Towards Tailored Resource Allocation of Slices in 6G Networks With Softwarization and Virtualization

Haotong Cao, Jianbo Du, Haitao Zhao, Xiapu Luo, Neeraj Kumar, Longxiang Yang, F. Richard Yu

Research output: Journal article publicationJournal articleAcademic researchpeer-review

57 Citations (Scopus)

Abstract

Compared with 5G networks, 6G networks are guaranteed to provide various tailored end-to-end network services and emerging cloud-edge applications. Network slicing (NS) is regarded as the key enabler of 6G networks. Softwarization and virtualization technologies, such as software-defined networking and network function virtualization, are accelerating the way toward NS of 6G networks. The resource allocation issue in 6G NS is very crucial, worthy more research attention. In this article, we propose one efficient resource allocation algorithm, labeled as TailoredSlice-6G, so as to realize the tailored slices in 6G. When receiving one slice request, our TailoredSlice-6G will identify the slice resource type in the first place. Then, our TailoredSlice-6G will select its most suitable subalgorithm to do the resource allocation and slicing deployment. Each type of slice corresponds to its specific resource allocation subalgorithm, inserted in the TailoredSlice-6G algorithm. In addition, each subalgorithm in TailoredSlice-6G is guaranteed to run within polynomial time. Thus, TailoredSlice-6G having the potential to be promoted to real networking application. To highlight the merits of TailoredSlice-6G, we do the comprehensive simulation. Simulation results vividly reveal that our TailoredSlice-6G outperforms the selected heuristics that are representative in the literature.
Original languageEnglish
Pages (from-to)6623 - 6637
JournalIEEE Internet of Things Journal
Volume9
Issue number9
Early online date10 Sept 2021
DOIs
Publication statusPublished - 1 May 2022

Fingerprint

Dive into the research topics of 'Towards Tailored Resource Allocation of Slices in 6G Networks With Softwarization and Virtualization'. Together they form a unique fingerprint.

Cite this