{"title":"A Nested Decomposition Model for Reliable NFV 5G Network Slicing","authors":"Brigitte Jaumard;Quang Huy Duong","doi":"10.1109/TNSM.2023.3303388","DOIUrl":null,"url":null,"abstract":"With the 5th generation of mobile networking (5G) on our doorstep, optical network operators are reorganizing their network infrastructure to deploy different topologies (virtual networks/applications) on the same network infrastructure on demand. This new paradigm, called network slicing, can be enabled by segmenting the network resources based on the requirements of the application level. This paper investigates a nested decomposition mathematical modeling to design a reliable 5G network slicing problem, i.e., every virtual path is protected against any single link failures by a dedicated backup disjoint virtual path. This new modeling revises and improves some previously proposed decomposition models. Then, we propose a column generation algorithm to solve the new modeling exactly. Moreover, this paper provides the computation of dual bounds with Lagrangian relaxation to assess the solutions’ accuracy that many existing nested-decomposition applications have omitted. Extensive computational results show that we can get \n<inline-formula> <tex-math>$\\varepsilon $ </tex-math></inline-formula>\n-optimal reliable 5G slicing solutions with small \n<inline-formula> <tex-math>$\\varepsilon $ </tex-math></inline-formula>\n (about 2% on average) in fairly reasonable computational times. In addition, we also propose several acceleration schemes using parallel programming to reduce computational time. The experimental results show that the slice-based scheme outperforms the path-based one in terms of parallelism.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"20 3","pages":"2186-2200"},"PeriodicalIF":4.7000,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network and Service Management","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10265246/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the 5th generation of mobile networking (5G) on our doorstep, optical network operators are reorganizing their network infrastructure to deploy different topologies (virtual networks/applications) on the same network infrastructure on demand. This new paradigm, called network slicing, can be enabled by segmenting the network resources based on the requirements of the application level. This paper investigates a nested decomposition mathematical modeling to design a reliable 5G network slicing problem, i.e., every virtual path is protected against any single link failures by a dedicated backup disjoint virtual path. This new modeling revises and improves some previously proposed decomposition models. Then, we propose a column generation algorithm to solve the new modeling exactly. Moreover, this paper provides the computation of dual bounds with Lagrangian relaxation to assess the solutions’ accuracy that many existing nested-decomposition applications have omitted. Extensive computational results show that we can get
$\varepsilon $
-optimal reliable 5G slicing solutions with small
$\varepsilon $
(about 2% on average) in fairly reasonable computational times. In addition, we also propose several acceleration schemes using parallel programming to reduce computational time. The experimental results show that the slice-based scheme outperforms the path-based one in terms of parallelism.
期刊介绍:
IEEE Transactions on Network and Service Management will publish (online only) peerreviewed archival quality papers that advance the state-of-the-art and practical applications of network and service management. Theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. These transactions will focus on the key technical issues related to: Management Models, Architectures and Frameworks; Service Provisioning, Reliability and Quality Assurance; Management Functions; Enabling Technologies; Information and Communication Models; Policies; Applications and Case Studies; Emerging Technologies and Standards.