Publi 6337
Publi 6337
Publi 6337
ABSTRACT One of the key goals of future 5G networks is to incorporate many different services into a
single physical network, where each service has its own logical network isolated from other networks. In
this context, Network Slicing (NS)is considered as the key technology for meeting the service requirements
of diverse application domains. Recently, NS faces several algorithmic challenges for 5G networks. This
paper provides a review related to NS architecture with a focus on relevant management and orchestration
architecture across multiple domains. In addition, this survey paper delivers a deep analysis and a taxonomy
of NS algorithmic aspects. Finally, this paper highlights some of the open issues and future directions.
INDEX TERMS Network Slicing, Next-generation networking, 5G mobile communication, QoS, Multi-
domain, Management and Orchestration, Resource allocation.
VOLUME 4, 2016 1
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
TABLE 1: List of acronyms the basic concept of NS using the LTE network to show
NS Network slicing the usefulness of the proposed architecture by employing
5G Fifth-Generation the existing technological landscape. A novel architecture of
CN Core Network
QoS Quality of Service 5G transport network is proposed in [19]. This architecture
3GPP 3rd Generation Partnership Project incorporates the facets of resource virtualization, network
LTE Long Term Evolution Service Management (SM), and virtual infrastructure, in-
E2E End-to-End
SDN Software Defined Networking tegrating the European Telecommunications Standards In-
VNFs Virtual Network Functions stitute (ETSI) NFV management and network orchestration
QoE Quality of Experience (MANO) system with unified SDN based control.
VNE Virtual Network Embedding
ILP Integer Linear Program Nevertheless, to the best of our knowledge, there is no
ETSI European Telecommunications Standards Institute extensive and detailed survey paper focusing on the topic of
MANO Management and Orchestration NS algorithmic aspects. These works [15] [20] [3] [21] [22]
IaaS Infrastructure as a Service
VNF Virtual Network Function presents the algorithmic challenges rising from the emerging
RAN Radio Acess Network of NS but don’t cover the orchestration architecture across
UP User Plane multiple domains : (1) They provide a limited review related
CP Control Plane
BBU BaseBand Unit to MANO aspects; (2) There is no deep analysis of NS
EC Edge Caching algorithmic aspects except for the description of the NS
IoT Internet of Things optimization problems; (3) No comprehensive descriptions
UE User Experience
OPEX Operating Expenditure of Resource Allocation (RA) aspects; (4) There is no deep
CAPEX Capital Expenditure classification of NS related approaches. More specifically,
NSI Network Slice Instance FIGURE 3 illustrates a real comparison of existing works
OSS/BSS Operating/Business Support System
NSSI Network Slice Subnet Instances with our work. The purple color depict the common point
SLA Service Level Agreement between all works and different points are described briefly
CDN Content Delivery Network in the scheme. The main aim of our work is to give the reader
DASA Dynamic Auto-Scaling Algorithm
NSOS NS Orchestration System a deep vision of the NS algorithmic aspect. Additionally,
ONOS Open Network Operating System we depict a profound classification of proposed works in the
TN Transport Network literature. Our contributions are outlined as follows:
ENI Experiential Network Intelligence (ENI)
NSOS Network Slicing Orchestration System • Present the generic framework of NS architecture.
BSRA Bandwidth Slicing and Resource Allocation • Introduce the most relevant architecture of NS manage-
OFDMA Orthogonal Frequency Division Multiple Access ment and orchestration across multiple domains.
EVNFP Elastic Virtual Network Function Placement
VDC Virtual Data Centers • Discusse the 5G NS algorithmic aspect and depicts a
SECaas Security as a Service deep classification of different approaches.
Implicit Mutual Authentication and Key Establishment
IMAKE-GA
with Service Group Anonymity
PPOA Privacy-Preserving One-way Authentication III. NETWORK SLICING ARCHITECTURE
PPMA Privacy-Preserving Mutual Authentication A. GENERIC ARCHITECTURE OF NETWORK SLICING
SM Service Management Mobility management, virtualization of wireless infrastruc-
RM Resource Management
MM Mobility Management ture and orchestration of End-to-End (E2E) slices are chal-
RA Resource Allocation lenging issues of NS due to the massive variety of appli-
DC Data Center cations and services that require intelligent approaches and
VN Virtual Network
AC Admission Control algorithms. Recent 5G NS research focuses primarily on
OA Optimal Allocation solving issues through effective NS frameworks. FIGURE
4 highlights the generic architecture of 5G NS based on
the study provided in [20]. This architecture includes three
introduce a mobility management scheme between access main layers; infrastructure layer, network function layer, in
networks, potential and sub channel allocation scheme. Also, addition to the service layer.
they present a handover scheme for handover management The Infrastructure Layer: The infrastructure layer refers
between various networks, where the virtualized resource to the physical network infrastructure extends both the CN,
management is dynamically and efficiently responsible for the edge/cloud, and the RAN. Some software-defined tech-
the intra-slice and inter-slice allocation of network resources. niques [23] could be used in order to simplify the resource
A threefold of contributions is described in [18]: First, they abstraction within the RAN and CN. It also includes control,
devise a novel architecture service layer for solving the utiliz- management, deployment of the infrastructure, and the allo-
ing of agnostic architecture where this layer is liable for the cation of resources (radio, storage, computing, network) to
entire network slice Life Cycle Management (LCM). Second, the slices as well as how the higher layers report and handle
they introduce the idea of the Network Application Store these resources.
(NAS) to simplify the complicated procedure of delineating The Network function Layer:Performs all the operations
the network slice. Third, they describe the realization of and functionalities related to the configuration and life cycle
VOLUME 4, 2016 3
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
system. The paper of kuklinski [29] handles the NS man- traffic prediction, and unsupervised learning mechanism of
agement and orchestration scalability problem. The authors spectral clustering for efficient slice setup. Recently, authors
propose a Distributed Autonomous Slice Management and in [33] developed an innovative approach called SONATA
Orchestration (DASMO) aspect to solve this problem. In the for the MANO of each slice service, and compare it with the
sense of MANO orchestration, they use the orchestration most known open source frameworks as Cloudify and Open
concept and the classical term of slice management. The Source Mano (OSM).
MANO orchestration utilized for the runtime and lifecycle Essentially, the network slices are orchestrated to simplify
management of network slices, while the management used the business solutions for whole 5G vertical services and
for the runtime management of slices only. In [30] authors industries upon application providers. From the literature,
offer a novel MANO architecture framework. They present several works are suggested to address the orchestration
a management system to be used by operators to automate aspect. For instance, in [34] authors suggest a Dynamic
the design, delivery, and configuration of network slices in Auto-Scaling Algorithm (DASA) that is applied for a novel
various infrastructure resource domains that may include E2E NS Orchestration System (NSOS). They explain that
network functions from diverse vendors. Gutierrez et al. the NSOS relies on the basis of a hierarchical architecture.
[31] focus on a particular use case from the technological NSOS integrates dedicated entities per domain to handle
innovations of the 5G-MoNArch project. This project suits every segment of the mobile network from access to the
in the Experiential Network Intelligence (ENI) framework transport and core network component for a flexible fed-
through the combination of Artificial Intelligence (AI) en- erated network slices orchestration. The DASA allows the
dowed orchestration system and network management. In the NSOS to adjust its resources autonomously to changes in
same context of AI authors in [32] focus on three use cases the demand for slice orchestration requests (SORs), while
using particular Machine Learning (ML) algorithms, i.e. maintaining an average mean time required by the NSOS
drawing from a subset of the entire AI range of techniques, to to process each SOR. The DASA approach includes both
leverage the elasticity of resources. They propose an elastic reactive and proactive resource provisioning techniques. Au-
scheduler by applying deep learning for Signal to Noise Ratio thors in [35] present a VirtualEdge system that allows the
(SNR), reinforcement learning to make scheduling decisions, dynamic creation of a virtual node (vNode) to serve the
supervised learning for resource management established on workloads and the traffic of a network slice. This system
6 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
introduces a feasible orchestration and virtualization mul- network slice management framework of Transport Network
tidomain resources that provides isolation among network (TN) between core and access networks using Open Network
slices. Also, authors introduce a new learning-assisted al- Operating System (ONOS) and OpenStack. This framework
gorithm to effectively orchestrate multi-domain resources associates, creates and manages the slice up to the user
and establish heuristic algorithm to dynamically map virtual equipment (UE). Alberto et al. [40] suggest an information
resources to dependent physical resources. Rodolfo et al. [36] model of NS and a mobility management architecture that
present a network orchestration framework that is based on integrates SDN/NFV techniques. They introduce inventive
hybrid transport SDN Control Plane (CP) to afford dynamic components responsible for network slice orchestration and
NS for mobile metro core and enterprise networks. In [37], management. This architecture is designed to consider the
the authors establish how different virtualization solutions mobility of its components and the evolution of the dynamic
address NS. They propose an orchestration platform suitable scenarios. In [41] authors propose a novel mechanism of
for the 5GCity project. The solution includes the creation of NS resource management (RM) to allocate the resources
diverse network elements of slice such as physical networks, required for each slice of the LTE network, taking account
compute nodes, network edge resources, and radio parts of resource isolation between different slices. Also, the main
with coordinating various underlying controllers. Recently, objective of NS RM is to ensure that distributed bandwidths
in [38] authors propose a new distributed architecture based are isolated and fairly shared among users belonging to the
on a new federated-orchestrator control plane entity that can same slice. The paper of Bordel et al. [42] offers a new
manage the spectrum and computational resources without approach for the management and implementation of slices
needing any exchange of base station (BS) local data and and services in future 5G NS systems. This approach is based
resource information. TABLE 2 provides a summary and a on virtualization technologies (Docker or Kubernetes) and
fine-grained comparison of diverse 5G NS MANO methods. lightweight algorithms. Sladana et al. [43] present an NS
edge computing system that addresses the dynamic assign-
2) NS Management and Life Cycle Management Methods ment of computational resources to slices, management of
computing resources and radio within slices, and manage-
Due to the diversity of requirements and heterogeneity of
ment of the network across the slice. Moreover, they formu-
services, network management through SDN and NFV tech-
late the resource management and joint slice selection issues
nologies is a difficult task. Hence, an NS technique has
as a mixed-integer issue in order to reduce computational
been suggested to handle this challenge. Slice management
task accomplishment time. The paper [44] presents a mobility
is one of 5G network architecture’s key features that has
solution to address resource management by using games
attracted a lot of attention today. In [39] authors propose a
VOLUME 4, 2016 7
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
of negotiation. This solution is improved by a particular They propose also an empirical approximation of the matrix
and heuristic swarm optimization algorithm. Also, the au- transition status to decrease the computational complexity
thors propose a novel resource borrowing model to readjust of the practical applications. In [47] the authors present a
overloaded resources in case of an inter-slice handover. In NS theoretical model that is capable of the admissibility of
[45] authors discuss the existing mechanism that has similar the 5G network region. They develop an adaptive algorithm
functionality in legacy networks and illustrate the strengths based on Q-Learning to attain optimal efficiency . Also, they
and limitations of those specific mechanisms for managing suggest a semi-Markov system based on specif constraints to
Radio Resources (RR) in a sliced network. In addition, they optimize the infrastructure provider revenue. Sciancalepore
present new slice management to realize the protection of et al. [48] suggest a novel theoretical paradigm focused on
each slice. This mechanism is achieved through the limitation stochastic geometry theory to model practical RANs. This
of the number of users admitted by Admission Control (AC) paradigm taking advantage of business opportunities that
and adjust the part of radio resources allocation via the provide from NS. Also, they develop a new functional AC
Packet Scheduler (PC). They suggest an iterative algorithm system that makes decisions taking into account the average
to optimize the different parameters (AC, PC) to ensure the experienced throughput guaranteed per slice by SLA. Re-
SLA.The AC mechanism on the service broker layer is im- cently, authors in [49] focused on the AC issue by means of
portant for slice management. In this context authors in [46] a heterogeneous tenant request multi-queuing system. They
suggest a general model for AC asynchronous for a slice and derive the model of predictive behavior and define the logical
make out to be Markovian under a set of limited constraints. technique of tenants in queue planted slice AC system. Also,
8 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
they present an admission optimization utility model for using deep reinforcement learning. A deep comparison of the
network slices.Besides, several methods are existing from different RA works is highlighted in the TABLE 3.
the literature that tackles the Life Cycle Management (LCM)
of network slice. For instance, in [50] authors propose an 2) Resource Allocation and Admission Control
orchestration E2E method via managing their life cycle. This The aim of the AC module is to ensure that admitted
solution establishes the software modeling of resources as users have a reasonable likelihood to see their requirements
well as services and provides an overall view of architecture meeting rate over their lifetime, even after changes occur
that applied for different scenarios. Also, the paper of Zhang in the network. In the field of AC and RA, there are a
[22] presents a novel MANO slice that includes network significant set of existing methods that rely on the auction
slice instance life cycle management. The network slice life mechanism, which turns the optimization problem into a
cycle is divided into four phases; design, orchestration and game for instance [58] [59] [60] [61] [62] [63]. Authors
activation, Run-Time Assurance, and Decommissioning. in [58] focus on dynamic sharing in NS where the tenants
backing inelastic users with a floor requirements rate. They
B. NETWORK SLICING RESOURCE ALLOCATION propose a NS framework that combines AC, user dropping,
APPROACHES and resource allocation. Doro et al. [59] analyzes a multi-
1) NS Resource Allocation Methods tenant SDN auction-based scheme for allocating network
The 5G platforms are shared by various tenants, each tenant resources. In particular, a FlowVisor is presumed to control
has diverse service requirements that require several amounts the resource allocation process by conducting an auction
of resources from the lower layer (mobile edge, and radio of fractions of network resources analysis. Authors in [60]
access network) and the upper layer (central office and trans- present a novel auction-based model for shared resource and
port network) of the NS 5G architecture. Hence, the key revenue optimization. Wang et al. [61] studies the relation-
issue in 5G telecommunications networks is the NS RA, ship between profit maximization and resource efficiency and
which faces different challenges in terms of customization, examines the dimensioning of network slice based on the
separation, appropriate isolation, elasticity, and E2E coor- pricing policy of the resources. In addition, the authors evolve
dination; hence playing a key role in resource utilization, an optimization framework to maximize resource efficiency
networking performance and load balancing. Several studies and slice customer profit. Recently, authors in [62] suggest an
have been proposed in terms of NS RA [51] [52] [53] [54] MVNO Slice Resource Allocation Architecture (MSRAA)
[55] [56] [57]. Authors in [51] suggest an E2E framework for supports diverse slices of the 5G data plane network. They
slicing both communication resources and computing. The estimate the criteria of bandwidth requirements for the effi-
framework isolates successfully the resources between slices cient allocation of resources and propose an AC algorithm
and ensures that deployed slices resources are sufficient to to reallocate the resources from lower priority to higher
meet the tenant’s latency requirements. In [52] the authors priority slices. Authors in [63] analyze the down-link/ up-
propose a RA model to construct the relationship mapping link decoupled association scheme and formulate an AC and
between substrate and logical networks in a consistent way. power allocation problem for the macro base stations in terms
To enhance user experience and the quality of service (QoS), of the total rate maximization.
the RA problem is defined as a subject to the bandwidth
constraints and backhaul capacity. This problem is described 3) VNF Placements (VNFP) and Virtual Network Embedding
as an extended Virtual Network Embedding (VNE) problem (VNE) Methods
and formulated as an ILP, which is solved using ILP solvers Slices are represented in the form of VNF chains that runs on
such branch-and-bound scheme, CPLEX, and Gurobi. In the physical and logical resources to meet the service demands.
same context, Fendt et al. [53] present the VNE problem as a The essential idea of NS RA is to determine the feasible
directed graph for mobile network slice and developed the path onto network infrastructure for the deployment of the
connection between the user equipment and network slice virtual links. Ghaznavi et al. [64] discuss the dynamic VNF
via the telecommunication service. To address the dynamic placement methods and propose an Elastic VN Function
allocation of wireless resources (virtual base stations and cell Placement to minimize providing VNF services operational
slice), authors in [54] study the RA problem and bandwidth costs. Authors in [65] present two algorithms that aim to
slicing to support the mixing of IoT and video streaming minimize the cost of mapping chain and the cost embedding
services. Recently, authors in [55] propose a novel algorithm of CPU, memory, physical link, and the network resource
RA that allocates the NS by applying the branch and bound utilization rate. To address the objective of jointly maxi-
method, to obtaining the optimal solution. The paper of mizing the use of physical links and minimizing mapping
Isolani et al. [56] presents a novel airtime RA model for costs, Khebbache et al. [66] propose a scalable algorithm of
NS in IEEE 802.11 RAN. The authors formulate the issue placement and VNF chaining. By using a graphic algorithm
as Quadratically Constrained Quadratic Program (QCQP) in based on a neural network, authors in [67] present a topology-
which the system’s overall queueing delay is reduced while aware VNF embedding approach to reduce resource con-
maintaining strict URLLC constraints. In [57] the authors sumption. Recently, the authors in [68] develop a VNFs
suggest a radio RA that fulfills the service requirements placement strategy as a matching theory (MT) basis on the
VOLUME 4, 2016 9
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
forecasted customer requirements. This strategy performed authenticate a lot of devices. In this context, authors in [74]
by taking into consideration that various network zones are suggested a secure authentication method for enabled 5G
distinguished by different provision prices and costs. Katja et IoT devices. This method aims to guarantee the security of
al. [69] propose a network slice embedding method for the slice selection and access. In 5G networks, the use of static
allocation and assignment of network slice resources. This authentication protocols has two major issues: learning attack
heuristic approach meets the particular requirement based on and exposure of users service access behavior to third-party.
the algorithm provided in [70]. To tackle these issues, Sathi et al. [75] propose an anonymous
group Privacy-Preserving, One-way Authentication (PPOA)
and Mutual Authentication (PPMA) protocols. The resources
4) NS Isolation Methods
are distributed according to the requirements of the tenants,
The isolation technique is a fundamental feature of NS 5G not only in the provision of QoS but also the security. Authors
security, where several research papers have been done in in [76] propose an embedding aware-security slice enabling
this field. Khettab et al. [71] proposed intelligent security tenants to assert security-oriented demands, which limit the
based on an auto-scaling algorithm that leverages the SDN disclosure of information of network infrastructure provider.
and NFV architecture to enable slice security by using the Zbigniew et al. [77] propose multiple isolation parameters
SDN controller (ONOS). The proposed auto-scaling method and properties to enable quantitative and qualitative charac-
aims to guarantee the resource by checking for each slice the terization. Also, they present a flexible approach that enables
maximum and minimum resources at the orchestrator level. a particular isolation level for the E2E network slice.
For securing intra-slice network communications, a novel To deeply analyze the studied works for network slicing
protocol is proposed in [72]. The basis of this protocol is algorithmic aspects, we summarize in the TABLE 4 the
the bilinear pairing on the elliptic curve and the modification proposed methods, advantages and limitations of each work
of proxy re-encryption. Also, it offers mutual trust among with their related segment.
slice components in isolated manner. In [73] authors propose
a perceptible analysis of NS isolation as a framework of V. OPEN ISSUES AND FUTURE DIRECTIONS
a layered structure. Each layer of this framework has its 5G networks aim to integrate diverse services into a shared
isolation level and network elements, where the slice iso- infrastructure where each service has its own logical network
lation is calculated through mathematical rules. From the isolated from others. In this context, the emerging of Network
basis of IoT, a secure and efficient method is needed to Slicing considered as a technology to meet these various
10 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
VOLUME 4, 2016 11
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
services on the same infrastructure that compose of diverse slice needs a significant effort to realize network slicing
equipment. The latest developments in NS are opening sev- efficiently. Also, other issues that need more explorations as
eral algorithmic challenges for future network operations: mobility management, security, and isolation between slices.
How can a slice be deployed and optimized to ensure the Several consistent policies and suitable mechanisms should
quality of service provided by the corresponding tenants and be clearly defined in each virtualization layer to achieve
services? How to share and allocate the physical resources, isolation.
taking into account the isolation property, to the different
slices? How to model the orchestration policies within every D. RAN VIRTUALIZATION AND SLICING
slice? Virtualization is the key technology for the implementation of
network slicing where the main challenges for infrastructure
A. NETWORK SLICE MANAGEMENT AND virtualization lie in the RAN subnet. Additionally, applying
ORCHESTRATION RAN slicing in a virtualized 5G environment is not yet
In 5G and beyond networks, SDN and NFV technolo- adaptable [78]. The problem is not adequately addressed by
gies contribute to the transition from hardware to software the application of containers such as VM-based solutions for
paradigms. This transition would entail improvements in RAN virtualization, because these solutions do not enhance
how networks are implemented, controlled, and managed. any virtualization dimension and radio resource isolation
Also, it requires new ways to orchestrate resources, to ensure (e.g. hardware). Although, multiple RATs (5G new radio
that on-demand based network functions are dynamically and NB-IoT) are expected to be a universal 5G networks
instantiated. In this context, the 5G NS architectures and standard. However, the greatest importance is the ability of
MANO framework provided in section III, address the vir- RAN virtualization to accommodate multiple RATs. This
tualized management and orchestration functionalities across requires RAN slicing strategies which can dynamically be
multiple domains. Despite these efforts, how to move from backing different slice criteria such as isolation and flexibly
the high-level service description to the concrete network enhance multiplexing benefits, in term of modularized RAN
slice is a significant challenge. This includes the creation configuration, the dynamic implementation of RAN and de-
of a specific domain of resource/service and development of composition of network service.
slicing languages to allow the expression of Key Performance
Indicators, specifications, and characteristics of 5G network E. MOBILITY AND NS MANAGEMENT
service. Mobility aspects such as interference management and seam-
less handover (caused by the increasing of diverse vertical
B. 5G NS RESOURCE ALLOCATION industries) bring new challenges to network slicing. 5G net-
Many current RA algorithms focus on a single subnet, such work slices need varying latency and mobility characteristics
as CN or RAN. On top of that, few researchers work on end to where the specification of mobility management and han-
end network slice. In [51], the communication and computing dover is distinct from the mobile broadband management
resources are abstracted for RA schemes. In practice, these slice. Generally, NS management is still difficult despite
resources are suitable for a particular type of network slice. In various technologies are included in their architecture levels
fact, the coordination of multiple subnets, sharing the phys- such as activate, maintain, load balance and isolation, as well
ical resources to the diverse slices taking into consideration as intra-slice and inter-slice resource sharing.
the properties of isolation and decomposition of SLA are the
main challenges of 5G NS RA. The tenant may only provide F. 5G NS SECURITY AND PRIVACY
an SLA to network slice management function without the In 5G network slicing, the notion of sharing resources be-
need for each subnet caused the lack of basic communication tween slices may create security problems. Network slices
knowledge. Thus, SLA decomposition for RA is still an provide diverse types of services for various verticals that can
inevitable step. Also, when updating the allocation scheme, require different levels of privacy policy and security. This
the coordination among multiple subnets well significant. calls for the new creation of security and privacy protocols for
5G network slicing that take into account the impact on the
C. 5G NETWORK SHARING AND SLICING desired slices and the allocation of resources into particular
The development of the network sharing concept to the slices as well as the entire network systems. Besides, as 5G
network slicing paradigm which allows the configuration network slicing is introduced in multidomain infrastructures,
of multiple VNFs on the same NFV platform, that creates security problems become much more complicated. Hence,
several large slice management problems. The resource shar- efficient mechanisms and security policy of communication
ing can be introduced by dynamic and partition sharing. between different administrative domains in 5G systems must
From the network load characteristics, the dynamic sharing be established and developed to address this issue.
of resources between slice tenants makes the use of network
resources more efficient, requires intelligent scheduling al- VI. CONCLUSION
gorithms. However, the inter-slice, intra-slice management, NS for 5G networks present a key solution to accomplish
slicing orchestration, and the placement of NFs within the its design principles are known as scalability and multi-
12 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
tenancy, fragmentation of administrative fields, as well as others, Network slicing to enable scalability and flexibility in 5G mobile
efficient orchestration of network functions and services. networks, IEEE Communications magazine, 72–79,2017.
[15] Vassilaras, Spyridon and Gkatzikis, Lazaros and Liakopoulos, Nikolaos
Several challenges associated to network slice management and Stiakogiannakis, Ioannis N and Qi, Meiyu and Shi, Lei and Liu,
and orchestration, 5G network sharing and slicing, RAN Liu and Debbah, Merouane and Paschos, Georgios S, The algorithmic
virtualization, mobility and NS management, 5G NS security aspects of network slicing,IEEE Communications Magazine, 112–119,
2017, IEEE.
and privacy. In addition to 5G NS RA can be considered as [16] Sharma, Sameerkumar and Miller, Raymond and Francini, Andrea, A
an interesting challenge. The NS RA scheme considered at cloud-native approach to 5G network slicing, IEEE Communications
different time scales (macro and micro). At the macro time Magazine, 120–127,2017,IEEE.
[17] Zhang, Haijun and Liu, Na and Chu, Xiaoli and Long, Keping and Agh-
scale, the physical resources are firstly shared between the vami, Abdol-Hamid and Leung, Victor CM, Network slicing based 5G and
slices based on their usage and requirements. At the micro future mobile networks: mobility, resource management, and challenges,
time scale, the efficient RA scheme encounter two depen- IEEE Communications Magazine, 138–145, 2017, IEEE.
dent problems as inter-slice (VNE) and intra-slice (Service [18] Katsalis, Kostas and Nikaein, Navid and Schiller, Eryk and Ksentini,
Adlen and Braun, Torsten, Network slices toward 5G communications:
Function Chaining (SFC)) problems. In our future work, we Slicing the LTE network, IEEE Communications Magazine, 146–154,
plan to focalize on how to share and allocate the physical 2017, IEEE.
resources to the diverse slices taking into consideration the [19] Li, Xi and Casellas, Ramon and Landi, Giada and de la Oliva, Antonio
and Costa-Perez, Xavier and Garcia-Saavedra, Andres and Deiss, Thomas
properties of isolation. and Cominardi, Luca and Vilalta, Ricard, 5G-crosshaul network slicing:
Enabling multi-tenancy in mobile transport networks, IEEE Communica-
tions Magazine,128–137, 2017,IEEE.
REFERENCES [20] Foukas, Xenofon and Patounas, Georgios and Elmokashfi, Ahmed and
[1] Dighriri, Mohammed and Alfoudi, Ali Saeed Dayem and Lee, Gyu My- Marina, Mahesh K, Network slicing in 5G: Survey and challenges, IEEE
oung and Baker, Thar, Data traffic model in machine to machine commu- Communications Magazine, 94–100, 2017.
nications over 5G network slicing, 2016 9th International Conference on [21] Kaloxylos, Alexandros, A survey and an analysis of network slicing in 5G
Developments in eSystems Engineering (DeSE), 239–244. networks, IEEE Communications Standards Magazine, 60–65, 2018.
[2] Shojafar, Mohammad and Sookhak, Mehdi, Internet of everything, net- [22] Zhang, Shunliang, An Overview of Network Slicing for 5G,IEEE Wireless
works, applications, and computing systems (IoENACS), 2020, Taylor & Communications, 2019.
Francis. [23] Xue, Xuwei and Wang, Fu and Agraz, Fernando and Pagès, Albert and
[3] Afolabi, Ibrahim and Taleb, Tarik and Samdanis, Konstantinos and Ksen- Pan, Bitao and Yan, Fulong and Guo, Xiaotao and Spadaro, Salvatore and
tini, Adlen and Flinck, Hannu, Network slicing and softwarization: A Calabretta, Nicola, SDN-controlled and Orchestrated OPSquare DCN En-
survey on principles, enabling technologies, and solutions,IEEE Commu- abling Automatic Network Slicing with Differentiated QoS Provisioning,
nications Surveys & Tutorials,2429–2453, 2018. Journal of Lightwave Technology, 1103–1112, 2020.
[4] Afolabi, Ibrahim and Ksentini, Adlen and Bagaa, Miloud and Taleb, Tarik [24] Marotta, A and Cassioli, D and Tornatore, M and Hirota, Y and Awaji,
and Corici, Marius and Nakao, Akihiro, Towards 5G network slicing over Y and Mukherjee, B, Reliable Slicing with Isolation in Optical Metro-
multiple-domains, IEICE Transactions on Communications,2017. Aggregation Networks, Optical Fiber Communication Conference, 2020,
[5] Tadros, Catherine Nayer and Rizk, Mohamed RM and Mokhtar, Bassem Optical Society of America.
Mahmoud, Software Defined Network-Based Management for Enhanced [25] ETSI NFV ISG, Network Function Virtualisation (NFV); Management
5G Network Services, IEEE Access, 53997–54008. and Orchestration; Report on architecture options to support multiple
[6] Yrjola, Seppo, Technology Antecedents of the Platform-Based Ecosys- administrative domains,ETSI GR NFV-IFA 028 V3.1.1, 2018.
temic Business Models beyond 5G, 2020 IEEE Wireless Communications [26] Taleb, Tarik and Afolabi, Ibrahim and Samdanis, Konstantinos and Yousaf,
and Networking Conference Workshops (WCNCW), 1–8. Faqir Zarrar, On Multi-domain Network Slicing Orchestration Architec-
[7] Hoglund, Andreas and Van, Dung Pham and Tirronen, Tuomas and Liberg, ture and Federated Resource Control, IEEE Network, 242–252,2019.
Olof and Sui, Yutao and Yavuz, Emre A, 3GPP Release 15 Early Data [27] Samdanis, Konstantinos and Costa-Perez, Xavier and Sciancalepore, Vin-
Transmission, IEEE Communications Standards Magazine, 90–96, 2018. cenzo, From network sharing to multi-tenancy: The 5G network slice
[8] Buyakar, Tulja Vamshi Kiran and Tamma, Bheemarjuna Reddy, Opera- broker, IEEE Communications Magazine, 32–39, 2016.
tional Aspects of Network Slicing in LTE and 5G Architectures, 2019, [28] 3GPP TS 28.530, Management of 5G networks and network slicing;
Indian institute of technology Hyderabad, 2019. Concepts, use cases and requirements, Release.15, Apr.2018.
[9] Barakabitze, Alcardo Alex and Ahmad, Arslan and Mijumbi, Rashid and [29] Kuklinski, Slawomir and Tomaszewski, Lechosaw, DASMO: A scalable
Hines, Andrew, 5G network slicing using SDN and NFV: A survey of approach to network slices management and orchestration, NOMS 2018-
taxonomy, architectures and future challenges, Computer Networks,2020, 2018 IEEE/IFIP Network Operations and Management Symposium, 1–
Elsevier. 6,2018.
[10] Kazmi, SM Ahsan and Khan, Latif U and Tran, Nguyen H and Hong, [30] Devlic, Alisa and Hamidian, Ali and Liang, Deng and Eriksson, Mats
Choong Seon, Network Slicing for 5G and Beyond Networks,2019, and Consoli, Antonio and Lundstedt, Jonas, NESMO: Network slicing
Springer. management and orchestration framework, IEEE International Conference
[11] Yousaf, Faqir Zarrar and Gramaglia, Marco and Friderikos, Vasilis and on Communications Workshops (ICC Workshops),1202–1208, 2017.
Gajic, Borislava and von Hugo, Dirk and Sayadi, Bessem and Sciancale- [31] Gutierrez-Estevez, David M and Dipietro, Nicola and Dedomenico, An-
pore, Vincenzo and Crippa, Marcos Rates Network slicing with flexible tonio and Gramaglia, Marco and Elzur, U and Wang, Y, 5G-MoNArch
mobility and QoS/QoE support for 5G Networks, 2017 IEEE International Use Case for ETSI ENI: Elastic Resource Management and Orchestration,
Conference on Communications Workshops (ICC Workshops),1195– IEEE Conference on Standards for Communications and Networking
1201, 2017, IEEE. (CSCN),2018.
[12] Su, Ruoyu and Zhang, Dengyin and Venkatesan, R and Gong, Zijun and Li, [32] Gutierrez-Estevez, David M and Gramaglia, Marco and De Domenico,
Cheng and Ding, Fei and Jiang, Fan and Zhu, Ziyang, Resource allocation Antonio and Dandachi, Ghina and Khatibi, Sina and Tsolkas, Dimitris
for network slicing in 5G telecommunication networks: A survey of and Balan, Irina and Garcia-Saavedra, Andres and Elzur, Uri and Wang,
principles and models, IEEE Network, 2019. Yue, Artificial intelligence for elastic management and orchestration of
[13] Abdelwahab, Sherif and Hamdaoui, Bechir and Guizani, Mohsen and 5G networks, IEEE Wireless Communications, 134–141,2019.
Znati, Taieb, Network function virtualization in 5G, IEEE Communica- [33] Trakadas, Panagiotis and Karkazis, Panagiotis and Leligou, Helen C and
tions Magazine, 84–91,2016. Zahariadis, Theodore and Vicens, Felipe and Zurita, Arturo and Alemany,
[14] Rost, Peter and Mannweiler, Christian and Michalopoulos, Diomidis S Pol and Soenen, Thomas and Parada, Carlos and Bonnet, Jose and others,
and Sartori, Cinzia and Sciancalepore, Vincenzo and Sastry, Nishanth and Comparison of Management and Orchestration Solutions for the 5G Era,
Holland, Oliver and Tayade, Shreya and Han, Bin and Bega, Dario and Journal of Sensor and Actuator Networks,2020.
VOLUME 4, 2016 13
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
[34] Afolabi, Ibrahim and Prados, Jonathan and Bagaa, Miloud and Taleb, [53] Fendt, Andrea and Lohmuller, Simon and Schmelz, Lars Christoph and
Tarik and Ameigeiras, Pablo, Dynamic resource provisioning of a scalable Bauer, Bernhard, A network slice resource allocation and optimization
E2E network slicing orchestration system, IEEE Transactions on Mobile model for end-to-end mobile networks, IEEE 5G World Forum (5GWF),
Computing, 2019. 262–267, 2018.
[35] Liu, Qiang and Han, Tao, VirtualEdge: Multi-Domain Resource Orches- [54] Kwak, Jeongho and Moon, Joonyoung and Lee, Hyang-Won and Le, Long
tration and Virtualization in Cellular Edge Computing, IEEE 39th Inter- Bao, Dynamic network slicing and resource allocation for heterogeneous
national Conference on Distributed Computing Systems (ICDCS), 1051– wireless services, IEEE 28th Annual International Symposium on Per-
1060, 2019. sonal, Indoor, and Mobile Radio Communications (PIMRC), 1–5,2017.
[36] Alvizu, Rodolfo and Troia, Sebastian and Nguyen, Van Minh and Maier, [55] Ma, Tengteng and Zhang, Yong and Wang, Fanggang and Wang, Dong and
Guido and Pattavina, Achille, Network Orchestration for Dynamic Net- Guo, Da, Slicing Resource Allocation for eMBB and URLLC in 5G RAN,
work Slicing for Fixed and Mobile Vertical Services, Optical Fiber Com- Wireless Communications and Mobile Computing, 2020.
munications Conference and Exposition (OFC), 2018. [56] Isolani, PH and Cardona, N and Donato, C and Perez, GA and Marquez-
[37] Khalili, Hamzeh and Papageorgiou, Apostolos and Siddiqui, Shuaib and Barja, JM and Granville, LZ and Latre, S, Airtime-Based Resource Al-
Colman-Meixner, Carlos and Carrozzo, Gino and Nejabati, Reza and location Modeling for Network Slicing in IEEE 802.11 RANs, IEEE
Simeonidou, Dimitra, Network Slicing-aware NFV Orchestration for 5G Communications Letters, 1077–1080,2020.
Service Platforms, European Conference on Networks and Communica- [57] Abiko, Yu and Saito, Takato and Ikeda, Daizo and Ohta, Ken and Mizuno,
tions (EuCNC), 25–30, 2019. Tadanori and Mineno, Hiroshi, Radio resource allocation method for net-
[38] Li, Yingyu and Huang, Anqi and Xiao, Yong and Ge, Xiaohu and work slicing using deep reinforcement learning, International Conference
Sun, Sumei and Chao, Han-Chieh, Federated Orchestration for Net- on Information Networking (ICOIN), 420–425, 2020.
work Slicing of Bandwidth and Computational Resource, arXiv preprint [58] Caballero, Pablo and Banchs, Albert and De Veciana, Gustavo and Costa-
arXiv:2002.02451, 2020. Perez, Xavier and Azcorra, Arturo, Network slicing for guaranteed rate
[39] Abbas, Muhammad Tahir and Khan, Talha Ahmed and Mahmood, Asif services: Admission control and resource allocation games, IEEE Trans-
and Rivera, Javier Jose Diaz and Song, Wang-Cheol, Introducing network actions on Wireless Communications, 6419–6432, 2018.
slice management inside m-cord-based-5g framework, 2018. [59] D’Oro, Salvatore and Galluccio, Laura and Mertikopoulos, Panayotis
[40] Celdran, Alberto Huertas and Perez, Manuel Gil and Clemente, Felix J and Morabito, Giacomo and Palazzo, Sergio, Auction-based resource
Garcia and Ippoliti, Fabrizio and Perez, Gregorio Martinez, Policy-based allocation in OpenFlow multi-tenant networks, Computer Networks,29–
network slicing management for future mobile communications, Fifth 41, 2017, Elsevier.
International Conference on Software Defined Systems (SDS), 153–159, [60] Jiang, Menglan and Condoluci, Massimo and Mahmoodi, Toktam, Net-
2018. work slicing in 5G: An auction-based model,2017 IEEE International
[41] Alfoudi, Ali Saeed Dayem and Newaz, SH Shah and Otebolaku, Abayomi Conference on Communications (ICC), 1–6.
and Lee, Gyu Myoung and Pereira, Rubem, An Efficient Resource Man-
[61] Wang, Gang and Feng, Gang and Tan, Wei and Qin, Shuang and Wen,
agement Mechanism for Network Slicing in a LTE Network, IEEE Access,
Ruihan and Sun, SanShan, Resource allocation for network slices in 5G
89441–89457, 2019.
with network resource pricing, GLOBECOM 2017-2017 IEEE Global
[42] Bordel, Borja and Alcarria, Ramon and Robles, Tomas and Sanchez-de-
Communications Conference, 1–6.
Rivera, Diego, Service management in virtualization-based architectures
[62] Buyakar, Tulja Vamshi Kiran and Agarwal, Harsh and Tamma, Bheemar-
for 5G systems with network slicing, Integrated Computer-Aided Engi-
juna Reddy and Franklin, A Antony, Resource Allocation with Admission
neering, 2020.
Control for GBR and Delay QoS in 5G Network Slices, 2020 International
[43] Jovsilo, Sladjana and Dan, Gyorgy, Joint Wireless and Edge Computing
Conference on COMmunication Systems & NETworkS (COMSNETS),
Resource Management with Dynamic Network Slice Selection, arXiv
213–220.
preprint arXiv:2001.07964, 2020.
[63] Khan, Humayun Zubair and Ali, Mudassar and Naeem, Muhammad and
[44] Mouawad, Nadia and Naja, Rola and Tohme, Samir, Inter-slice handover
Rashid, Imran and Siddiqui, Adil Masood and Imran, Muhammad and
management in a V2X slicing environment using bargaining games, Wire-
Mumtaz, Shahid, Resource Allocation and Throughput Maximization in
less Networks,1–21, 2020,Springer.
Decoupled 5G, 2020 IEEE Wireless Communications and Networking
[45] Khodapanah, Behnam and Awada, Ahmad and Viering, Ingo and Francis,
Conference (WCNC),1–6.
Jobin and Simsek, Meryem and Fettweis, Gerhard P, Radio Resource
Management in context of Network Slicing: What is Missing in Existing [64] Ghaznavi, Milad and Khan, Aimal and Shahriar, Nashid and Alsubhi,
Mechanisms?, IEEE Wireless Communications and Networking Confer- Khalid and Ahmed, Reaz and Boutaba, Raouf, Elastic virtual network
ence (WCNC), 2019. function placement, IEEE 4th International Conference on Cloud Net-
[46] Han, Bin and Feng, Di and Schotten, Hans D, A Markov model of slice working (CloudNet), 255–260, 2015.
admission control, IEEE Networking Letters, 2–5, 2018. [65] Wen, Xuemin and Han, Yanni and Yu, Bing and Chen, Xin and Xu,
[47] Bega, Dario and Gramaglia, Marco and Banchs, Albert and Sciancalepore, Zhen, Towards reliable virtual data center embedding in software defined
Vincenzo and Samdanis, Konstantinos and Costa-Perez, Xavier, Opti- networking, MILCOM 2016-2016 IEEE Military Communications Con-
mising 5G infrastructure markets: The business of network slicing,IEEE ference, 1059–1064, 2016.
INFOCOM 2017-IEEE Conference on Computer Communications, 1–9. [66] Khebbache, Selma and Hadji, Makhlouf and Zeghlache, Djamal, Scalable
[48] Sciancalepore, Vincenzo and Di Renzo, Marco and Costa-Perez, Xavier, and cost-efficient algorithms for VNF chaining and placement problem,
STORNS: Stochastic radio access network slicing, ICC 2019-2019 IEEE 20th Conference on Innovations in Clouds, Internet and Networks (ICIN),
International Conference on Communications (ICC), 1–7. 92–99, 2017.
[49] Han, Bin and Sciancalepore, Vincenzo and Costa-Perez, Xavier and Feng, [67] Mijumbi, Rashid and Hasija, Sidhant and Davy, Steven and Davy, Alan
Di and Schotten, Hans D, Multiservice-based Network Slicing Orchestra- and Jennings, Brendan and Boutaba, Raouf, Topology-aware prediction
tion with Impatient Tenants,IEEE Transactions on Wireless Communica- of virtual network function resource requirements, IEEE Transactions on
tions, 2020. Network and Service Management, 106–120, 2017.
[50] Boubendir, Amina and Guillemin, Fabrice and Kerboeuf, Sylvaine and Or- [68] Fantacci, Romano and Picano, Benedetta, When Network Slicing Meets
landi, Barbara and Faucheux, Frederic and Lafragette, Jean-Luc, Network Prospect Theory: A Service Provider Revenue Maximization Framework,
Slice Life-Cycle Management Towards Automation, IFIP/IEEE Sympo- IEEE Transactions on Vehicular Technology, 2020.
sium on Integrated Network and Service Management (IM), 709–711, [69] Ludwig, Katja and Fendt, Andrea and Bauer, Bernhard, An efficient
2019. online heuristic for mobile network slice embedding, 23rd Conference on
[51] Chien, Hsu-Tung and Lin, Ying-Dar and Lai, Chia-Lin and Wang, Chien- Innovation in Clouds, Internet and Networks and Workshops (ICIN), 139–
Ting, End-to-End Slicing as a Service with Computing and Communica- 143,2020.
tion Resource Allocation for Multi-Tenant 5G Systems, IEEE Wireless [70] Cheng, Xiang and Su, Sen and Zhang, Zhongbao and Wang, Hanchi and
Communications, 104–112, 2019. Yang, Fangchun and Luo, Yan and Wang, Jie, Virtual network embedding
[52] Li, Wenjing and Zi, Yueqi and Feng, Lei and Zhou, Fanqing and Yu, through topology-aware node ranking, ACM SIGCOMM Computer Com-
Peng and Qiu, Xuesong, Latency-Optimal Virtual Network Functions munication Review, 38–47, 2011.
Resource Allocation for 5G Backhaul Transport Network Slicing, Applied [71] Khettab, Yacine and Bagaa, Miloud and Dutra, Diego Leonel Cadette and
Sciences,2019. Taleb, Tarik and Toumi, Nassima, Virtual security as a service for 5G
14 VOLUME 4, 2016
Fadoua et al.:Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey
verticals, IEEE Wireless Communications and Networking Conference LAMIA CHAARI FOURATI is a professor at
(WCNC), 1–6, 2018. Computer Science and Multimedia Higher Insti-
[72] Sathi, Vipin N and Srinivasan, Manikantan and Thiruvasagam, Prabhu tute and researcher at Laboratory of Technologies
K and Chebiyyam, Siva Ram Murthy, A Novel Protocol for Securing for Smart Systems (LT2S) at Sfax Digital Re-
Network Slice Component Association and Slice Isolation in 5G Net- search Center. She focused her research activities
works,Proceedings of the 21st ACM International Conference on Mod- on conception and validation of new protocols and
eling, Analysis and Simulation of Wireless and Mobile Systems,2018. mechanisms for emerging networks technologies.
[73] Kotulski, Zbigniew and Nowak, Tomasz Wojciech and Sepczuk, Mariusz
Her research activities are very important and up-
and Tunia, Marcin Alan, Graph-based quantitative description of networks
to-date which are related to digital telecommu-
slices isolation, Federated Conference on Computer Science and Informa-
tion Systems (FedCSIS), 369–379,2018. nication networks, in particular wireless access
[74] Ni, Jianbing and Lin, Xiaodong and Shen, Xuemin Sherman, Efficient and networks, sensor networks, vehicular networks, Internet of Things, 5G,
secure service-oriented authentication supporting network slicing for 5G- software defined network, information centric network and wireless body
enabled IoT, IEEE Journal on Selected Areas in Communications, 644– area network, unmanned aerial vehicle. In these areas, she is interested
657, 2018. in problems such as quality of services provisioning (congestion control,
[75] Sathi, Vipin N and Srinivasan, Manikantan and Thiruvasagam, Prabhu admission control, resources allocations), cyber security and ambient intel-
Kaliyammal and Murthy, Siva Ram, Novel Protocols to Mitigate Network ligence. Furthermore, she focused her research on applications that impact
Slice Topology Learning Attacks and Protect Privacy of Users’ Service positively our society such as healthcare domain, through the conception of
Access Behavior in Softwarized 5G Networks, IEEE Transactions on innovative protocols and mechanisms for health monitoring, remote systems,
Dependable and Secure Computing, 2020. the environmental control as well as energy saving approaches. Her scientific
[76] Boutigny, Francois and Betge-Brezetz, Stephane and Blanc, Gregory and publications have met the interest of the scientific community and her work
Lavignotte, Antoine and Debar, Herve and Jmila, Houda ,Solving security has been published in a very good journal and conferences. She has more
constraints for 5G slice embedding: A proof-of-concept, Computers & than 50 papers published in journals and more than 70 papers published in
Security, 2020.
conferences. Prof. Lamia CHAARI FOURATI is the laureate for the Kwame
[77] Kotulski, Zbigniew and Nowak, Tomasz W and Sepczuk, Mariusz and
Nkrumah Regional Awards for women 2016 (North Africa Region).
Tunia, Marcin A, 5G networks: Types of isolation and their parameters
in RAN and CN slices, Computer Networks, 2020,Elsevier.
[78] Elayoubi, Salah Eddine and Jemaa, Sana Ben and Altman, Zwi and
Galindo-Serrano, Ana, 5G RAN slicing for verticals: Enablers and chal-
lenges, IEEE Communications Magazine, 28–34, 2019.
VOLUME 4, 2016 15