineating The Network function Layer:Performs all the operations
the network slice. Third, they describe the realization of and functionalities related to the configuration and life cycle
VOLUME 4, 2016 3
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

FIGURE 3: A comparison on related review papers

1) Virtual Network Instances (VNI) are generated on the


physical network using infrastructure layer functional-
ities.
2) Build a service chain by aggregation of the virtualiza-
tion layer and network functions through mapping the
network functions to VNI.
3) Keep communication between application, service and
NS framework to manage the life cycle of VNI and
adapt the virtualized resources according to the context
changing.

FIGURE 4: Network Slicing Generic Architecture B. MANO ARCHITECTURE ACROSS MULTIPLE


DOMAIN
To support network slices MANO across multiple (techno-
management of the network functions. In this layer, the SDN logical and administrative) operational domains, an advanced
and NFV techniques are considered as a significant techni- and efficient NS architecture is required. The aims of this ar-
cal aspect. Moreover, this layer simplifies the placement of chitecture are to expand conventional orchestration, control,
network slices on multi-slice chaining and virtual resources and management capabilities across models and build to form
[24]. It also manages efficiently both fine-grained [20] and a fully stitched of network slices composition. Several papers
coarse-grained [20] network functions. [4] [25] [26] propose a management and orchestration model
The Service Layer:Comprised of mobile devices, virtual that integrates NFV and SDN components into the basic
reality systems, and connected vehicles. This layer directly 3GPP NS management to support the composition of net-
related to different business models, also it represents net- working and computing/storage resources. Recently in [26]
work function and network infrastructure functionality ex- authors present a sophisticated architecture of NS orchestra-
pectations. The VNFs are mapped to physical resources on tion. Based on the latter we propose a simplified architecture
the basis of a high-level definition of the applications and that incorporates four main Stratums such as multi-domain
services in such a way that SLA is not violated. Service Conductor layer, domain-specific Fully-fledged Or-
The management and orchestration Layer: It presents a chestration layer, connectivity layer, and Slice Instance layer.
transversal layer based on the following main functions: FIGURE 5 illustrates the orchestration architecture across
4 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

multiple domains. the basic infrastructure and performs installation and


execution of the VNF, storage or computation.
1) Service Broker Layer • Sub-Domain SDN Controller: This block maintains the
The Service Broker stratum addresses the incoming slice service chaining and network connectivity between the
demands from verticals, application providers and Mobile allocated VNFs. It provides the slice LCM function
Virtual Network Operators (MVNOs) [27]. Besides, other es- through an abstract view of network resource and con-
sential operations such as slice owner/user management and trol report in case of performance degradation in order
relationship management are considered. This stratum allows to ensure the optimal Service Level Agreement (SLA).
a direct tenant interface with a multi-domain service con- • SM function: Consider the slice demands received from
ductor, control and negotiation of network slice admission the slice coordinator and defines the role of core and
with regard to service aspect, scheduling and management of RAN network that includes value-added services.
Network Slice Instance (NSI). Furthermore, a service broker
gathers abstract network revenue information about various 4) Infrastructure Layer
operational domains, providing a database that supports the The infrastructure layer consists of the virtual and physical
global service. It interacts with the Operating/Business Sup- infrastructure that incorporate VNFs, virtualization layer and
port System (OSS/BSS) to gather administrative and business virtual resources. For VNFs, the network functions are used
information when processing requests for slices. as a 5G value-added service (firewall or Content Delivery
Network(CDN)) or data plane and control plane functions.
2) Service Conductor Layer
The virtualization layer is responsible for subdividing phys-
The service conductor stratum is responsible for the manage- ical resources between operating VNFs and abstract; it de-
ment and service orchestration towards federated resources couples the basic hardware resource. The virtual resources
linked to successfully accepted slice requests. This layer (processing, computation, and networking) present as the
incorporates two blocks such as service conductor and Cross- abstracted physical resource that directly run VNFs. The
domain Slice Coordinator. Service Conductor disintegrates physical infrastructure is made up of hardware resources that
the slice demand across various administrative domains and present the VNFs with network connectivity functionality,
determines the combination of fields with cross-domain con- storage, and processing via the virtualization layer. The mul-
nectivity. Also, it implements the readjustments of particular tiple domains backing all technology type including RAN
service towards united-domains, modifies, instantiates and and multiple administrative domains. The infrastructure ’s
dismantles domains in case of service policy update and role will not be restrictive to connectivity. It will afford
performance degradation. The slice coordinator manages, virtual resources and coordinated allocation networking. In
monitors and controls the corresponding federated NSI tool, addition, novel services are manufactured by software that
while maintaining secure and trustworthy communication will be hosted in the infrastructure factory while the network
across operational domains. It also functions as a mediator function and the resources are flexibly and dynamically pro-
between federated resources, conducting domain-specific al- visioned and treated.
location of resources and re-adjustments to recompense in
case of performance degradation.
IV. TAXONOMY OF NETWORK SLICING ALGORITHMIC
ASPECTS
3) Fully-fledged Orchestration Layer
The Fully-fledged Orchestration layer communicates with NS methods aim to improve the network resources utiliza-
the Slice coordinator, allocating the resources of the inter- tion, to enhance the satisfaction of users, the Quality of
nal domain to build a federated NSI. It also affords the Experience (QoE) and the User Experience (UE) as well as to
corresponding LCM through fourth functional blocks: SM minimize the deployment cost of the network. In this context,
function, slice LCM Function, Sub-domain NFV MANO, we propose a taxonomy of NS algorithmic aspects based
and Sub-Domain SDN Controller. on different NS methods for MANO and RA approaches as
illustrated in FIGURE 6.
• Slice LCM function: Identifies the corresponding net-
work slice template from the correlating catalog and
creates a logical network graph. The slice LCM function A. NETWORK SLICING MANAGEMENT AND
is responsible for the run time, orchestration and in- ORCHESTRATION APPROACHES
stantiation of a Network Slice Subnet Instances (NSSI) 1) NS Management and Orchestration Methods
taking into consideration the resource within the same Slice management is extremely important, it differs from
operational domains, modification and performing mon- classical network management. For NS cases, we need to
itoring the related operations. The NSSI presented as a manage not a single, but multiple networks while the slice
cluster of network functions instances, that composed of management functions split between NS system operators
a part or complete constituents of NSI [28]. and slice tenants. Consequent to the software dimension of
• Sub-domain NFV MANO: This block connects with the slices, we must provide cooperation between partially over-
slice LCM function providing an abstracted aspect of lapped functionality of the management and orchestration
VOLUME 4, 2016 5
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

FIGURE 5: Orchestration architecture across multiple domain

system. The paper of kuklinski [29] handles the NS man- traffic prediction, and unsupervised learning mechanism of
agement and orchestration scalability problem. The authors spectral clustering for efficient slice setup. Recently, authors
propose a Distributed Autonomous Slice Management and in [33] developed an innovative approach called SONATA
Orchestration (DASMO) aspect to solve this problem. In the for the MANO of each slice service, and compare it with the
sense of MANO orchestration, they use the orchestration most known open source frameworks as Cloudify and Open
concept and the classical term of slice management. The Source Mano (OSM).
MANO orchestration utilized for the runtime and lifecycle Essentially, the network slices are orchestrated to simplify
management of network slices, while the management used the business solutions for whole 5G vertical services and
for the runtime management of slices only. In [30] authors industries upon application providers. From the literature,
offer a novel MANO architecture framework. They present several works are suggested to address the orchestration
a management system to be used by operators to automate aspect. For instance, in [34] authors suggest a Dynamic
the design, delivery, and configuration of network slices in Auto-Scaling Algorithm (DASA) that is applied for a novel
various infrastructure resource domains that may include E2E NS Orchestration System (NSOS). They explain that
network functions from diverse vendors. Gutierrez et al. the NSOS relies on the basis of a hierarchical architecture.
[31] focus on a particular use case from the technological NSOS integrates dedicated entities per domain to handle
innovations of the 5G-MoNArch project. This project suits every segment of the mobile network from access to the
in the Experiential Network Intelligence (ENI) framework transport and core network component for a flexible fed-
through the combination of Artificial Intelligence (AI) en- erated network slices orchestration. The DASA allows the
dowed orchestration system and network management. In the NSOS to adjust its resources autonomously to changes in
same context of AI authors in [32] focus on three use cases the demand for slice orchestration requests (SORs), while
using particular Machine Learning (ML) algorithms, i.e. maintaining an average mean time required by the NSOS
drawing from a subset of the entire AI range of techniques, to to process each SOR. The DASA approach includes both
leverage the elasticity of resources. They propose an elastic reactive and proactive resource provisioning techniques. Au-
scheduler by applying deep learning for Signal to Noise Ratio thors in [35] present a VirtualEdge system that allows the
(SNR), reinforcement learning to make scheduling decisions, dynamic creation of a virtual node (vNode) to serve the
supervised learning for resource management established on workloads and the traffic of a network slice. This system

6 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

FIGURE 6: Taxonomy of Network Slicing Algorithmic Aspects

introduces a feasible orchestration and virtualization mul- network slice management framework of Transport Network
tidomain resources that provides isolation among network (TN) between core and access networks using Open Network
slices. Also, authors introduce a new learning-assisted al- Operating System (ONOS) and OpenStack. This framework
gorithm to effectively orchestrate multi-domain resources associates, creates and manages the slice up to the user
and establish heuristic algorithm to dynamically map virtual equipment (UE). Alberto et al. [40] suggest an information
resources to dependent physical resources. Rodolfo et al. [36] model of NS and a mobility management architecture that
present a network orchestration framework that is based on integrates SDN/NFV techniques. They introduce inventive
hybrid transport SDN Control Plane (CP) to afford dynamic components responsible for network slice orchestration and
NS for mobile metro core and enterprise networks. In [37], management. This architecture is designed to consider the
the authors establish how different virtualization solutions mobility of its components and the evolution of the dynamic
address NS. They propose an orchestration platform suitable scenarios. In [41] authors propose a novel mechanism of
for the 5GCity project. The solution includes the creation of NS resource management (RM) to allocate the resources
diverse network elements of slice such as physical networks, required for each slice of the LTE network, taking account
compute nodes, network edge resources, and radio parts of resource isolation between different slices. Also, the main
with coordinating various underlying controllers. Recently, objective of NS RM is to ensure that distributed bandwidths
in [38] authors propose a new distributed architecture based are isolated and fairly shared among users belonging to the
on a new federated-orchestrator control plane entity that can same slice. The paper of Bordel et al. [42] offers a new
manage the spectrum and computational resources without approach for the management and implementation of slices
needing any exchange of base station (BS) local data and and services in future 5G NS systems. This approach is based
resource information. TABLE 2 provides a summary and a on virtualization technologies (Docker or Kubernetes) and
fine-grained comparison of diverse 5G NS MANO methods. lightweight algorithms. Sladana et al. [43] present an NS
edge computing system that addresses the dynamic assign-
2) NS Management and Life Cycle Management Methods ment of computational resources to slices, management of
computing resources and radio within slices, and manage-
Due to the diversity of requirements and heterogeneity of
ment of the network across the slice. Moreover, they formu-
services, network management through SDN and NFV tech-
late the resource management and joint slice selection issues
nologies is a difficult task. Hence, an NS technique has
as a mixed-integer issue in order to reduce computational
been suggested to handle this challenge. Slice management
task accomplishment time. The paper [44] presents a mobility
is one of 5G network architecture’s key features that has
solution to address resource management by using games
attracted a lot of attention today. In [39] authors propose a
VOLUME 4, 2016 7
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

TABLE 2: Comparison of 5G NS MANO Methods


Refer- Technology Research
Technology Operational objective Orchestrator Management features Architecture
ences features project
To simplify the management Improved OSS/BSS
NFV Embedded
scalability issue using ETSI MANO to provides
[29] VN Element Multi-Domain ETSI NFV
autonomous and distributed OSM programmability
virtual resources Managers 5G!Pagoda
management architecture. level.
To reduce the number of
SDN,NFV computational resources Global Multiple
Auto-scaling of
[34] Virtual resources (cores CPU ) to be allocated orchestrator MANO administrative
resources
Cloud resources to the NS orchestration OSM domains
system.
To meet the customer
SDN, NFV demands and gathered NFV Improved OSS/BSS Multi-Domain
MANO
[30] Cloud services requirements from industry orchestrator Monitoring Resource ETSI NFV
NFVO
Virtual resources and standardization (NFVO) Policy management orchestration
association.
NFV, Central Cross-domain
To orchestrate the resource
and edge cloud Monitoring Multi-domain
[31] efficiently using AI and NFV MANO _______ ETSI NFV
Virtual resources Policy management Resource
ML algorithms. 5GMoNArch
Mobile network orchestration
SDN, NFV To improve the overall Spatial domain
Slice life cycle
Cloud resources performance and resource MANO temporal domain
[32] MANO Auto-scaling of
Virtual resources efficiency of MANO OpenStack Resource
resources
Mobile network machinery. orchestration
Open MANO Administrative
Service monitoring
To achieve the optimal OSM domain
SDN, NFV Life-cycle management
utilization of allocated NFVO Openstack Service 5GTANGO
[33] virtual resources Policies enforcement
resources and the QoS for Cloudify OpenDayLight orchestration ETSI NFV
Mobile networks Run-time SLA
each vertical industry. Transport API Resource
contracts
Kubernetes orchestration
To ensure isolation between
US National
virtual resources virtual nodes, thus
[35] Orchestrator _______ Resource management Multi-domain Science
Edge cloud maximizing the use of
Foundation
physical resources
Politecnico
SDN To handle the heterogeneity
Network Hierarchica di Milano
[36] virtual topologies and complexity of OpenDaylight policy management
orchestrator architecture SWAN
network resources transport networks
networks
SDN, NFV To support the efficient
virtual resources operation of a large OpenStack Life cycle Orchestrator ETSI NFV
[37] NFVO
VN number of devices MANO management architecture 5GCity
cloud resources under dynamic conditions
SDN To decrease the overall
Federated Resource management Open Flow
[38] cloud resources latency in service _______ ETSI NFV
orchestrator Monitoring architecture
network resources experienced by IoT devices

of negotiation. This solution is improved by a particular They propose also an empirical approximation of the matrix
and heuristic swarm optimization algorithm. Also, the au- transition status to decrease the computational complexity
thors propose a novel resource borrowing model to readjust of the practical applications. In [47] the authors present a
overloaded resources in case of an inter-slice handover. In NS theoretical model that is capable of the admissibility of
[45] authors discuss the existing mechanism that has similar the 5G network region. They develop an adaptive algorithm
functionality in legacy networks and illustrate the strengths based on Q-Learning to attain optimal efficiency . Also, they
and limitations of those specific mechanisms for managing suggest a semi-Markov system based on specif constraints to
Radio Resources (RR) in a sliced network. In addition, they optimize the infrastructure provider revenue. Sciancalepore
present new slice management to realize the protection of et al. [48] suggest a novel theoretical paradigm focused on
each slice. This mechanism is achieved through the limitation stochastic geometry theory to model practical RANs. This
of the number of users admitted by Admission Control (AC) paradigm taking advantage of business opportunities that
and adjust the part of radio resources allocation via the provide from NS. Also, they develop a new functional AC
Packet Scheduler (PC). They suggest an iterative algorithm system that makes decisions taking into account the average
to optimize the different parameters (AC, PC) to ensure the experienced throughput guaranteed per slice by SLA. Re-
SLA.The AC mechanism on the service broker layer is im- cently, authors in [49] focused on the AC issue by means of
portant for slice management. In this context authors in [46] a heterogeneous tenant request multi-queuing system. They
suggest a general model for AC asynchronous for a slice and derive the model of predictive behavior and define the logical
make out to be Markovian under a set of limited constraints. technique of tenants in queue planted slice AC system. Also,

8 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

they present an admission optimization utility model for using deep reinforcement learning. A deep comparison of the
network slices.Besides, several methods are existing from different RA works is highlighted in the TABLE 3.
the literature that tackles the Life Cycle Management (LCM)
of network slice. For instance, in [50] authors propose an 2) Resource Allocation and Admission Control
orchestration E2E method via managing their life cycle. This The aim of the AC module is to ensure that admitted
solution establishes the software modeling of resources as users have a reasonable likelihood to see their requirements
well as services and provides an overall view of architecture meeting rate over their lifetime, even after changes occur
that applied for different scenarios. Also, the paper of Zhang in the network. In the field of AC and RA, there are a
[22] presents a novel MANO slice that includes network significant set of existing methods that rely on the auction
slice instance life cycle management. The network slice life mechanism, which turns the optimization problem into a
cycle is divided into four phases; design, orchestration and game for instance [58] [59] [60] [61] [62] [63]. Authors
activation, Run-Time Assurance, and Decommissioning. in [58] focus on dynamic sharing in NS where the tenants
backing inelastic users with a floor requirements rate. They
B. NETWORK SLICING RESOURCE ALLOCATION propose a NS framework that combines AC, user dropping,
APPROACHES and resource allocation. Doro et al. [59] analyzes a multi-
1) NS Resource Allocation Methods tenant SDN auction-based scheme for allocating network
The 5G platforms are shared by various tenants, each tenant resources. In particular, a FlowVisor is presumed to control
has diverse service requirements that require several amounts the resource allocation process by conducting an auction
of resources from the lower layer (mobile edge, and radio of fractions of network resources analysis. Authors in [60]
access network) and the upper layer (central office and trans- present a novel auction-based model for shared resource and
port network) of the NS 5G architecture. Hence, the key revenue optimization. Wang et al. [61] studies the relation-
issue in 5G telecommunications networks is the NS RA, ship between profit maximization and resource efficiency and
which faces different challenges in terms of customization, examines the dimensioning of network slice based on the
separation, appropriate isolation, elasticity, and E2E coor- pricing policy of the resources. In addition, the authors evolve
dination; hence playing a key role in resource utilization, an optimization framework to maximize resource efficiency
networking performance and load balancing. Several studies and slice customer profit. Recently, authors in [62] suggest an
have been proposed in terms of NS RA [51] [52] [53] [54] MVNO Slice Resource Allocation Architecture (MSRAA)
[55] [56] [57]. Authors in [51] suggest an E2E framework for supports diverse slices of the 5G data plane network. They
slicing both communication resources and computing. The estimate the criteria of bandwidth requirements for the effi-
framework isolates successfully the resources between slices cient allocation of resources and propose an AC algorithm
and ensures that deployed slices resources are sufficient to to reallocate the resources from lower priority to higher
meet the tenant’s latency requirements. In [52] the authors priority slices. Authors in [63] analyze the down-link/ up-
propose a RA model to construct the relationship mapping link decoupled association scheme and formulate an AC and
between substrate and logical networks in a consistent way. power allocation problem for the macro base stations in terms
To enhance user experience and the quality of service (QoS), of the total rate maximization.
the RA problem is defined as a subject to the bandwidth
constraints and backhaul capacity. This problem is described 3) VNF Placements (VNFP) and Virtual Network Embedding
as an extended Virtual Network Embedding (VNE) problem (VNE) Methods
and formulated as an ILP, which is solved using ILP solvers Slices are represented in the form of VNF chains that runs on
such branch-and-bound scheme, CPLEX, and Gurobi. In the physical and logical resources to meet the service demands.
same context, Fendt et al. [53] present the VNE problem as a The essential idea of NS RA is to determine the feasible
directed graph for mobile network slice and developed the path onto network infrastructure for the deployment of the
connection between the user equipment and network slice virtual links. Ghaznavi et al. [64] discuss the dynamic VNF
via the telecommunication service. To address the dynamic placement methods and propose an Elastic VN Function
allocation of wireless resources (virtual base stations and cell Placement to minimize providing VNF services operational
slice), authors in [54] study the RA problem and bandwidth costs. Authors in [65] present two algorithms that aim to
slicing to support the mixing of IoT and video streaming minimize the cost of mapping chain and the cost embedding
services. Recently, authors in [55] propose a novel algorithm of CPU, memory, physical link, and the network resource
RA that allocates the NS by applying the branch and bound utilization rate. To address the objective of jointly maxi-
method, to obtaining the optimal solution. The paper of mizing the use of physical links and minimizing mapping
Isolani et al. [56] presents a novel airtime RA model for costs, Khebbache et al. [66] propose a scalable algorithm of
NS in IEEE 802.11 RAN. The authors formulate the issue placement and VNF chaining. By using a graphic algorithm
as Quadratically Constrained Quadratic Program (QCQP) in based on a neural network, authors in [67] present a topology-
which the system’s overall queueing delay is reduced while aware VNF embedding approach to reduce resource con-
maintaining strict URLLC constraints. In [57] the authors sumption. Recently, the authors in [68] develop a VNFs
suggest a radio RA that fulfills the service requirements placement strategy as a matching theory (MT) basis on the
VOLUME 4, 2016 9
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

TABLE 3: Comparison of Resource Allocation Methods


Refere- Mathematical Implem-
Resources type Scenario Operational Objective Methods Description
nces Model entation
The Joint Edge and Central
VNF, Computing To provide a flexible and
Resource Slicer (JECRS), manage
and bandwidth Edge+RAN scalable scheme for resource
[51] General model the 2-tier MEC architecture Yes
resources +CN allocation with maintaining
services according to the tenants’
Base station isolation
slice requirements.
VNF and Link Access, The branch-and-bound scheme
Network resources Aggregation provides the upper and lower
Optimization To decrease the backhaul
[52] Network slice and core bounds of a branch that are Yes
framework transport latency
Storage and layers acquired by solving the relaxation
computation resources network issue.
The optimization model works
Physical resource Graph theory To determine the optimal E2E
Edge cloud on maximizing the weighted
[53] block Optimization slice embedding on shared Yes
+CN sum of the whole embedded
Link and base station framework physical infrastructure.
network slices.
Short time-scale and service
Lyapunov To dynamic allocate the resources
Downlink and uplink power allocation for IoT devices,
optimization and to differentiate between the
[54] network resources Edge+CN long time-scale bandwidth Yes
Distribured mixture of IoT and video streaming
Base station slicing, and quality decision
algorithm services.
for Video streaming service
The optimization model is
Downlink, virtual Complex theory To enhance the URLLC
RAN+Edge formulated to minimize the
[55] and bandwidth Optimization reliability and the spectral Yes
+CN spectral efficiency of eMBB
resources framework efficiency of the system
and URLLC slices.
The QCQP ensures the maximum
To minimize the system’s whole
Slice resources Optimization average queuing delay and
[56] RAN queueing delay and respect the Yes
network resources model calculates the queueing delay
constraint of URLLC.
of each slice.
The method controls diverse slices
Downlink, Uplink To enhance the slice requirement by monitoring the state of each slice
[57] General model RAN Yes
Service resources satisfaction and apply the model to controls
the slices multiple times.

forecasted customer requirements. This strategy performed authenticate a lot of devices. In this context, authors in [74]
by taking into consideration that various network zones are suggested a secure authentication method for enabled 5G
distinguished by different provision prices and costs. Katja et IoT devices. This method aims to guarantee the security of
al. [69] propose a network slice embedding method for the slice selection and access. In 5G networks, the use of static
allocation and assignment of network slice resources. This authentication protocols has two major issues: learning attack
heuristic approach meets the particular requirement based on and exposure of users service access behavior to third-party.
the algorithm provided in [70]. To tackle these issues, Sathi et al. [75] propose an anonymous
group Privacy-Preserving, One-way Authentication (PPOA)
and Mutual Authentication (PPMA) protocols. The resources
4) NS Isolation Methods
are distributed according to the requirements of the tenants,
The isolation technique is a fundamental feature of NS 5G not only in the provision of QoS but also the security. Authors
security, where several research papers have been done in in [76] propose an embedding aware-security slice enabling
this field. Khettab et al. [71] proposed intelligent security tenants to assert security-oriented demands, which limit the
based on an auto-scaling algorithm that leverages the SDN disclosure of information of network infrastructure provider.
and NFV architecture to enable slice security by using the Zbigniew et al. [77] propose multiple isolation parameters
SDN controller (ONOS). The proposed auto-scaling method and properties to enable quantitative and qualitative charac-
aims to guarantee the resource by checking for each slice the terization. Also, they present a flexible approach that enables
maximum and minimum resources at the orchestrator level. a particular isolation level for the E2E network slice.
For securing intra-slice network communications, a novel To deeply analyze the studied works for network slicing
protocol is proposed in [72]. The basis of this protocol is algorithmic aspects, we summarize in the TABLE 4 the
the bilinear pairing on the elliptic curve and the modification proposed methods, advantages and limitations of each work
of proxy re-encryption. Also, it offers mutual trust among with their related segment.
slice components in isolated manner. In [73] authors propose
a perceptible analysis of NS isolation as a framework of V. OPEN ISSUES AND FUTURE DIRECTIONS
a layered structure. Each layer of this framework has its 5G networks aim to integrate diverse services into a shared
isolation level and network elements, where the slice iso- infrastructure where each service has its own logical network
lation is calculated through mathematical rules. From the isolated from others. In this context, the emerging of Network
basis of IoT, a secure and efficient method is needed to Slicing considered as a technology to meet these various
10 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

TABLE 4: Comparison of network slicing algorithmic aspects methods


Criteria
NS
methods Proposed Seg- Late- Throu- OSS/ Scala- Secu- Isola- Availa- Comp- Optimi- Rev-
Cost QoS OA
classifi- methods ment ncy ghput BSS bility rity tion bility lexity zation enue
cation
[29] DASMO E2E N/A N/A N/A + + - N/A N/A N/A N/A N/A N/A N/A
[30] NESMO E2E + N/A N/A N/A N/A + N/A + N/A N/A - N/A N/A
MANO
[31] MANO E2E N/A + N/A + N/A N/A - N/A N/A - + + N/A
methods
[32] MANO E2E + - -
[33] MANO E2E + N/A N/A N/A N/A + - - + N/A N/A N/A
[34] NSOS E2E N/A N/A N/A + + - N/A N/A - - N/A N/A N/A
Orchest- Edge
[35] Edge - N/A N/A + N/A N/A N/A + N/A N/A - N/A N/A
ration system
methods SDN
[36] TN N/A N/A N/A + + + - N/A - N/A N/A N/A
archi
NFV
[37] Edge N/A N/A N/A + + N/A N/A + N/A N/A - - N/A
Orches
Orches
[38] Fog + N/A N/A N/A + - N/A N/A - N/A N/A N/A N/A
model
[39] MCORD TN + N/A N/A + N/A + N/A N/A - N/A N/A N/A N/A
[40] Mobility E2E - N/A - + N/A + N/A N/A N/A N/A N/A N/A N/A
Manage- [41] RM LTE N/A N/A N/A - N/A N/A N/A N/A N/A + N/A N/A N/A
ment [42] SM E2E + N/A N/A N/A N/A N/A N/A N/A + N/A - N/A N/A
methods [43] RM Edge N/A N/A - + N/A + N/A N/A N/A N/A - N/A N/A
[44] MM E2E N/A N/A N/A N/A N/A N/A N/A N/A N/A + - N/A N/A
[45] RM RAN N/A N/A N/A + + N/A N/A N/A N/A - - N/A
Markov
Manage- [46] E2E N/A N/A N/A + N/A + N/A N/A N/A N/A - - N/A
model
ment
Q-Learn-
based [47] E2E + N/A N/A + N/A - N/A N/A N/A N/A - N/A N/A
ing
AC
[48] STORNS RAN N/A N/A N/A + N/A - N/A N/A N/A + N/A N/A N/A
[49] Controller E2E + N/A N/A + N/A N/A N/A N/A N/A - N/A N/A N/A
LCM [50] LCM E2E + N/A N/A + N/A - N/A N/A N/A N/A - N/A N/A
methods [22] LCM RAN N/A N/A N/A + - N/A N/A N/A + N/A N/A N/A
RA
[51] Edge N/A N/A N/A N/A N/A N/A N/A + N/A N/A - N/A N/A
model
Branch
[52] TN N/A N/A N/A + N/A + N/A N/A + N/A - N/A N/A
RA Bound
methods [53] ILP E2E + - N/A N/A N/A + N/A N/A N/A N/A N/A N/A
[54] BSRA 2E2 N/A N/A N/A + N/A N/A N/A N/A N/A N/A - N/A N/A
[55] OFDMA RAN N/A N/A N/A N/A N/A - N/A N/A N/A N/A + N/A
[56] QCQP RAN + N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A - N/A
Radio
[57] RAN N/A N/A N/A + N/A - N/A N/A - N/A N/A N/A N/A
RA
[58] NES E2E N/A N/A N/A + N/A - N/A N/A N/A N/A N/A N/A N/A
RA [59] Auction E2E N/A + N/A N/A N/A N/A N/A N/A N/A - N/A N/A +
and [60] Auction E2E N/A N/A N/A + N/A - N/A N/A - N/A N/A N/A +
AC Optimiza-
[61] E2E N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A - N/A +
methods tion
[62] MSRAA E2E N/A N/A N/A + N/A N/A N/A N/A N/A N/A - N/A +
[63] scheme E2E N/A N/A N/A + N/A N/A N/A N/A N/A N/A - N/A N/A
[64] EVNFP VN - + N/A N/A - N/A N/A N/A N/A N/A N/A N/A +
VNFP [65] VDC DC N/A N/A N/A N/A N/A - N/A N/A N/A N/A N/A N/A +
and [66] Cost VN N/A N/A N/A + N/A - N/A N/A - N/A N/A N/A N/A
VNE Neural
[67] VN - N/A - N/A N/A + N/A N/A N/A + N/A N/A N/A
methods graph
Federated
[68] E2E + N/A N/A + N/A N/A N/A N/A N/A N/A N/A - -
system
Heuristic
[69] E2E N/A N/A N/A + N/A + N/A N/A + N/A - - N/A
algorithm
[71] SECaas E2E N/A N/A N/A N/A N/A N/A - N/A N/A N/A + N/A N/A
[72] GA E2E N/A N/A N/A N/A N/A N/A + N/A N/A N/A - N/A N/A
[73] Graph E2E N/A N/A N/A N/A N/A N/A N/A + - N/A N/A - N/A
Isolation
Secure
methods [74] Fog N/A N/A N/A + N/A N/A + - - N/A N/A N/A N/A
service
PPOA
[75] E2E N/A N/A N/A N/A N/A N/A + - N/A N/A N/A N/A N/A
PPMA
Naive
[76] E2E - N/A N/A + N/A + N/A N/A N/A N/A + N/A N/A
algorithm
Isolation
[77] RAN N/A N/A N/A N/A N/A N/A N/A + N/A N/A N/A - N/A
mode
+: Advantage, -:Limitation, N/A: Not Applicable

VOLUME 4, 2016 11
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

services on the same infrastructure that compose of diverse slice needs a significant effort to realize network slicing
equipment. The latest developments in NS are opening sev- efficiently. Also, other issues that need more explorations as
eral algorithmic challenges for future network operations: mobility management, security, and isolation between slices.
How can a slice be deployed and optimized to ensure the Several consistent policies and suitable mechanisms should
quality of service provided by the corresponding tenants and be clearly defined in each virtualization layer to achieve
services? How to share and allocate the physical resources, isolation.
taking into account the isolation property, to the different
slices? How to model the orchestration policies within every D. RAN VIRTUALIZATION AND SLICING
slice? Virtualization is the key technology for the implementation of
network slicing where the main challenges for infrastructure
A. NETWORK SLICE MANAGEMENT AND virtualization lie in the RAN subnet. Additionally, applying
ORCHESTRATION RAN slicing in a virtualized 5G environment is not yet
In 5G and beyond networks, SDN and NFV technolo- adaptable [78]. The problem is not adequately addressed by
gies contribute to the transition from hardware to software the application of containers such as VM-based solutions for
paradigms. This transition would entail improvements in RAN virtualization, because these solutions do not enhance
how networks are implemented, controlled, and managed. any virtualization dimension and radio resource isolation
Also, it requires new ways to orchestrate resources, to ensure (e.g. hardware). Although, multiple RATs (5G new radio
that on-demand based network functions are dynamically and NB-IoT) are expected to be a universal 5G networks
instantiated. In this context, the 5G NS architectures and standard. However, the greatest importance is the ability of
MANO framework provided in section III, address the vir- RAN virtualization to accommodate multiple RATs. This
tualized management and orchestration functionalities across requires RAN slicing strategies which can dynamically be
multiple domains. Despite these efforts, how to move from backing different slice criteria such as isolation and flexibly
the high-level service description to the concrete network enhance multiplexing benefits, in term of modularized RAN
slice is a significant challenge. This includes the creation configuration, the dynamic implementation of RAN and de-
of a specific domain of resource/service and development of composition of network service.
slicing languages to allow the expression of Key Performance
Indicators, specifications, and characteristics of 5G network E. MOBILITY AND NS MANAGEMENT
service. Mobility aspects such as interference management and seam-
less handover (caused by the increasing of diverse vertical
B. 5G NS RESOURCE ALLOCATION industries) bring new challenges to network slicing. 5G net-
Many current RA algorithms focus on a single subnet, such work slices need varying latency and mobility characteristics
as CN or RAN. On top of that, few researchers work on end to where the specification of mobility management and han-
end network slice. In [51], the communication and computing dover is distinct from the mobile broadband management
resources are abstracted for RA schemes. In practice, these slice. Generally, NS management is still difficult despite
resources are suitable for a particular type of network slice. In various technologies are included in their architecture levels
fact, the coordination of multiple subnets, sharing the phys- such as activate, maintain, load balance and isolation, as well
ical resources to the diverse slices taking into consideration as intra-slice and inter-slice resource sharing.
the properties of isolation and decomposition of SLA are the
main challenges of 5G NS RA. The tenant may only provide F. 5G NS SECURITY AND PRIVACY
an SLA to network slice management function without the In 5G network slicing, the notion of sharing resources be-
need for each subnet caused the lack of basic communication tween slices may create security problems. Network slices
knowledge. Thus, SLA decomposition for RA is still an provide diverse types of services for various verticals that can
inevitable step. Also, when updating the allocation scheme, require different levels of privacy policy and security. This
the coordination among multiple subnets well significant. calls for the new creation of security and privacy protocols for
5G network slicing that take into account the impact on the
C. 5G NETWORK SHARING AND SLICING desired slices and the allocation of resources into particular
The development of the network sharing concept to the slices as well as the entire network systems. Besides, as 5G
network slicing paradigm which allows the configuration network slicing is introduced in multidomain infrastructures,
of multiple VNFs on the same NFV platform, that creates security problems become much more complicated. Hence,
several large slice management problems. The resource shar- efficient mechanisms and security policy of communication
ing can be introduced by dynamic and partition sharing. between different administrative domains in 5G systems must
From the network load characteristics, the dynamic sharing be established and developed to address this issue.
of resources between slice tenants makes the use of network
resources more efficient, requires intelligent scheduling al- VI. CONCLUSION
gorithms. However, the inter-slice, intra-slice management, NS for 5G networks present a key solution to accomplish
slicing orchestration, and the placement of NFs within the its design principles are known as scalability and multi-
12 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

tenancy, fragmentation of administrative fields, as well as others, Network slicing to enable scalability and flexibility in 5G mobile
efficient orchestration of network functions and services. networks, IEEE Communications magazine, 72–79,2017.
[15] Vassilaras, Spyridon and Gkatzikis, Lazaros and Liakopoulos, Nikolaos
Several challenges associated to network slice management and Stiakogiannakis, Ioannis N and Qi, Meiyu and Shi, Lei and Liu,
and orchestration, 5G network sharing and slicing, RAN Liu and Debbah, Merouane and Paschos, Georgios S, The algorithmic
virtualization, mobility and NS management, 5G NS security aspects of network slicing,IEEE Communications Magazine, 112–119,
2017, IEEE.
and privacy. In addition to 5G NS RA can be considered as [16] Sharma, Sameerkumar and Miller, Raymond and Francini, Andrea, A
an interesting challenge. The NS RA scheme considered at cloud-native approach to 5G network slicing, IEEE Communications
different time scales (macro and micro). At the macro time Magazine, 120–127,2017,IEEE.
[17] Zhang, Haijun and Liu, Na and Chu, Xiaoli and Long, Keping and Agh-
scale, the physical resources are firstly shared between the vami, Abdol-Hamid and Leung, Victor CM, Network slicing based 5G and
slices based on their usage and requirements. At the micro future mobile networks: mobility, resource management, and challenges,
time scale, the efficient RA scheme encounter two depen- IEEE Communications Magazine, 138–145, 2017, IEEE.
dent problems as inter-slice (VNE) and intra-slice (Service [18] Katsalis, Kostas and Nikaein, Navid and Schiller, Eryk and Ksentini,
Adlen and Braun, Torsten, Network slices toward 5G communications:
Function Chaining (SFC)) problems. In our future work, we Slicing the LTE network, IEEE Communications Magazine, 146–154,
plan to focalize on how to share and allocate the physical 2017, IEEE.
resources to the diverse slices taking into consideration the [19] Li, Xi and Casellas, Ramon and Landi, Giada and de la Oliva, Antonio
and Costa-Perez, Xavier and Garcia-Saavedra, Andres and Deiss, Thomas
properties of isolation. and Cominardi, Luca and Vilalta, Ricard, 5G-crosshaul network slicing:
Enabling multi-tenancy in mobile transport networks, IEEE Communica-
tions Magazine,128–137, 2017,IEEE.
REFERENCES [20] Foukas, Xenofon and Patounas, Georgios and Elmokashfi, Ahmed and
[1] Dighriri, Mohammed and Alfoudi, Ali Saeed Dayem and Lee, Gyu My- Marina, Mahesh K, Network slicing in 5G: Survey and challenges, IEEE
oung and Baker, Thar, Data traffic model in machine to machine commu- Communications Magazine, 94–100, 2017.
nications over 5G network slicing, 2016 9th International Conference on [21] Kaloxylos, Alexandros, A survey and an analysis of network slicing in 5G
Developments in eSystems Engineering (DeSE), 239–244. networks, IEEE Communications Standards Magazine, 60–65, 2018.
[2] Shojafar, Mohammad and Sookhak, Mehdi, Internet of everything, net- [22] Zhang, Shunliang, An Overview of Network Slicing for 5G,IEEE Wireless
works, applications, and computing systems (IoENACS), 2020, Taylor & Communications, 2019.
Francis. [23] Xue, Xuwei and Wang, Fu and Agraz, Fernando and Pagès, Albert and
[3] Afolabi, Ibrahim and Taleb, Tarik and Samdanis, Konstantinos and Ksen- Pan, Bitao and Yan, Fulong and Guo, Xiaotao and Spadaro, Salvatore and
tini, Adlen and Flinck, Hannu, Network slicing and softwarization: A Calabretta, Nicola, SDN-controlled and Orchestrated OPSquare DCN En-
survey on principles, enabling technologies, and solutions,IEEE Commu- abling Automatic Network Slicing with Differentiated QoS Provisioning,
nications Surveys & Tutorials,2429–2453, 2018. Journal of Lightwave Technology, 1103–1112, 2020.
[4] Afolabi, Ibrahim and Ksentini, Adlen and Bagaa, Miloud and Taleb, Tarik [24] Marotta, A and Cassioli, D and Tornatore, M and Hirota, Y and Awaji,
and Corici, Marius and Nakao, Akihiro, Towards 5G network slicing over Y and Mukherjee, B, Reliable Slicing with Isolation in Optical Metro-
multiple-domains, IEICE Transactions on Communications,2017. Aggregation Networks, Optical Fiber Communication Conference, 2020,
[5] Tadros, Catherine Nayer and Rizk, Mohamed RM and Mokhtar, Bassem Optical Society of America.
Mahmoud, Software Defined Network-Based Management for Enhanced [25] ETSI NFV ISG, Network Function Virtualisation (NFV); Management
5G Network Services, IEEE Access, 53997–54008. and Orchestration; Report on architecture options to support multiple
[6] Yrjola, Seppo, Technology Antecedents of the Platform-Based Ecosys- administrative domains,ETSI GR NFV-IFA 028 V3.1.1, 2018.
temic Business Models beyond 5G, 2020 IEEE Wireless Communications [26] Taleb, Tarik and Afolabi, Ibrahim and Samdanis, Konstantinos and Yousaf,
and Networking Conference Workshops (WCNCW), 1–8. Faqir Zarrar, On Multi-domain Network Slicing Orchestration Architec-
[7] Hoglund, Andreas and Van, Dung Pham and Tirronen, Tuomas and Liberg, ture and Federated Resource Control, IEEE Network, 242–252,2019.
Olof and Sui, Yutao and Yavuz, Emre A, 3GPP Release 15 Early Data [27] Samdanis, Konstantinos and Costa-Perez, Xavier and Sciancalepore, Vin-
Transmission, IEEE Communications Standards Magazine, 90–96, 2018. cenzo, From network sharing to multi-tenancy: The 5G network slice
[8] Buyakar, Tulja Vamshi Kiran and Tamma, Bheemarjuna Reddy, Opera- broker, IEEE Communications Magazine, 32–39, 2016.
tional Aspects of Network Slicing in LTE and 5G Architectures, 2019, [28] 3GPP TS 28.530, Management of 5G networks and network slicing;
Indian institute of technology Hyderabad, 2019. Concepts, use cases and requirements, Release.15, Apr.2018.
[9] Barakabitze, Alcardo Alex and Ahmad, Arslan and Mijumbi, Rashid and [29] Kuklinski, Slawomir and Tomaszewski, Lechosaw, DASMO: A scalable
Hines, Andrew, 5G network slicing using SDN and NFV: A survey of approach to network slices management and orchestration, NOMS 2018-
taxonomy, architectures and future challenges, Computer Networks,2020, 2018 IEEE/IFIP Network Operations and Management Symposium, 1–
Elsevier. 6,2018.
[10] Kazmi, SM Ahsan and Khan, Latif U and Tran, Nguyen H and Hong, [30] Devlic, Alisa and Hamidian, Ali and Liang, Deng and Eriksson, Mats
Choong Seon, Network Slicing for 5G and Beyond Networks,2019, and Consoli, Antonio and Lundstedt, Jonas, NESMO: Network slicing
Springer. management and orchestration framework, IEEE International Conference
[11] Yousaf, Faqir Zarrar and Gramaglia, Marco and Friderikos, Vasilis and on Communications Workshops (ICC Workshops),1202–1208, 2017.
Gajic, Borislava and von Hugo, Dirk and Sayadi, Bessem and Sciancale- [31] Gutierrez-Estevez, David M and Dipietro, Nicola and Dedomenico, An-
pore, Vincenzo and Crippa, Marcos Rates Network slicing with flexible tonio and Gramaglia, Marco and Elzur, U and Wang, Y, 5G-MoNArch
mobility and QoS/QoE support for 5G Networks, 2017 IEEE International Use Case for ETSI ENI: Elastic Resource Management and Orchestration,
Conference on Communications Workshops (ICC Workshops),1195– IEEE Conference on Standards for Communications and Networking
1201, 2017, IEEE. (CSCN),2018.
[12] Su, Ruoyu and Zhang, Dengyin and Venkatesan, R and Gong, Zijun and Li, [32] Gutierrez-Estevez, David M and Gramaglia, Marco and De Domenico,
Cheng and Ding, Fei and Jiang, Fan and Zhu, Ziyang, Resource allocation Antonio and Dandachi, Ghina and Khatibi, Sina and Tsolkas, Dimitris
for network slicing in 5G telecommunication networks: A survey of and Balan, Irina and Garcia-Saavedra, Andres and Elzur, Uri and Wang,
principles and models, IEEE Network, 2019. Yue, Artificial intelligence for elastic management and orchestration of
[13] Abdelwahab, Sherif and Hamdaoui, Bechir and Guizani, Mohsen and 5G networks, IEEE Wireless Communications, 134–141,2019.
Znati, Taieb, Network function virtualization in 5G, IEEE Communica- [33] Trakadas, Panagiotis and Karkazis, Panagiotis and Leligou, Helen C and
tions Magazine, 84–91,2016. Zahariadis, Theodore and Vicens, Felipe and Zurita, Arturo and Alemany,
[14] Rost, Peter and Mannweiler, Christian and Michalopoulos, Diomidis S Pol and Soenen, Thomas and Parada, Carlos and Bonnet, Jose and others,
and Sartori, Cinzia and Sciancalepore, Vincenzo and Sastry, Nishanth and Comparison of Management and Orchestration Solutions for the 5G Era,
Holland, Oliver and Tayade, Shreya and Han, Bin and Bega, Dario and Journal of Sensor and Actuator Networks,2020.

VOLUME 4, 2016 13
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

[34] Afolabi, Ibrahim and Prados, Jonathan and Bagaa, Miloud and Taleb, [53] Fendt, Andrea and Lohmuller, Simon and Schmelz, Lars Christoph and
Tarik and Ameigeiras, Pablo, Dynamic resource provisioning of a scalable Bauer, Bernhard, A network slice resource allocation and optimization
E2E network slicing orchestration system, IEEE Transactions on Mobile model for end-to-end mobile networks, IEEE 5G World Forum (5GWF),
Computing, 2019. 262–267, 2018.
[35] Liu, Qiang and Han, Tao, VirtualEdge: Multi-Domain Resource Orches- [54] Kwak, Jeongho and Moon, Joonyoung and Lee, Hyang-Won and Le, Long
tration and Virtualization in Cellular Edge Computing, IEEE 39th Inter- Bao, Dynamic network slicing and resource allocation for heterogeneous
national Conference on Distributed Computing Systems (ICDCS), 1051– wireless services, IEEE 28th Annual International Symposium on Per-
1060, 2019. sonal, Indoor, and Mobile Radio Communications (PIMRC), 1–5,2017.
[36] Alvizu, Rodolfo and Troia, Sebastian and Nguyen, Van Minh and Maier, [55] Ma, Tengteng and Zhang, Yong and Wang, Fanggang and Wang, Dong and
Guido and Pattavina, Achille, Network Orchestration for Dynamic Net- Guo, Da, Slicing Resource Allocation for eMBB and URLLC in 5G RAN,
work Slicing for Fixed and Mobile Vertical Services, Optical Fiber Com- Wireless Communications and Mobile Computing, 2020.
munications Conference and Exposition (OFC), 2018. [56] Isolani, PH and Cardona, N and Donato, C and Perez, GA and Marquez-
[37] Khalili, Hamzeh and Papageorgiou, Apostolos and Siddiqui, Shuaib and Barja, JM and Granville, LZ and Latre, S, Airtime-Based Resource Al-
Colman-Meixner, Carlos and Carrozzo, Gino and Nejabati, Reza and location Modeling for Network Slicing in IEEE 802.11 RANs, IEEE
Simeonidou, Dimitra, Network Slicing-aware NFV Orchestration for 5G Communications Letters, 1077–1080,2020.
Service Platforms, European Conference on Networks and Communica- [57] Abiko, Yu and Saito, Takato and Ikeda, Daizo and Ohta, Ken and Mizuno,
tions (EuCNC), 25–30, 2019. Tadanori and Mineno, Hiroshi, Radio resource allocation method for net-
[38] Li, Yingyu and Huang, Anqi and Xiao, Yong and Ge, Xiaohu and work slicing using deep reinforcement learning, International Conference
Sun, Sumei and Chao, Han-Chieh, Federated Orchestration for Net- on Information Networking (ICOIN), 420–425, 2020.
work Slicing of Bandwidth and Computational Resource, arXiv preprint [58] Caballero, Pablo and Banchs, Albert and De Veciana, Gustavo and Costa-
arXiv:2002.02451, 2020. Perez, Xavier and Azcorra, Arturo, Network slicing for guaranteed rate
[39] Abbas, Muhammad Tahir and Khan, Talha Ahmed and Mahmood, Asif services: Admission control and resource allocation games, IEEE Trans-
and Rivera, Javier Jose Diaz and Song, Wang-Cheol, Introducing network actions on Wireless Communications, 6419–6432, 2018.
slice management inside m-cord-based-5g framework, 2018. [59] D’Oro, Salvatore and Galluccio, Laura and Mertikopoulos, Panayotis
[40] Celdran, Alberto Huertas and Perez, Manuel Gil and Clemente, Felix J and Morabito, Giacomo and Palazzo, Sergio, Auction-based resource
Garcia and Ippoliti, Fabrizio and Perez, Gregorio Martinez, Policy-based allocation in OpenFlow multi-tenant networks, Computer Networks,29–
network slicing management for future mobile communications, Fifth 41, 2017, Elsevier.
International Conference on Software Defined Systems (SDS), 153–159, [60] Jiang, Menglan and Condoluci, Massimo and Mahmoodi, Toktam, Net-
2018. work slicing in 5G: An auction-based model,2017 IEEE International
[41] Alfoudi, Ali Saeed Dayem and Newaz, SH Shah and Otebolaku, Abayomi Conference on Communications (ICC), 1–6.
and Lee, Gyu Myoung and Pereira, Rubem, An Efficient Resource Man-
[61] Wang, Gang and Feng, Gang and Tan, Wei and Qin, Shuang and Wen,
agement Mechanism for Network Slicing in a LTE Network, IEEE Access,
Ruihan and Sun, SanShan, Resource allocation for network slices in 5G
89441–89457, 2019.
with network resource pricing, GLOBECOM 2017-2017 IEEE Global
[42] Bordel, Borja and Alcarria, Ramon and Robles, Tomas and Sanchez-de-
Communications Conference, 1–6.
Rivera, Diego, Service management in virtualization-based architectures
[62] Buyakar, Tulja Vamshi Kiran and Agarwal, Harsh and Tamma, Bheemar-
for 5G systems with network slicing, Integrated Computer-Aided Engi-
juna Reddy and Franklin, A Antony, Resource Allocation with Admission
neering, 2020.
Control for GBR and Delay QoS in 5G Network Slices, 2020 International
[43] Jovsilo, Sladjana and Dan, Gyorgy, Joint Wireless and Edge Computing
Conference on COMmunication Systems & NETworkS (COMSNETS),
Resource Management with Dynamic Network Slice Selection, arXiv
213–220.
preprint arXiv:2001.07964, 2020.
[63] Khan, Humayun Zubair and Ali, Mudassar and Naeem, Muhammad and
[44] Mouawad, Nadia and Naja, Rola and Tohme, Samir, Inter-slice handover
Rashid, Imran and Siddiqui, Adil Masood and Imran, Muhammad and
management in a V2X slicing environment using bargaining games, Wire-
Mumtaz, Shahid, Resource Allocation and Throughput Maximization in
less Networks,1–21, 2020,Springer.
Decoupled 5G, 2020 IEEE Wireless Communications and Networking
[45] Khodapanah, Behnam and Awada, Ahmad and Viering, Ingo and Francis,
Conference (WCNC),1–6.
Jobin and Simsek, Meryem and Fettweis, Gerhard P, Radio Resource
Management in context of Network Slicing: What is Missing in Existing [64] Ghaznavi, Milad and Khan, Aimal and Shahriar, Nashid and Alsubhi,
Mechanisms?, IEEE Wireless Communications and Networking Confer- Khalid and Ahmed, Reaz and Boutaba, Raouf, Elastic virtual network
ence (WCNC), 2019. function placement, IEEE 4th International Conference on Cloud Net-
[46] Han, Bin and Feng, Di and Schotten, Hans D, A Markov model of slice working (CloudNet), 255–260, 2015.
admission control, IEEE Networking Letters, 2–5, 2018. [65] Wen, Xuemin and Han, Yanni and Yu, Bing and Chen, Xin and Xu,
[47] Bega, Dario and Gramaglia, Marco and Banchs, Albert and Sciancalepore, Zhen, Towards reliable virtual data center embedding in software defined
Vincenzo and Samdanis, Konstantinos and Costa-Perez, Xavier, Opti- networking, MILCOM 2016-2016 IEEE Military Communications Con-
mising 5G infrastructure markets: The business of network slicing,IEEE ference, 1059–1064, 2016.
INFOCOM 2017-IEEE Conference on Computer Communications, 1–9. [66] Khebbache, Selma and Hadji, Makhlouf and Zeghlache, Djamal, Scalable
[48] Sciancalepore, Vincenzo and Di Renzo, Marco and Costa-Perez, Xavier, and cost-efficient algorithms for VNF chaining and placement problem,
STORNS: Stochastic radio access network slicing, ICC 2019-2019 IEEE 20th Conference on Innovations in Clouds, Internet and Networks (ICIN),
International Conference on Communications (ICC), 1–7. 92–99, 2017.
[49] Han, Bin and Sciancalepore, Vincenzo and Costa-Perez, Xavier and Feng, [67] Mijumbi, Rashid and Hasija, Sidhant and Davy, Steven and Davy, Alan
Di and Schotten, Hans D, Multiservice-based Network Slicing Orchestra- and Jennings, Brendan and Boutaba, Raouf, Topology-aware prediction
tion with Impatient Tenants,IEEE Transactions on Wireless Communica- of virtual network function resource requirements, IEEE Transactions on
tions, 2020. Network and Service Management, 106–120, 2017.
[50] Boubendir, Amina and Guillemin, Fabrice and Kerboeuf, Sylvaine and Or- [68] Fantacci, Romano and Picano, Benedetta, When Network Slicing Meets
landi, Barbara and Faucheux, Frederic and Lafragette, Jean-Luc, Network Prospect Theory: A Service Provider Revenue Maximization Framework,
Slice Life-Cycle Management Towards Automation, IFIP/IEEE Sympo- IEEE Transactions on Vehicular Technology, 2020.
sium on Integrated Network and Service Management (IM), 709–711, [69] Ludwig, Katja and Fendt, Andrea and Bauer, Bernhard, An efficient
2019. online heuristic for mobile network slice embedding, 23rd Conference on
[51] Chien, Hsu-Tung and Lin, Ying-Dar and Lai, Chia-Lin and Wang, Chien- Innovation in Clouds, Internet and Networks and Workshops (ICIN), 139–
Ting, End-to-End Slicing as a Service with Computing and Communica- 143,2020.
tion Resource Allocation for Multi-Tenant 5G Systems, IEEE Wireless [70] Cheng, Xiang and Su, Sen and Zhang, Zhongbao and Wang, Hanchi and
Communications, 104–112, 2019. Yang, Fangchun and Luo, Yan and Wang, Jie, Virtual network embedding
[52] Li, Wenjing and Zi, Yueqi and Feng, Lei and Zhou, Fanqing and Yu, through topology-aware node ranking, ACM SIGCOMM Computer Com-
Peng and Qiu, Xuesong, Latency-Optimal Virtual Network Functions munication Review, 38–47, 2011.
Resource Allocation for 5G Backhaul Transport Network Slicing, Applied [71] Khettab, Yacine and Bagaa, Miloud and Dutra, Diego Leonel Cadette and
Sciences,2019. Taleb, Tarik and Toumi, Nassima, Virtual security as a service for 5G

14 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

verticals, IEEE Wireless Communications and Networking Conference LAMIA CHAARI FOURATI is a professor at
(WCNC), 1–6, 2018. Computer Science and Multimedia Higher Insti-
[72] Sathi, Vipin N and Srinivasan, Manikantan and Thiruvasagam, Prabhu tute and researcher at Laboratory of Technologies
K and Chebiyyam, Siva Ram Murthy, A Novel Protocol for Securing for Smart Systems (LT2S) at Sfax Digital Re-
Network Slice Component Association and Slice Isolation in 5G Net- search Center. She focused her research activities
works,Proceedings of the 21st ACM International Conference on Mod- on conception and validation of new protocols and
eling, Analysis and Simulation of Wireless and Mobile Systems,2018. mechanisms for emerging networks technologies.
[73] Kotulski, Zbigniew and Nowak, Tomasz Wojciech and Sepczuk, Mariusz
Her research activities are very important and up-
and Tunia, Marcin Alan, Graph-based quantitative description of networks
to-date which are related to digital telecommu-
slices isolation, Federated Conference on Computer Science and Informa-
tion Systems (FedCSIS), 369–379,2018. nication networks, in particular wireless access
[74] Ni, Jianbing and Lin, Xiaodong and Shen, Xuemin Sherman, Efficient and networks, sensor networks, vehicular networks, Internet of Things, 5G,
secure service-oriented authentication supporting network slicing for 5G- software defined network, information centric network and wireless body
enabled IoT, IEEE Journal on Selected Areas in Communications, 644– area network, unmanned aerial vehicle. In these areas, she is interested
657, 2018. in problems such as quality of services provisioning (congestion control,
[75] Sathi, Vipin N and Srinivasan, Manikantan and Thiruvasagam, Prabhu admission control, resources allocations), cyber security and ambient intel-
Kaliyammal and Murthy, Siva Ram, Novel Protocols to Mitigate Network ligence. Furthermore, she focused her research on applications that impact
Slice Topology Learning Attacks and Protect Privacy of Users’ Service positively our society such as healthcare domain, through the conception of
Access Behavior in Softwarized 5G Networks, IEEE Transactions on innovative protocols and mechanisms for health monitoring, remote systems,
Dependable and Secure Computing, 2020. the environmental control as well as energy saving approaches. Her scientific
[76] Boutigny, Francois and Betge-Brezetz, Stephane and Blanc, Gregory and publications have met the interest of the scientific community and her work
Lavignotte, Antoine and Debar, Herve and Jmila, Houda ,Solving security has been published in a very good journal and conferences. She has more
constraints for 5G slice embedding: A proof-of-concept, Computers & than 50 papers published in journals and more than 70 papers published in
Security, 2020.
conferences. Prof. Lamia CHAARI FOURATI is the laureate for the Kwame
[77] Kotulski, Zbigniew and Nowak, Tomasz W and Sepczuk, Mariusz and
Nkrumah Regional Awards for women 2016 (North Africa Region).
Tunia, Marcin A, 5G networks: Types of isolation and their parameters
in RAN and CN slices, Computer Networks, 2020,Elsevier.
[78] Elayoubi, Salah Eddine and Jemaa, Sana Ben and Altman, Zwi and
Galindo-Serrano, Ana, 5G RAN slicing for verticals: Enablers and chal-
lenges, IEEE Communications Magazine, 28–34, 2019.

ADLEN KSENTINI is a COMSOC distinguished


lecturer. He obtained his Ph.D. degree in computer
science from the University of Cergy-Pontoise in
2005, with a dissertation on QoS provisioning
FADOUA DEBBABI is a PhD student in the in IEEE 802.11-based networks. From 2006 to
Higher Institute of Computer Science and Com- 2016, he worked at the University of Rennes 1
munication Technologies of Hammam Sousse at as an assistant professor. During this period, he
the University of Sousse. She received the applied was a member of the Dionysos Team with INRIA,
license degree in Computer Science, Multimedia Rennes. Since March 2016, he has been working
and Web from the University of Sfax in 2014 and as an assistant professor in the Communication
Master degree of Enterprise System Engineering Systems Department of EURECOM. He has been involved in several na-
in January 2017. She received the bachelor’s de- tional and European projects on QoS and QoE support in future wireless, net-
gree in computer science in 2011 work virtualization, cloud networking, mobile networks, and more recently
on Network Slicing and 5G in the context of H2020 projects 5G!Pagoda,
5GTransformer, 5G!Drones and MonB5G. He has co-authored over 120
technical journal and international conference papers. He received the best
paper award from IEEE IWCMC 2016, IEEE ICC 2012, and ACM MSWiM
2005. He has been awarded the 2017 IEEE Comsoc Fred W. Ellersick
(best IEEE communications Magazine’s paper). Adlen Ksentini has given
several tutorials in IEEE international conferences, IEEE Globecom 2015,
IEEEE CCNC 2017, IEEE ICC 2017, IEEE/IFIP IM 2017. Adlen Ksentini
has been acting as TPC Symposium Chair for IEEE ICC 2016/2017, IEEE
RIHAB JMAL is a researcher at the Laboratory of GLOBECOM 2017, IEEE Cloudnet 2017 and IEEE 5G Forum 2018. He
Technologies for Smart Systems (LT2S) belonging has been acting as Guest Editor for IEEE Journal of Selected Area on
to the Digital Research Center of Sfax (CRNS), Communication (JSAC) Series on Network Softwerization, IEEE Wireless
Tunisia. She received the PhD degree in Com- Communications, IEEE Communications Magazine, and two issues of Com-
puter Systems Engineering from Sfax national en- Soc MMTC Letters. He has been on the Technical Program Committees
gineering school (ENIS) in 2018. She received the of major IEEE ComSoc, ICC/GLOBECOM, ICME, WCNC, and PIMRC
B.S. and M.S. degrees in Computing and Mul- conferences. He acted as the Director of IEEE ComSoc EMEA region and
timedia from the Higher Institute of Computer member of the IEEE Comsoc Board of Governor (2019-2020). He is the
and Multimedia of Sfax University in 2011 and chair of the IEEE ComSoc Technical Committee on Software (TCS).
2013, respectively. Her research interests include
multimedia, communications and networking which are specially related to
Video streaming, Software Defined Networking, Content Centric Networks
and IoT.

VOLUME 4, 2016 15

You might also like