| Literature DB >> 35528711 |
Giorgia M Cappello1, Gabriella Colajanni1, Patrizia Daniele1, Daniele Sciacca1.
Abstract
In this paper, we present a multi-tiered network-based optimization model describing the provision of services by network slices of 5G-Service providers (e.g. through Unmanned Aerial Vehicles (UAVs) organized as Flying Ad hoc Networks (FANET)), taking into account the security levels of each provider. The three levels of the network consist of the infrastructure layers, which contain resources needed to execute a service, the slices layer, where services are served for the services layer, which represents the upper layer of the network and consists of services or applications required by users or devices. The objective of the proposed model is to establish the optimal flows between network layers and the optimal security levels in order to maximize the providers' profits, given by the difference between the revenues obtained by the sale of services and the rental of their resources and the costs. Numerical experiments are performed and solved with a new nature-inspired genetic algorithm adapted to the optimization 5G network problem.Entities:
Keywords: 5G Network slicing; Constrained optimization; Cybersecurity; Modified genetic algorithm
Year: 2022 PMID: 35528711 PMCID: PMC9062877 DOI: 10.1007/s00500-022-07117-5
Source DB: PubMed Journal: Soft comput ISSN: 1432-7643 Impact factor: 3.732
Fig. 1Network Topology
Parameters for the model
| Notation | Parameters |
|---|---|
| The request for service | |
| The request of exclusive customers for service | |
| The quantity of available resource | |
| The maximum capacity of slice | |
| The quantity of resource | |
| The limited budget of provider |
Fig. 2Detailed representation of the network: variables, transmission and rental cost functions
Fig. 3Detailed representation of the network: security levels, investment cost functions and financial damages
Coefficients for resources transmission/transport cost functions
| 0.1 | 0.1 | 0.9 | 0.9 | ||
| 0.2 | 0.2 | 0.7 | 0.7 | ||
| 0.5 | 0.5 | 0.45 | 0.45 | ||
| 0.1 | 0.1 | 0.35 | 0.35 | ||
Fig. 4Transport/transmission costs, rental costs, and utilization/execution cost
Fig. 5Transport/transmission costs of resources from providers to slices
Fig. 6Utilization/execution costs incurred by each provider to use/execute all his resources ()
Fig. 7Mean Relative Percent Deviation varying
Fig. 9Computational Time of Selection, Crossover and Mutation
Fig. 8Computational times varying
Fig. 10Comparison between the solutions obtained with the new heuristic and the optimal ones
Fig. 11Comparison between the objective functions obtained with the new heuristic and the optimal ones
Fig. 12Comparison between the solutions obtained with the new heuristic and the optimal ones varying the flow of requests