The demand for faster, lower-latency wireless cellular connection is growing exponentially each year. Traditionally, all network resources have been owned by a single entity. However, softwarization and virtualization of the radio access network (RAN) of next-generation (5G) wireless systems are leading to applications and services becoming physically decoupled from devices and network infrastructure. This decoupling can enable the dynamic deployment of heterogeneous services by different network operators over the same physical infrastructure. RAN slicing is a virtualization technology that partitions radio resources into multiple autonomous virtual networks, to allow network infrastructure providers (IPs) to dynamically allocate their network resources (i.e., spectrum, power, antennas, among others) to different mobile virtual network operators (MVNOs), according to their current needs. RAN slicing can be tailored to provide diverse performance requirements.
The technology described herein provides a mechanism that enables and enforces Radio Access Network (RAN) slicing in virtualized 5G and other networks. The technology allows the efficient sharing of a physical network infrastructure among multiple MVNOs. Each MVNO is assigned a “slice” of network spectrum resources according to a slicing policy, which can be allocated and/or revoked by a network infrastructure provider. The technology provides a RAN slicing enforcement problem (RSEP) that is mathematically formalized and several approximation solutions to the RSEP are provided by which the spectrum resources can be allocated to each MVNO. The techniques can render the solution scalable as the RSEP increases in size.
Features of the technology include:
1. A method of allocating radio access network (RAN) spectrum resources among a plurality of mobile virtual network operators (MVNOs) of a network of base stations, each base station operative to transmit and receive signals over a coverage area, comprising:
(a) determining a slicing enforcement policy comprising assigning a set of one or more resource blocks (RBs) to each MVNO according to a slicing policy in which each MVNO is allocated an amount of the spectrum resources on at least one base station in a determined time span, each resource block including a number of available frequency units and time slots of the spectrum resources, subject to minimizing interference between each MVNO's set of RBs with another MVNO's set of RBs on an interfering base station, wherein adjacent base stations are interfering when coverage areas of the adjacent base stations overlap; and
(b) allocating the resource blocks of the spectrum resources to each MVNO based on the slicing enforcement policy.
2. The method of feature 1, wherein step (a) further comprises:
assigning to at least one of the MVNOs a plurality of linked RBs, wherein the linked RBs have a same frequency unit and a same time slot in interfering base stations; and
maximizing a number of linked RBs assigned to a same MVNO on interfering base stations.
3. The method of any of features 1-2, wherein step (a) further comprises:
generating a set of slicing profiles for each of the MVNOs and the plurality of base stations, the slicing profile comprising the amount of the spectrum resources to allocated to each MVNO on each base station in a determined time span; and maximizing a number of linked RBs for each MVNO from a set of feasible slicing enforcement policies, wherein the linked RBs have a same frequency unit and a same time slot in interfering base stations.
4. The method of any of features 1-3, wherein step (a) further comprises:
generating a RAN slicing enforcement problem (RSEP) comprising determining a feasible slicing enforcement policy that maximizes a total number of linked RBs allocated to MVNOs that request a highest amount of resource blocks on multiple interfering base stations, wherein the linked RBs have a same frequency unit and a same time slot in interfering base stations; and assigning the RBs to the MVNOs according to the RSEP.
5. The method of any of features 1-4, wherein generating the RSEP further comprises maximizing a number of linked RBs for each MVNO based on a selected binary resource block allocation indicator x, wherein x=1 for each resource block that has been allocated to a particular MVNO, subject to ensuring that all MVNOs receive an assigned number of resource blocks and that each resource block is allocated to only one MVNO.
6. The method of any of features 1-5, wherein generating the RSEP further comprises maximizing a number of linked RBs for each MVNO based on a selected resource block allocation indicator x, wherein x is approximated by a linear relaxation so that 0≤x≤1 for each resource block that has been allocated to a particular MVNO, subject to ensuring that all MVNOs receive an assigned number of resource blocks and that each resource block is allocated to only one MVNO.
7. The method of any of features 1-6, wherein generating the RSEP further comprises:
generating a linking index for each MVNO based on a size of a request by each MVNO for resource blocks on multiple interfering base stations; and
allocating resource blocks in sequential order starting with an MVNO with a highest linking index.
8. The method of any of features 1-7, further comprising:
generating a RB allocation matrix of allocated RBs having rows corresponding to base stations;
removing a row with a smallest number of distinct MVNOs;
swapping elements of the RB allocation matrix;
updating the RB allocation matrix if a total number of linked RBs is increased.
9. The method of any of features 1-8, wherein generating the RSEP further comprises aggregating RBs into a group if a number of RBs or a number of time slots T are proportional to a greatest common divisor of all elements in a slicing profile matrix L of amounts of resources allocable to each MVNO on each base station in a determined time span.
10. The method of any of features 1-9, wherein generating the RSEP further comprising determining non-zero entries of matrices of elements representing interfering base station, a number of RBs, a number of time slots and a number of MVNOs.
11. The method of any of features 1-10, wherein step (a) further comprises maximizing a number of simultaneous transmissions on different base stations by any one or more of the MVNOs.
12. The method of any of features 1-11, wherein step (a) further comprises allocating the spectrum resources according to a transmission strategy implemented by one or more of the MVNOs, the transmission strategy comprising one or more of an inter-base-station power control scheme, a multiple-input multiple output scheme, a coordinated multi-point scheme, a joint transmission scheme, and coordinated beamforming.
13. The method of any of features 1-12, wherein step (a) further comprises allocating the spectrum resources according to requests from the MVNOs.
14. The method of any of features 1-13, wherein step (a) further comprises determining the slicing enforcement policy subject to minimizing overlap between each MVNO's set of RBs with another MVNO's set of RBs on a same base station.
15. A system of allocating radio access network (RAN) spectrum resources among a plurality of mobile virtual network operators (MVNOs) of a network of base stations, each base station operative to transmit and receive signals over a coverage area, comprising:
a computer system comprising one or more processors and memory, and machine-readable instructions stored in the memory that upon execution by the one or more processors cause the system to carry out operations comprising the method of any of features 1-14.
16. A system of allocating radio access network (RAN) spectrum resources among a plurality of mobile virtual network operators (MVNOs) of a network of base stations, each base station operative to transmit and receive signals over a coverage area, comprising:
a computer system comprising one or more processors and memory, and machine-readable instructions stored in the memory that upon execution by the one or more processors cause the system to carry out operations comprising:
(a) determining a slicing enforcement policy comprising assigning a set of one or more resource blocks (RBs) to each MVNO according to a slicing policy in which each MVNO is allocated an amount of the spectrum resources on at least one base station in a determined time span, each resource block including a number of available frequency units and time slots of the spectrum resources, subject to minimizing interference between each MVNO's set of RBs with another MVNO's set of RBs on an interfering base station, wherein adjacent base stations are interfering when coverage areas of the adjacent base stations overlap; and
(b) allocating the resource blocks of the spectrum resources to each MVNO based on the slicing enforcement policy.
17. The system of feature 16, wherein step (a) further comprises:
assigning to at least one of the MVNOs a plurality of linked RBs, wherein the linked RBs have a same frequency unit and a same time slot in interfering base stations; and
maximizing a number of linked RBs assigned to a same MVNO on interfering base stations.
18. The system of any of features 16-17, wherein step (a) further comprises:
generating a set of slicing profiles for each of the MVNOs and the plurality of base stations, the slicing profile comprising the amount of the spectrum resources to allocated to each MVNO on each base station in a determined time span; and
maximizing a number of linked RBs for each MVNO from a set of feasible slicing enforcement policies, wherein the linked RBs have a same frequency unit and a same time slot in interfering base stations.
19. The system of any of features 16-18, wherein step (a) further comprises:
generating a RAN slicing enforcement problem (RSEP) comprising determining a feasible slicing enforcement policy that maximizes a total number of linked RBs allocated to MVNOs that request a highest amount of resource blocks on multiple interfering base stations, wherein the linked RBs have a same frequency unit and a same time slot in interfering base stations; and
assigning the RBs to the MVNOs according to the RSEP.
20. The system of any of features 16-19, wherein generating the RSEP further comprises maximizing a number of linked RBs for each MVNO based on a selected binary resource block allocation indicator x, wherein x=1 for each resource block that has been allocated to a particular MVNO, subject to ensuring that all MVNOs receive an assigned number of resource blocks and that each resource block is allocated to only one MVNO.
21. The system of any of features 16-20, wherein generating the RSEP further comprises maximizing a number of linked RBs for each MVNO based on a selected resource block allocation indicator x, wherein x is approximated by a linear relaxation so that 0≤x≤1 for each resource block that has been allocated to a particular MVNO, subject to ensuring that all MVNOs receive an assigned number of resource blocks and that each resource block is allocated to only one MVNO.
22. The system of any of features 16-21, wherein generating the RSEP further comprises:
generating a linking index for each MVNO based on a size of a request by each MVNO for resource blocks on multiple interfering base stations; and
allocating resource blocks in sequential order starting with an MVNO with a highest linking index.
23. The system of any of features 16-22, further comprising:
generating a RB allocation matrix of allocated RBs having rows corresponding to base stations;
removing a row with a smallest number of distinct MVNOs;
swapping elements of the RB allocation matrix;
updating the RB allocation matrix if a total number of linked RBs is increased.
24. The system of any of features 16-23, wherein generating the RSEP further comprises aggregating RBs into a group if a number of RBs or a number of time slots T are proportional to a greatest common divisor of all elements in a slicing profile matrix L of amounts of resources allocable to each MVNO on each base station in a determined time span.
25. The system of any of features 16-24, wherein generating the RSEP further comprising determining non-zero entries of matrices of elements representing interfering base station, a number of RBs, a number of time slots and a number of MVNOs.
26. The system of any of features 16-25, wherein step (a) further comprises maximizing a number of simultaneous transmissions on different base stations by any one or more of the MVNOs.
27. The system of any of features 16-26, wherein step (a) further comprises allocating the spectrum resources according to a transmission strategy implemented by one or more of the MVNOs, the transmission strategy comprising one or more of an inter-base-station power control scheme, a multiple-input multiple output scheme, a coordinated multi-point scheme, a joint transmission scheme, and coordinated beamforming.
28. The system of any of features 16-27, wherein step (a) further comprises allocating the spectrum resources according to requests from the MVNOs.
29. The system of any of features 16-28, wherein step (a) further comprises determining the slicing enforcement policy subject to minimizing overlap between each MVNO's set of RBs with another MVNO's set of RBs on a same base station.
The technology described herein provides methods and systems of allocating radio access network (RAN) spectrum resources among a plurality of mobile virtual network operators (MVNOs). The technology provides a radio access network (RAN) slicing approach in which physical network infrastructure is shared among multiple MVNOs, each one in charge of a separate “slice” of the network, which can be assigned and/or revoked by the infrastructure provider (IP) or other network owner (NO) according to the IP's current slicing policy. RAN slicing addresses a problem in which spectrum is a scarce resource for which over-provisioning is not possible, and interference jeopardizes isolation across slices belonging to different MVNOs, thus resulting in performance degradation if not handled properly. However, existing one-size-fits-all resource allocation policies cannot sustain the need for dynamic, effective and efficient radio access strategies, where network operators need to make the best use of the extremely limited spectrum bands available for commercial usage.
The present technology provides RAN slicing techniques or strategies that can partition radio resources so as to leverage coordination among multiple base stations and thus boost network throughput. The RAN slicing techniques can reduce interference across different slices to provide slice isolation and avoid or minimize performance degradation.
Once the RAN slices have been defined for each MVNO, the spectrum resources, also called resource blocks (RBs), can be divided and allocated according to what is prescribed by the slicing policy. For example, if an MVNO has been assigned a slice of 15% of the spectrum resources, such MVNO should receive approximately 15% of the available RBs. Thus, RAN slicing enforcement algorithms are provided to implement in practice the IP's slicing policy. Moreover, to be effective, RAN slicing enforcement algorithms can facilitate interference-mitigating strategies such as inter-base-station power control (IBSPC), multiple-in multiple-out (MIMO), and coordinated multi-point (CoMP) schemes such as Joint Transmission (JT). However, since such schemes require tight cooperation and coordination among different base stations (BSs), the technology described herein can further provide effective and efficient slicing enforcement algorithms to guarantee that the same or similar in time/frequency RBs are assigned to the same MVNOs when BSs are close enough to interfere among themselves.
To illustrate this point, consider a cellular network scenario as depicted in
The present technology can address the problem of physical-level allocation of spectrum resources to MVNOs. The technology provides slicing enforcement methods and systems that can address one or more of the following:
In contrast to prior work that provides high-level orchestration platforms that virtualize the available resources to create pools of resources that are then shared and allocated among the MVNOs, the present technology, instead, can provide a fine-grained and low-level control of physical-layer resources that enables 5G technologies such as MIMO, Coordinated Multi-Point (CoMP) and beamforming transmissions through interference mitigation and optimal resource allocation algorithms.
The technology can provide RAN resource allocation with one or more of the following: (i) it satisfies MVNOs requests, (ii) it enforces orthogonality by reducing inter-MVNO interference, and (iii) it enables advanced communication techniques such as CoMP and coordinated beamforming by maximizing the number of simultaneous MVNO transmissions on different base stations. More particularly, a formulation of the RAN slicing enforcement problem (RSEP) is provided where interference among different MVNOs is reduced through orthogonal allocation of physical-layer resources, thus effectively improving network performance in terms of throughput and signal-to-noise ratio (SNR) or signal-to-interference-plus-noise ratio (SINR). The RSEP is formulated as an integer linear problem (ILP) where the number of physical-layer resources with zero inter-MVNO interference is maximized and all MVNOs receive the or at least a minimum amount of requested resources.
The technology provides methods and systems that can be automated and can dynamically adapt to traffic and data patterns. Accordingly, they can 1) find the most profitable allocation of network resources and avoid inefficiencies; and 2) enable advanced communication technologies that provide better QoS levels to network users.
The technology can provide efficient and effective management and allocation of network slices in 5G networks. It can provide for the allocation of physical-layer resources to enable the implementation of various transmission strategies, such as inter-base-station power control (IBSPC), coordinate multi-point (CoMP), multi-input multiple output (MIMO), joint transmission (JT), and coordinated beamforming transmissions. It can facilitate development of a network slicing platform for rapid and flexible network slice generation. It can provide network slicing for Internet of Things (IoT), 3G, 4G and WiFi networks, and/or millimeter wave applications.
The present technology provides a formulation of the RAN slicing enforcement problem (RSEP) that can (i) satisfy MVNOs' requests, (ii) enforce orthogonality by reducing inter-MVNO interference, and (iii) enable advanced communication techniques such as CoMP and coordinated beamforming by maximizing the number of simultaneous MVNO transmissions on different BSs. It shows how to implement a deployment of RAN slices on top of the underlying physical network, which is not addressed by solutions that use a variety of theoretical tools, such as optimization, auctions, and game theory. The present technology can be effective in scenarios where a more fine-grained control of physical-layer resources is desirable, for example, to enable IBSPC, CoMP and beamforming transmissions, in contrast to high-level orchestration platforms that virtualize the available resources to create pools of resources that are then shared and allocated among the MVNOs. The technology can be applied in multi-cell networks where MNVOs request different amounts of resources on different BSs. The present technology provides algorithms to enforce slicing policies to maximize network efficiency while considering interference among BSs when allocating RBs.
The present technology can provide methods and systems of allocating radio access network (RAN) spectrum resources among a plurality of mobile virtual network operators (MVNOs) of a network of base stations, each base station operative to transmit and receive signals over a coverage area, comprising: (a) determining a slicing enforcement policy comprising assigning a set of one or more resource blocks (RBs) to each MVNO according to a slicing policy in which each MVNO is allocated an amount of the spectrum resources on at least one base station in a determined time span, each resource block including a number of available frequency units and time slots of the spectrum resources, subject to minimizing interference between each MVNO's set of RBs with another MVNO's set of RBs on an interfering base station, wherein adjacent base stations are interfering when coverage areas of the adjacent base stations overlap; and (b) allocating the resource blocks of the spectrum resources to each MVNO based on the slicing enforcement policy.
As described further below, the present technology describes and evaluates RAN slicing enforcement algorithms and methods that address the challenges noted above. In particular, Section I provides a system model overview. Section II provides a formulation of the RAN slicing enforcement problem (RSEP). Section III provides solutions to the RSEP. An optimal solution, termed RSEP-QP, is described in Section III-A and shown to be NP-hard. An approximated solution of RSEP-QP, termed RSEP-EQ, is described in Section III-B. A first heuristic algorithm, termed RSEP-MLF, is described in Section III-C and a second heuristic algorithm, termed RSEP-IMLF, an improvement on RSEP-MLF, is described in Section III-D. In Section III-E, it is shown that the execution time of both RSEP-QP and RSEP-EQ can be further reduced under specific conditions by solving an equivalent problem leveraging properties of sparsity and RB aggregation. The performance of the described methods and systems is evaluated through simulations and experiments described in Section IV.
Consider the RAN shown in
The RAN is administered by an IP, who periodically rents virtual RAN slices built on top of the underlying physical network to a set ={1, 2, . . . , M} of M MVNOs. Without loss of generality, assume RAN slices are valid for T time slots. This way, slow-changing networks (e.g., cellular networks in rural areas during nighttime) can be modeled with large values of T, while small values of T can be used to model fast-changing networks (e.g., urban areas during daytime).
b
In line with 5G NR and LTE standards, spectrum resources are represented as RBs, where each RB represents a minimum scheduling unit. Also considered is an OFDMA channel access scheme where RBs are organized as a time-frequency resource grid, with NRB subcarriers and T temporal time slots. Thus, the set of available resources at each BS is , with =NRB·T, where each RB in can be represented as a 2-tuple (n,t) with n=1, 2, . . . , NRB and t=1, 2, . . . , T.
The interaction between MVNOs and the IP can be summarized with reference to
Regarding point (iii) specifically, it is shown how the IP can compute an efficient slicing enforcement policy π that can satisfy one or more of the challenges described above, for example, enabling of advanced technologies, isolation or orthogonality, and feasibility or contract compliance.
For any given slicing profile L and BS b, the subset b⊆ of MVNOs that include BS b in their RAN slice can be identified as b={m ∈:Lm,b>0}.
Let xm,b,n,t∈{0, 1} be the RB allocation indicator such that xm,b,n,t=1 if RB (n, t)∈ is allocated to MVNO m, xm,b,n,t=0 otherwise. Also, let π=(πb)b∈ be the slicing enforcement policy, where πb=(πm,b)m∈M and πm,b represents the set of RBs on BS b that are allocated to MVNO m. In more detail, for any RB (n, t)∈, then (n, t)∈πm,b⇔xm,b,n,t=1. Hence, the set Π of all feasible slicing enforcement policies π can be defined as:
Π={π=(πm,b)m∈,b∈:|πm,b|=Lm,b∧πm,b∩πm′,b=∅∀m≠m′,m,m′∈,b∈} (1)
To properly formulate the RSEP, linked RBs are defined as follows:
Linked RBs indicate those RBs that have been assigned to the same MVNO on adjacent BSs. Specifically, a linked RB allows the corresponding MVNO to simultaneously access a specific spectrum portion in the same time slot from two or more BSs.
This feature is relevant because (i) MVNOs can use linked RBs to enable advanced transmission schemes (e.g., distributed beamforming, MIMO, CoMP transmissions, power control) among nearby BSs; (ii) as shown in
Maximization of the number of simultaneously linked RBs can address the challenges identified above. Leveraging the concept of linked RBs, for each MVNO m, the number of linked RBs associated to interfering BSs b and b′, i.e., yb,b′=1, is defined as follows:
n
b,b′,m=b,b′·|πm,b∩πm,b′|, (2)
where the relationship πb,b′, m=nb′,b,m always holds for all b, b′∈ and m∈.
For each MVNO m∈, the total number Nm of linked RBs on the corresponding RAN slice under policy L is
where the ½ factor is introduced to avoid double counting the same RBs.
The RSEP is formally defined as follows:
Thus, an objective in Problem RSEP is to compute a feasible slicing enforcement policy π that maximizes the total number of linked RBs while guaranteeing that the computed policy does not violate the feasibility constraint π∈Π. Moreover, as can be seen in
To solve Problem RSEP, a slicing enforcement policy is computed by exploring the feasible set H. In the following, (i) Problem RSEP is reformulated by using the RB allocation indicators introduced in Section II; (ii) the problem is shown to be NP-hard; and (iii) a number of techniques are provided to address Problem RSEP.
By using the definition of the RB allocation indicator xm,b,n,t and from (1), (3) can be reformulated as
Consider the matrices B=Y⊗IN
where x=(xm,b,n,t)m,b,n,t can be represented as a MBNRBT×1 column array.
In Problem RSEP-QP, Constraint (C1) ensures that all MVNOs receive the assigned number of RBs, while Constraint (C2) guarantees that each RB is allocated to one MVNO only. Finally, Constraint (C3) expresses the boolean nature of the RB allocation indicator. Problems RSEP and RSEP-QP are equivalent, as the latter is a reformulation of the former in terms of the RB allocation indicator. However, this new formulation shows that the RSEP can be modeled as a 0-1 (or binary) Quadratic Programming (QP) problem. Theorem 1 proves that Problem RSEP-QP is NP-Hard.
Proof: It is sufficient to show that the matrix Q is indefinite, i.e., it admits both positive and negative eigenvalues. Indeed, it is well-known that even real-valued non-binary QP problems are NP-hard when Q is indefinite.
From the definition of B and Y, matrix Q has all zero entries in the main diagonal. Accordingly, Q is a zero-diagonal (or hollow) symmetric matrix. Let λ be the set of eigenvalues of Q. Notice that Σλi∈λλi=Tr{Q}, and Tr{Q}=0 in this case. Thus, all the eigenvalues of Q must sum up to zero, meaning that either all eigenvalues are equal to zero, or Q has both positive and negative eigenvalues. Thanks to the symmetry of Q, the former case can be excluded, since it would imply that Q is the zero-matrix (i.e., there is no interference among BSs and yb,b′=0 for all b, b′∈). Therefore, Q must have both positive and negative eigenvalues, i.e., Q is indefinite. This proves the theorem.
Since Problem RSEP-QP is NP-hard, in Section III-B, linear relaxation and the concept of equivalence are leveraged to provide a reduced-complexity solution to Problem RSEP-QP, while in Section III-C and D, heuristic techniques are provided that can compute a sub-optimal solution to Problem RSEP-QP with polynomial complexity.
Let V=M·B·NRB·T, and consider the following transformed version of Problem RSEP-QP:
where λ∈ is a real-valued parameter whose relevance to Problem RSEP-EQ is explained in Theorem 2, and eT=(1, 1, . . . , 1). The following theorem holds.
Theorem 2. There exists λ∈ such that Problem RSEP-EQ is equivalent to Problem RSEP-QP. Also, let z* be the largest (positive) eigenvalue of Q. For any λ≥−z*, Problem RSEP-EQ is a quadratic convex problem over the unit hypercube.
Proof: Intuitively, the utility function in Problem RSEP-EQ introduces the term kxT(e−x) which generates a cost, or a penalty, proportional to λ when constraint xm,b,n,t∈{0, 1} is not satisfied. Accordingly, the binary constraint in Constraint (C3) can be dropped and relaxed with the unit hypercube constraint 0≤xm,b,n,t≤1. Notice that Q contains only 0-1 entries and xm,b,n,t≤1, which implies that xTQx is always bounded and finite. Also, xTQx has continuous and bounded first-order derivatives over the unit hypercube, i.e., it is Lipschitz-continuous in any open set that contains the unit hypercube. From Giannessi and Tardella, Th. 3.1, it must exist λ0∈ such that ∀λ≥λ0 Problems RSEP-EQ and RSEP-QP are equivalent. (F. Giannessi and F. Tardella, Connections between Nonlinear Programming and Discrete Optimization. Springer US, 1999, pp. 149-188.) Theorem 1 provides that the Q matrix admits both negative and positive eigenvalues. Accordingly, let z be the set of eigenvalues of Q and z*=max{z1, z2, . . . , z|z|}. It is possible to show that if λ≥z*, then the matrix Q+2λIV is positive semi-definite. Thus, Problem RSEP-EQ is convex if λ≥z*, which proves the Theorem.
Remarks. Theorem 2 shows that it is possible to relax the binary constraint of Problem RSEP-QP with a penalty term. In general, local and global solutions of convex quadratic maximization problems (and the corresponding concave quadratic minimization problems) lie on the vertices of the feasibility set. Since the vertex space is considerably smaller than the complete feasibility set Π, Problem RSEP-EQ is easier to solve when compared to Problem RSEP-QP. Specifically, approaches such as cutting plane and extreme point ranking methods can be used to efficiently solve Problem RSEP-EQ.
Although Problem RSEP-EQ has lower complexity than Problem RSEP-QP, in the worst case it still requires exponential time with respect to the number of vertices. Therefore, a polynomial solution to Problem RSEP-QP can be provided by using a heuristic approach.
Given Problem RSEP-QP maximizes the number of shared RBs, as many linked RBs as possible can be allocated to those MVNOs that request the highest amount of RBs on multiple interfering BSs. Indeed, MVNOs that request the greatest number of resources on different interfering BSs are also expected to produce a high number of linked RBs. Accordingly, for each MVNO m the linking index lm is defined as
The linking index is used to sequentially allocate RBs to those MVNOs with the highest linking index. This procedure is termed the Most Linked First (MLF) procedure, which can be implemented by, for example, Algorithm 1 (below) and works as follows:
Line 4 requires to compute (5) which has complexity (MB2), while Line 5 has complexity (M log M). The while loop at Line 6 has complexity (NRBBM). Thus, the complexity of MLF is (C), where C=max{MB2, M log M, NRB·B·M}.
The greedy algorithm for RSEP-MLF enjoys fast convergence time at the price of sub-optimal performance. Thus, an additional RAN slicing enforcement heuristic technique is provided that reduces the gap between RSEP-QP and RSEP-MLF while keeping the computational complexity as low as possible. To this end, a technique termed RSEP-IMLF is provided, which improves upon RSEP-MLF by iteratively adjusting the RB allocation strategy such that the number of linked RBs is increased.
First, note that the RSEP is shift-invariant with respect to the indexing of the RB (n) and temporal slot (t). This is because, for any given solution x*, the solution x with =xm,r,l,t=xm,r,N
Additionally, note the concept of RB allocation matrix (RBAM). Consider the reshaped RB grid ∈N
The concept of swapping can now be introduced. Specifically, two columns τ1 and τ2 of the RBAM are coherently swapped when all their corresponding entries σb,τ
By leveraging the concepts of reshaping, RBAM and swapping, an improved version of RSEP-MLF can be provided, which works as follows:
The rationale behind RSEP-IMLF is to compute a sub-optimal solution quickly, and then iteratively try to increment the total number of linked RBs by testing a limited amount of swapping combinations. The complexity of Step 1 is (C), where C=max{MB2, M log M, NRB·B·M}. Step 2 is executed once, and its complexity is (B), while the complexity of Step 3 is (BIS). Accordingly, the overall complexity of RSEP-IMLF is (C+B+BIS)=(C+BIS).
One example algorithm for RSEP-IMLF is as follows:
E. Speeding-Up the Execution of RSEP-P and RSEP-E
Although Problems RSEP-QP and RSEP-EQ have exponential complexity, their complexity can be reduced by leveraging specific structural properties of the RSEP.
1) Sparsity: Let xOPT be an optimal solution to either Problem RSEP-QP or RSEP-EQ. If Lm,b=0 for a given MVNO m on BS b, then xm,b,n,tOPT=0 for all n and t. Furthermore, notice that the complexity of many optimization problems strongly depends on the number of non-zero entries (i.e., the sparsity) of the Q matrix. Thus the complexity of the two problems can be reduced by inducing sparsity through two transformations. Specifically, let m′ and b′ such that Lm′,b′=0, for both RSEP-QP and RSEP-EQ generate a reduced matrix {tilde over (Q)} where m′,b′,n,t=0 for all (n, t)∈. For RSEP-QP, it suffices to replace the Q matrix with {tilde over (Q)}. To keep the equivalence between RSEP-QP and RSEP-EQ, the objective function of RSEP-EQ can be reformulated as
½xT({tilde over (Q)}+2λĨV)x−λ (6)
where ĨV is the identity matrix where those entries corresponding to the 2-tuple (m′, b′) are set to zero.
Note that the two above transformations generate equivalent problems to RSEP-QP and RSEP-EQ and do not impact the optimality of the computed solutions. In fact, Constraint (C1) requires
Σt=1TΣn=1N
when Lm′,b′=0. Since xm′,b′,n,t∈{0, 1}, then xm′,b′,n,t=0 for all n and t associated to the 2-tuple (m′, b′). That is, at the optimal solution, xm′,b′,n,t=0 independently of the value of qm′,b′,n,t.
2) RB Aggregation: Let K=GCD(L) be the greatest common divisor (GCD) among all of the elements in the L matrix. It is shown that Problems RSEP-QP and RSEP-EQ are equivalent to solve the same problems with a scaled RB grid, when given conditions on K, T and NRB are satisfied. Specifically, if K>1 and either the number NRB of RBs or the number T of time slots are proportional to K, the available RBs can be aggregated in groups of K RBs so that each group can be seen as a single aggregated RB. Such a property is referred to as aggregability of the RSEP. Definition follows below.
In the first case, the number of RBs is scaled as ÑRB=NRB/K. In the second case, the number of time slots is scaled as {tilde over (T)}=T/K. That is, for each BS b∈, the set b of available RBs at b is replaced with an aggregated version of cardinality |b|=NRBT/K where K RBs are grouped together to create a single RB. This low-dimensional RSEP is referred to as the aggregated RSEP.
Theorem 3. Let the RSEP be aggregable; it is possible to compute an optimal solution to the RSEP by solving the aggregated RSEP.
Proof: Let Z=NRBT, K>1 be the GCD of L, P be the original RSEP problem and {tilde over (P)} be the aggregated RSEP with {tilde over (T)}=T/K. The proof for the case where it is aggregated with respect to NRB=NRB/K follows the same steps. As noted above, problem P is shift invariant with respect to the indexing of n and t. With this feature at hand, it can be shown that the cardinality of can be reduced by a factor K and still achieve equivalence and optimality.
Let χ∈N
is generated by setting
for all k=1, . . . , K, m∈ and b∈. Intuitively, the matrix {tilde over (x)}* is replicated by adding K−1 rows whose entries are identical to those in {tilde over (x)}*.
It can now be proven that P and {tilde over (P)} are equivalent by contradiction. Accordingly, the hypothesis is negated and it is assumed that the two problems are not equivalent, i.e, ƒZ(x*)>ƒZ({tilde over (x)}A*).
Let g(x):> be defined as g(x)=K−1ƒ(x). Intuitively, if the objective function ƒ(x) of P is replaced with g(x), the same problem is obtained where each linked RB gives a reward equal to K−1 (ƒ(x) instead provides a unitary reward for each linked RB). By construction of {tilde over (x)}A*, then ƒZ/K({tilde over (x)}*)=K−1ƒZ({tilde over (x)}A*)=g({tilde over (x)}A*). From the assumption ƒZ(x*)>ƒZ({tilde over (x)}A*), then
g(x*)=K−1ƒZ({tilde over (x)}*)>K−1ƒZ({tilde over (x)}A*)g({tilde over (x)}A*)=ƒZ/K({tilde over (x)}A*) (7)
which states that g(x*)>ƒZ/K({tilde over (x)}*).
To show that this last statement is a contradiction to the hypothesis (i.e., {tilde over (x)}* is optimal for {tilde over (P)}), it must be shown that there always exists a mapping that transforms any solution in to an equivalent solution in . That is, it is necessary to find a function h(x): → (such that h(x)={circumflex over (x)}∈ that can be transformed into {circumflex over (x)}A such that ƒZ/K({circumflex over (x)})=K−1ƒZ({circumflex over (x)}A).
In general, such a mapping is not unique, since any optimal solution in and is shift invariant. However, in Section F below, an easy mapping h(x)={tilde over (x)} is presented that, starting from an optimal solution x∈, always generates an equivalent optimal solution {tilde over (x)}∈ such that ƒZ/K({tilde over (x)})=K−1ƒz(x).
The existence of this mapping implies that xR*=h(x*) satisfies ƒZ/K(xR*)=K−1ƒZ(x*)=g(x*), which is clearly a contradiction. In fact, from (7), ƒZ/K(xR*)=g(x*)>ƒZ/K({tilde over (x)}*), which implies the existence of a solution xR* that contradicts the optimality of {tilde over (x)}* over {tilde over (X)}. It follows that ƒZ/K({tilde over (x)}*)=K−1ƒZ(x*) must hold. Hence, any solution {tilde over (x)}* to the aggregated RSEP can be expanded to obtain {tilde over (x)}A* that is optimal for the original RSEP. This concludes the proof.
F. Aggregation map from to
Consider the reshaped RB grid ∈N
are said to be paired if
are said to be unpaired otherwise.
The mapping technique works as follows. First, if any K columns of σ are identical, (see Step A, where the two columns 2 and 4 are identical), remove them from σ (see Step B) and add them to the aggregated RBAM (see the first column in the bottom-left RBAM). Then, the following steps are taken:
Upon termination, the technique creates an aggregated RBAM (bottom-left RBAM) that is then transformed into a reshaped one (bottom-right RBAM) by replicating its columns exactly K−1 times. As shown in
The methods and systems described herein can be implemented by and/or as part of a computing system for controlling and operating a radio access network, for example, by an infrastructure provider. The computing system can be implemented as or can include a computer device that includes a combination of hardware, software, and firmware that allows the computing device to run an applications layer or otherwise perform various processing tasks. Computing devices can include without limitation personal computers, work stations, servers, laptop computers, tablet computers, mobile devices, wireless devices, smartphones, wearable devices, embedded devices, microprocessor-based devices, microcontroller-based devices, programmable consumer electronics, mini-computers, main frame computers, and the like and combinations thereof. A frequency unit can be any suitable frequency range, band, or division, for example, as determined by a modulation scheme.
The computing device can include a basic input/output system (BIOS) and an operating system as software to manage hardware components, coordinate the interface between hardware and software, and manage basic operations such as start up. The computing device can include one or more processors and memory that cooperate with the operating system to provide basic functionality for the computing device. The operating system provides support functionality for the applications layer and other processing tasks. The computing device can include a system bus or other bus (such as memory bus, local bus, peripheral bus, and the like) for providing communication between the various hardware, software, and firmware components and with any external devices. Any type of architecture or infrastructure that allows the components to communicate and interact with each other can be used.
Processing tasks can be carried out by one or more processors. Various types of processing technology can be used including a single processor or multiple processors, a central processing unit (CPU), multicore processors, parallel processors, or distributed processors. Additional specialized processing resources such as graphics (e.g., a graphics processing unit or GPU), video, multimedia, or mathematical processing capabilities can be provided to perform certain processing tasks. Processing tasks can be implemented with computer-executable instructions, such as application programs or other program modules, executed by the computing device. Application programs and program modules can include routines, subroutines, programs, scripts, drivers, objects, components, data structures, and the like that perform particular tasks or operate on data.
Processors can include one or more logic devices, such as small-scale integrated circuits, programmable logic arrays, programmable logic devices, masked-programmed gate arrays, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), and complex programmable logic devices (CPLDs). Logic devices can include, without limitation, arithmetic logic blocks and operators, registers, finite state machines, multiplexers, accumulators, comparators, counters, look-up tables, gates, latches, flip-flops, input and output ports, carry in and carry out ports, and parity generators, and interconnection resources for logic blocks, logic units and logic cells.
The computing device includes memory or storage, which can be accessed by the system bus or in any other manner. Memory can store control logic, instructions, and/or data. Memory can include transitory memory, such as cache memory, random access memory (RAM), static random access memory (SRAM), main memory, dynamic random access memory (DRAM), block random access memory (BRAM), and memristor memory cells. Memory can include storage for firmware or microcode, such as programmable read only memory (PROM) and erasable programmable read only memory (EPROM). Memory can include non-transitory or nonvolatile or persistent memory such as read only memory (ROM), one time programmable non-volatile memory (OTPNVM), hard disk drives, optical storage devices, compact disc drives, flash drives, floppy disk drives, magnetic tape drives, memory chips, and memristor memory cells. Non-transitory memory can be provided on a removable storage device. A computer-readable medium can include any physical medium that is capable of encoding instructions and/or storing data that can be subsequently used by a processor to implement embodiments of the systems and methods described herein. Physical media can include floppy discs, optical discs, CDs, mini-CDs, DVDs, HD-DVDs, Blu-ray discs, hard drives, tape drives, flash memory, or memory chips. Any other type of tangible, non-transitory storage that can provide instructions and/or data to a processor can be used in the systems and methods described herein.
The computing device can include one or more input/output interfaces for connecting input and output devices to various other components of the computing device. Input and output devices can include, without limitation, keyboards, mice, joysticks, microphones, cameras, webcams, displays, touchscreens, monitors, scanners, speakers, and printers. Interfaces can include universal serial bus (USB) ports, serial ports, parallel ports, game ports, and the like.
The computing device can access a network over a network connection that provides the computing device with telecommunications capabilities. Network connection enables the computing device to communicate and interact with any combination of remote devices, remote networks, and remote entities via a communications link. The communications link can be any type of communication link including without limitation a wired or wireless link. For example, the network connection can allow the computing device to communicate with remote devices over a network which can be a wired and/or a wireless network, and which can include any combination of intranet, local area networks (LANs), enterprise-wide networks, medium area networks, wide area networks (WANS), virtual private networks (VPNs), the Internet, cellular networks, and the like. Control logic and/or data can be transmitted to and from the computing device via the network connection. The network connection can include a modem, a network interface (such as an Ethernet card), a communication port, a PCMCIA slot and card, or the like to enable transmission to and receipt of data via the communications link. A transceiver can include one or more devices that both transmit and receive signals, whether sharing common circuitry, housing, or a circuit boards, or whether distributed over separated circuitry, housings, or circuit boards, and can include a transmitter-receiver.
The computing device can include a browser and a display that allow a user to browse and view pages or other content served by a web server over the communications link. A web server, sever, and database can be located at the same or at different locations and can be part of the same computing device, different computing devices, or distributed across a network. A data center can be located at a remote location and accessed by the computing device over a network.
The computer system can include architecture distributed over one or more networks, such as, for example, a cloud computing architecture. Cloud computing includes without limitation distributed network architectures for providing, for example, software as a service (SaaS), infrastructure as a service (IaaS), platform as a service (PaaS), network as a service (NaaS), data as a service (DaaS), database as a service (DBaaS), desktop as a services (DaaS), backend as a service (BaaS), test environment as a service (TEaaS), API as a service (APIaaS), and integration platform as a service (IPaaS).
The performance of the methods and systems described in Section III has been assessed. To this end, an LTE frequency division duplexing (FDD) system was simulated with 1.4 MHz channel bandwidth, which was divided into 72 subcarriers organized into NRB=6 physical resource blocks (PRBs). Each PRB represented the minimum scheduling unit and included 12 subcarriers and 14 symbols. Time was divided into discrete time slots called sub-frames, the duration of each sub-frame equaling the duration of one PRB and NSF=10 sub-frames constituting a frame. NF∈N was the number of frames within the slicing enforcing window. It followed that T=NF·NSF.
In order to evaluate the benefits of the technology described herein, the several methods were compared with traditional methods that do not leverage information on network topology and interference to instantiate RAN slices, referred to as the “w/o isolation” case.
Unless stated otherwise, it was assumed that both the interference matrix Y and the slicing profile matrix L were generated at random at each simulation run. Results were averaged over 1000 independent simulation runs.
It can be pointed out that RSEP-QP required approximately 100 s to compute an optimal solution when M=10 and B=5, and RSEP-EQ only required 1 s. On the contrary, RSEP-IMLF computed a solution within a few milliseconds, while RSEP-MLF computed the solution in less than a millisecond.
Interestingly,
Another aspect is the optimality-gap between the optimal solution determined by RSEP-QP and those determined through the RSEP-EQ/RSEP-MLF techniques. Although Theorem 2 shows that, under some conditions, Problem RSEP-EQ is equivalent to Problem RSEP-QP, it cannot be guaranteed that the solution computed by RSEP-EQ is a global optimum. Indeed, the solver might get stuck in one of the local maximizers, thus effectively preventing the computation of an actual global maximizer. Thus, as shown in
As demonstrated in
Recall that the slicing profile L was randomly generated at each simulation run. For each L, RBs were allocated to MVNOs by running different RAN slicing enforcement algorithms. Then, for each MVNO the optimal downlink transmission policy was computed by determining (i) which user should be scheduled in each RB, (ii) how much power to allocate to each transmission, and (iii) whether or not a user should be served by multiple neighboring BSs through CoMP transmissions.
The results are provided in
To further investigate the issue of severe inter-MVNO interference, a series of experiments was run on testbeds, discussed in detail further below.
To evaluate the performance of the algorithms, an orthogonal frequency division multiple access (OFDMA) system as in LTE was used. In OFDMA, time and frequency were divided into RBs, where each RB had a time duration equal to the duration of an OFDMA frame, which spanned K subcarriers split into ΔT slots. Each of these slots was assigned to one MVNO according to the outcome of the slicing enforcement algorithm, which in turn could decide to assign subcarriers to MUs according to its own internal resource allocation and scheduling policy.
A testbed of 8 USRP software-defined radios was set up for the experiments. Two USRP X310 acted as BSs, 6 USRP N210 were used to implement MUs and all of them ran GNU Radio. The USRP radios were deployed as shown in
The experiments were targeted to evaluate two performance parameters:
To address point 1), a network with three MVNOs and 6 MUs was considered, where each MU was associated with a different MVNO in each BS (e.g., U11 was associated with MVNO 1 and BS1, while U23 with MVNO 3 and BS2). The case was considered where the two BSs enforced the following slicing policies on the three MVNOs, which change every T=300 s, by using the RSEP-QP algorithm.
In addressing point 2), the same network scenario was considered as in 1). However, to remark the difference between the optimum and the sub-optimal algorithms, 9 MVNOs were considered instead of 3. The MVNOs were assigned the following slicing policy at the two BSs:
Furthermore, the following IBSPC policy was considered: when two MVNOs have matching RBs at the two BSs, a power control policy was computed that reduced the transmission power to keep the mutual interference below a fixed threshold.
To demonstrate the superior performance of the techniques herein, a standard-compliant LTE cellular network on the Arena testbed was instantiated. Arena is an experimental software-defined radio (SDR) testbed used to facilitate prototyping and performance evaluation of algorithms and protocols for sub-6 GHz applications in a real-world wireless environment. Arena included N210 and X310 USRPs whose antennas were connected to the ceiling of a 2240 square feet office space. USRPs were controlled via software by GPU-enabled high-computational power Dell EMC PowerEdge R340 servers.
To deploy a standard-compliant LTE network, srsLTE and OpenAirInterface (OAI) open-source software was used, which offered LTE-compliant base stations (eNBs) and UEs protocol stack implementations, as well as an Evolved Packet Core (EPC) application. Implementation details and report results obtained through the srsLTE implementation are discussed here; however, both the implementation and obtained results on OAI were equivalent to those of srsLTE.
Two standard-compliant eNBs on Arena X310 SDR Ettus Research USRPs serving 6 COTS UEs (Xiaomi Redmi Go) were deployed. The deployed LTE network is shown in
2. Integrating RAN Slicing in srsLTE
In order to demonstrate the superior performance of the RAN slicing algorithms herein with respect to traditional interference-agnostic slicing approaches, srsLTE functionalities were extended by integrating RAN slicing mechanisms at each eNB. An overview of the extended framework is shown in
In each experiment, the IP received RAN slice requests generated by a set of MVNOs. Each RAN slice request specified which eNBs should be included in the slice, and the number of RBs that should be assigned to the slice on each eNB. Upon reception of these requests, the IP executed one of the RAN slicing enforcement techniques to assign the available RBs to the requesting MVNOs such that the number of linked RBs was maximized. The solution was then converted into a set of B configuration files (i.e., the config.txt files in
The case was considered where two MVNOs lease eNB resources (i.e., RBs) to instantiate RAN slices. The experiments were targeted at evaluating two critical performance parameters, i.e., network throughput and SINR experienced by UEs. The effectiveness of the techniques was demonstrated by comparing the optimal RSEP-QP technique described herein with a traditional technique (i.e., w/o isolation) in which RAN slices were instantiated without leveraging network topology information and enforcing slice isolation.
Ten experiments were run on the testbed illustrated in
The average throughput over the 10 experiments is reported in
In
To further investigate the issue of inter-MVNO interference, a series of experiments were run on the testbed described in Example 1 (
To further demonstrate the negative impact of inter-MVNO interference, a series of experiments were run on the LTE-compliant testbed described in Example 2 (
As used herein, “consisting essentially of” allows the inclusion of materials or steps that do not materially affect the basic and novel characteristics of the claim. Any recitation herein of the term “comprising,” particularly in a description of components of a composition or in a description of elements of a device, can be exchanged with “consisting essentially of” or “consisting of.”
It is to be understood that the present technology is not limited to the exact details of construction, operation, exact materials or embodiments or aspects shown and described, and that various modifications, substitution of equivalents, alterations to the compositions, and other changes to the embodiments and aspects disclosed herein will be apparent to one of skill in the art.
This application claims priority under 35 U.S.C. § 119(e) of U.S. Provisional Application No. 62/796,780, filed on 25 Jan. 2019, entitled “Methods for the Enforcement of Network Slicing Policies in Virtualized Cellular Networks,” the disclosure of which is hereby incorporated by reference.
This invention was made with government support under Grant Numbers N00014-16-1-2213 and N00014-17-1-2046 awarded by the Office of Naval Research and Grant Number CNS-1618727 awarded by the National Science Foundation. The government has certain rights in the invention.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2020/014896 | 1/24/2020 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62796780 | Jan 2019 | US |