scholarly journals Effects of Transport Network Slicing on 5G Applications

2021 ◽  
Vol 13 (3) ◽  
pp. 69
Author(s):  
Yi-Bing Lin ◽  
Chien-Chao Tseng ◽  
Ming-Hung Wang

Network slicing is considered a key technology in enabling the underlying 5G mobile network infrastructure to meet diverse service requirements. In this article, we demonstrate how transport network slicing accommodates the various network service requirements of Massive IoT (MIoT), Critical IoT (CIoT), and Mobile Broadband (MBB) applications. Given that most of the research conducted previously to measure 5G network slicing is done through simulations, we utilized SimTalk, an IoT application traffic emulator, to emulate large amounts of realistic traffic patterns in order to study the effects of transport network slicing on IoT and MBB applications. Furthermore, we developed several MIoT, CIoT, and MBB applications that operate sustainably on several campuses and directed both real and emulated traffic into a Programming Protocol-Independent Packet Processors (P4)-based 5G testbed. We then examined the performance in terms of throughput, packet loss, and latency. Our study indicates that applications with different traffic characteristics need different corresponding Committed Information Rate (CIR) ratios. The CIR ratio is the CIR setting for a P4 meter in physical switch hardware over the aggregated data rate of applications of the same type. A low CIR ratio adversely affects the application’s performance because P4 switches will dispatch application packets to the low-priority queue if the packet arrival rate exceeds the CIR setting for the same type of applications. In our testbed, both exemplar MBB applications required a CIR ratio of 140% to achieve, respectively, a near 100% throughput percentage with a 0.0035% loss rate and an approximate 100% throughput percentage with a 0.0017% loss rate. However, the exemplar CIoT and MIoT applications required a CIR ratio of 120% and 100%, respectively, to reach a 100% throughput percentage without any packet loss. With the proper CIR settings for the P4 meters, the proposed transport network slicing mechanism can enforce the committed rates and fulfill the latency and reliability requirements for 5G MIoT, CIoT, and MBB applications in both TCP and UDP.

Author(s):  
David Cortés-Polo ◽  
Jesús Calle-Cancho ◽  
Javier Carmona-Murillo ◽  
José-Luis González-Sánchez

In recent years, the growth the in the number of heterogeneous interconnected systems, as well as the emergence of new requirements in applications and services are progressively changing the original simplicity and transparency of the Internet architecture. When this architecture was designed, the main goal was to interconnect stationary host. Therefore, the appearance of mobile communications has made necessary to adapt traditional protocols in order to accommodate mobile users. This implies a new interaction between the mobile network and the fixed access network. This paper describes the main IP mobility protocols both centralized and distributed paradigms, and emergent approaches based on software defined networking. Moreover, a novel classification is presented, which relates the integration of the mobility protocol with the access network. Analytical models evaluate the registration updates cost and the packet loss rate of the classified protocols.


Author(s):  
David Cortés-Polo ◽  
Jose-Luis González-Sánchez ◽  
Francisco J. Rodríguez-Pérez ◽  
Javier Carmona-Murillo

In recent years, the growth the in number of heterogeneous interconnected systems, as well as the emergence of new requirements in applications and services are progressively changing the original simplicity and transparency of the Internet architecture. When this architecture was designed, the main goal was to interconnect stationary host. Therefore, the appearance of mobile communications has made necessary to adapt traditional protocols in order to accommodate mobile users. This implies a new interaction between the mobile network and the fixed access network. This chapter describes the main IP mobility protocols and presents a novel classification, which relates the integration of the mobility protocol with the access network. The chapter also presents analytical models to evaluate the registration updates cost and the packet loss rate of the classified protocols.


2008 ◽  
Vol 19 (10) ◽  
pp. 2762-2769 ◽  
Author(s):  
Wei-Dong YANG ◽  
Jian-Feng MA ◽  
Ya-Hui LI

2005 ◽  
Vol 51 (1-2) ◽  
pp. 77-87
Author(s):  
Stephen L. Spitler ◽  
Daniel C. Lee

2021 ◽  
Author(s):  
Zhekang Li ◽  
Rentao Gu ◽  
Huixia Ding ◽  
Duanyun Chen ◽  
Delong Yang ◽  
...  

2021 ◽  
pp. 1-12
Author(s):  
Yinghua Feng ◽  
Wei Yang

In order to overcome the problems of high energy consumption and low execution efficiency of traditional Internet of things (IOT) packet loss rate monitoring model, a new packet loss rate monitoring model based on differential evolution algorithm is proposed. The similarity between each data point in the data space of the Internet of things is set as the data gravity. On the basis of the data gravity, combined with the law of gravity in the data space, the gravity of different data is calculated. At the same time, the size of the data gravity is compared, and the data are classified. Through the classification results, the packet loss rate monitoring model of the Internet of things is established. Differential evolution algorithm is used to solve the model to obtain the best monitoring scheme to ensure the security of network data transmission. The experimental results show that the proposed model can effectively reduce the data acquisition overhead and energy consumption, and improve the execution efficiency of the model. The maximum monitoring efficiency is 99.74%.


Author(s):  
Dimitrios Koukopoulos

In this chapter, the author views trust as the confidence in the association of a stable network execution to the efficient distribution of multimedia products in the final user. A network is stable under a greedy protocol (or a composition of protocols) if, for any adversary of injection rate less than 1, the number of packets in the network remains bounded at all times. The author focuses on a basic adversarial model for packet arrival and path determination for which the time-averaged arrival rate of packets requiring a single edge is no more than 1. Within this framework, the author studies the property of stability under various compositions of contention-resolution protocols and different packet trajectories trying to characterize this property in terms of network topologies. Furthermore, the author enhances the adversary allowing the monitoring of network link capacities/slowdowns. Within this context, the author shows how the stability properties of network topologies change when network link slowdowns/capacities can change dynamically. Interestingly, his results indicate that a composition of protocols leads to worst stability behaviour than having a single unstable protocol for contention-resolution. This suggests that the potential for instability incurred by the composition of protocols may be worse than that of some single protocol. Consequently, this study could help on the design and maintainance of trustworthy heterogeneous multimedia systems.


Sign in / Sign up

Export Citation Format

Share Document