Analysis of Access Strategies Impact on Infrastructure Provider’s Revenue in Case of Network Slicing

The article analyses the Network slicing concept and its features associated with the implementation of this technology in 5G networks. By network slicing, the authors mean the simultaneous use of a resource owned by an infrastructure provider by several tenants to provide users with services that m...

Full description

Bibliographic Details
Main Authors: Lyubov Lapshenkova, Faina Moskaleva, Yuliya Gaidamaka
Format: Article
Language:Russian
Published: The Fund for Promotion of Internet media, IT education, human development «League Internet Media» 2021-09-01
Series:Современные информационные технологии и IT-образование
Subjects:
Online Access:http://sitito.cs.msu.ru/index.php/SITITO/article/view/746
Description
Summary:The article analyses the Network slicing concept and its features associated with the implementation of this technology in 5G networks. By network slicing, the authors mean the simultaneous use of a resource owned by an infrastructure provider by several tenants to provide users with services that meet the quality of services requirements. The key difference between network slicing and the classical resource sharing concept is flexible resource allocation in accordance with the current tenant needs while strictly observing the isolation of slices, that is, protecting a slice of each tenant from load spikes in the slices of other tenants. The article presents a network slicing model that allows analyzing the impact of applying access control strategies and accept's policies on the average revenue of an infrastructure provider. Two access control strategies have been investigated - the re-slice of the resource by the infrastructure provider at each new user request (slicing on demand) and the re-slice at fixed time intervals (periodic slicing). For each access control strategy, two policies for accepting a request into the system are considered - accepting a request regardless of the revenue it will bring to the tenant ("Always Admit" policy), and accepting only those requests whose revenue exceeds a predetermined threshold ("Above Threshold" policy). For the constructed mathematical model of the process of slicing the radio resource of the network, a numerical experiment was carried out that illustrates the dependence of the average revenue of the infrastructure provider, the lost revenue of the infrastructure provider for slicing on demand and periodic slicing, on the structural and load parameters of the system, including the intensity of the incoming flow of requests in the system and on the system's capacity. The results of a numerical experiment are given in the conclusion in the form of recommendations for an infrastructure provider to determine the most profitable access control strategy and accept's policies.
ISSN:2411-1473