<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Moscow, Russian, April</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>To the analysis of the dynamic assignment of radio resources in wireless networks with a network slicing mechanism</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ekaterina V. Bobrikova</string-name>
          <email>bobrikova-ev@rudn.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anna A. Platonova</string-name>
          <email>aaplatonova@list.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey Ya. Shorgin</string-name>
          <email>sshorgin@ipiran.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliya V. Gaidamaka</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Peoples' Friendship University of Russia (RUDN University)</institution>
          ,
          <addr-line>6, Miklukho-Maklaya St., Moscow, 117198</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Vavilov St.</institution>
          ,
          <addr-line>Moscow, 119333</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <fpage>3</fpage>
      <lpage>17</lpage>
      <abstract>
        <p>Network Slicing is one of the latest technologies of modern telecommunication systems. Network Slicing involves dividing the 5G physical architecture into multiple virtual networks or slices. Each slice has its own characteristics and is aimed at solving a particular business problem. In the nearest future it is expected that Network Slicing principle will radically change the approach, in particular, of mobile operators to support vertical applications with specific and rigorous performance requirements. Network resource tenants can manage these requirements. The static assignment of resources to tenants, that is, the assignment of resources on a permanent basis, is a suficient condition for fulfilling terms of Service Level Agreement (SLA), but this assignment can lead to the significant ineficiencies of the frequency resource and to the high cost of renting it for virtual mobile operators. As an alternative solution, the method of a dynamic resource sharing can be proposed. In this paper we consider the principle of setting network slices using an utility function. This principle implements resource planning mechanisms for tenants taking into account trafic requirements. These mechanisms allow to diferentiate slices and prioritize services that correspond to slices.</p>
      </abstract>
      <kwd-group>
        <kwd>5G</kwd>
        <kwd>elastic trafic</kwd>
        <kwd>Network Slicing</kwd>
        <kwd>virtualization</kwd>
        <kwd>resource allocation</kwd>
        <kwd>scheduling</kwd>
        <kwd>infrastructure sharing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>It is expected that in the coming years, mobile Internet trafic will not only continue to grow
rapidly, but will also change and reorient in connection with an unprecedented number and
variety of network-connected devices and the necessity to support a wide range of new
applications. This will lead to a significant increase in the costs of network operators: costs that are
not comparable with the growth of operators’ profits.
nEvelop-O
Workshop on information technology and scientific computing in the framework of the X International Conference</p>
      <p>CEUR
Workshop
Proceedings
htp:/ceur-ws.org
IS N1613-073</p>
      <p>CEUR Workshop Proceedings (CEUR-WS.org)</p>
      <sec id="sec-1-1">
        <title>Therefore, it is extremely important for network operators to use the capabilities of the new</title>
      </sec>
      <sec id="sec-1-2">
        <title>5G networks and review business behavior. The Next Generation Mobile Networks (NGMN)</title>
      </sec>
      <sec id="sec-1-3">
        <title>Alliance assigned to Network Slicing a decisive role in the further development of 5G networks</title>
        <p>
          and in the impact on updating the interaction of operators with business [
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ]. Network
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>Slicing allows service providers to create virtual end-to-end networks, adapted to application requirements (Figure 1).</title>
      </sec>
      <sec id="sec-1-5">
        <title>Using of Network Slicing allows operators to provide parts of their networks for the specific</title>
        <p>use cases of customers, for example, a smart home, Internet of things (IoT) factory, connected
car, smart energy grid. Network Slicing allows to place on one physical medium with its own
infrastructure various end-to-end logical networks called network slices.</p>
      </sec>
      <sec id="sec-1-6">
        <title>Slices manage the sets of virtualized communication resources, network elements. The</title>
      </sec>
      <sec id="sec-1-7">
        <title>Network Slicing architecture can be considered as consisting of two blocks, one is for the actual implementation of the slice, and the other is for the control and configuration of a slice (Figure 2).</title>
      </sec>
      <sec id="sec-1-8">
        <title>The first block is designed as a layered architecture. It consists of three levels: service</title>
        <p>layer, network function layer, infrastructure layer. Each layer contributes to the definition and
deployment of the slice. The second block is implemented as a centralized network element.</p>
      </sec>
      <sec id="sec-1-9">
        <title>This is usually a controller of a network slice. The controller monitors and manages functionality</title>
        <p>between the three layers to efectively coordinate the existence and interaction of several slices.</p>
      </sec>
      <sec id="sec-1-10">
        <title>In recent years wireless network slicing has become a central research topic to address the challenges of ever-increasing network trafic. Sharing of wireless infrastructure is widely discussed in various literature.</title>
      </sec>
      <sec id="sec-1-11">
        <title>The paper [3] gives a rigorous mathematical formulation of the scheduling problem with</title>
        <p>multiple operators so called Generalized Resource Sharing (GRS). Authors give deep insight in
the most important parameters of this scheduling and analytical and numerical characteristics
of the impact of these parameters on rate-dependent utilities. Most of these results are valid for
an arbitrary number of users and operators.</p>
      </sec>
      <sec id="sec-1-12">
        <title>The paper [4] proposes the concept of Multi-Operator Scheduling (MOS). This approach allows to exchange sharing guarantees for spectral eficiency at the Base Station (BS). In addition, authors move on to a more general problem so called Anticipatory Multi-Operator Scheduling (AMOS).</title>
      </sec>
      <sec id="sec-1-13">
        <title>It should be noted, that Network Slicing creates new problems that need to be addressed.</title>
        <p>
          They must be considered in order to be accepted in practice. One of the solutions is the concept
of a network slice broker that acts as arbitration entity. The broker must be responsible for the
meeting of the heterogeneous requirements of slices from tenants while guaranteeing the most
eficient use of infrastructure resources. The paper [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] is based on the concept of brokers and
develops an online network slice (ONETS) brokering solution, corresponding to the development
of the new 3GPP Network Slicing architecture. The goal of ONETS solution is to develop an
efective online network slice broker. It analyzes the past information about network slices and
maximizes the gains of network slice resources multiplexing.
        </p>
      </sec>
      <sec id="sec-1-14">
        <title>In [6] authors propose a general scheme, that describes the management of radio resource</title>
        <p>
          for Network Slicing; a market mechanism, that governs the allocation of radio resources for
slices and an economic game, that allows to evaluate the strategies of tenant behavior at Nash
equilibrium. The work [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] focuses on development a mechanism, that allows tenants to engage
in a dynamic resource market. The mechanism allows tenants to optimize their solutions
according to the current state of the network.
        </p>
      </sec>
      <sec id="sec-1-15">
        <title>In [7] the statement of the problem considers the economic issue of the network that arises</title>
        <p>
          in wireless Network Slicing. The issue includes cash profit for infrastructure providers (InP)
in terms of strategies for the eficient allocation of resources for several associated operators
and the economic interaction of mobile virtual network operators (MVNOs) and their users.
The work [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] focuses on the two-level resource allocation problem to maximize individual
and total valuation of MVNOs. Here, the most important issue is the allocation of resources
between MVNOs with fairness guarantee. To solve the aforementioned problems, associated
with the resource allocation in wireless Network Slicing, an efective resource allocation system,
using generalized Kelly mechanism (GKM), is built in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. The concept of GKM is based on
works [
          <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
          ]. A number of articles are known, for example [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ], where the problems of
network slicing are solved by the methods of queuing theory [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-16">
        <title>Static resources distribution at each network slice does not always provide the proper quality</title>
        <p>
          of service and the eficient using of the resources. The reason is in the stochastic behavior of
wireless channel and the stochastic fluctuations of network trafic. To overcome these dificulties,
it is proposed to use the mechanism of dynamic resource distribution [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. With this mechanism
network slices dynamically share network resources, and it becomes possible to ensure the
specific requirements of slices. In this paper it is proposed a general approach, based on the
introduction of an utility function, which depends on throughput and latency.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Main problem description</title>
      <p>
        The statement of the problem and the approach to solving the problem are based on [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. We
consider a situation where a single mobile network operator (MNO) controls the downlink
of a base station scheduler, whose wireless physical resources are used mutually by diferent
network slices. Let  be the set of created network slices or tenants, since in this paper it is
assumed, that the tenant controls a single slice. Let  be the set of users in the system,   be
the subset of active users of slice  ∈  . Each tenant  ∈  sets its slice requirements, which
are transmitted to the base station scheduler in the form of Key Performance Indicators (KPIs),
including latency and throughput.
      </p>
      <p>The sharing of radio resources is modeled as a queuing system (QS), considered in discrete
time. Packets arrive randomly to the base station scheduler at the beginning of each time
interval (slotted time)  ,  ∈  . The arrival of packets is distributed according to Poisson’s law,
where   is the average arrival rate of the incoming packet stream of slice  . Let   be the length
of the packet of slice  ,   [] be the total number of packets, arriving in the system for user 
at the time slot  . Let   [] be the total number of served packets of user  at time slot  . It is
considered that the packet is received successfully, when the total number of transmitted bits is
equal to the size of the packet.</p>
      <p>The base station scheduler allocates one bufer of infinite length for each network slice. The
parameter   [] ∈ {0, 1} shows the state of the  -th bufer: whether it is empty or busy at the
time slot  . It is assumed, that packets are served according to the discipline First-In-First-Out
(FIFO) in each bufer. The reason is that each slice defines a unique type of service, and therefore
all packets are handled the same within one slice. Packages, belonged to diferent bufers, are
served on the base of a scheduling policy, that ensures customization and diferentiation of
slices. To implement this statement, let  be the set of network performance indicators, such as,
average user throughput, minimum latency. For each element  ∈  let’s define a utility function
in a general form:    (  (  ),   ), ∀ ∈ , ∀ ∈  , where   is the network slice’s  requirement
for the specific performance indicator  ∈  , and   (  ) is a function, that determines the
resources allocated to the network slice  for all its users   . Here
and   [] is the share of resources, allocated by the scheduler to user  at time slot  . At last, it
is assumed that the scheduler has complete information about the channel, and let   [] be the
maximum achievable rate of user  at time slot  .</p>
      <sec id="sec-2-1">
        <title>It is assumed that each network slice determines its own specific service, for which the tenant requires specially designed and customized network configuration. Network slice</title>
        <p>= ∑ ∑   []
∈ ∈ 
customization is modeled using piece-wise linear utility functions, which display the achieved
network performance indicators, based on requirements, established by tenants.</p>
      </sec>
      <sec id="sec-2-2">
        <title>In this paper it is considered two indicators of network performance: latency and throughput, and a utility function is constructed for each of them.</title>
        <p>Latency utility function. We define the latency for each packet as the waiting time of a packet
in the bufer before this packet is transmitted. Now we define the maximum latency:
 max = max{( − ), ∀ ⩽  ∶ 
 [] =   []}, ∀ ∈ ,
which describes the maximum packet latency for a slice  . Next we define the average latency:
∈</p>
        <p>=
1
|  |
∑</p>
        <p>determines the average latency for all users of the slice  .</p>
        <p>we define a utility function:
where   is the latency of one packet  and   is the total number of packets arrived in the
 ̂  ( ,   ) = ⎨</p>
        <p>−
⎪
⎧  , if  ⩽  
⎩⎪ min, if  ⩾  max,</p>
        <p>max −  
 −  min)( −   )
, if   ⩽  ⩽  max
(1)
where  is the latency variable, that is either  max or   ;   is the latency requirement for the
network slice  .</p>
      </sec>
      <sec id="sec-2-3">
        <title>It is assumed, that each network slice defines its interval of the required latency, that is, the</title>
        <p>target latency</p>
        <p>and the maximum allowable latency  max, therefore   = {  ,  max}.  min is
the minimum value of the utility function,   is the maximum value of the utility function.</p>
        <sec id="sec-2-3-1">
          <title>The general view of the latency utility function is in Figure 3. The values of the function  ̂  are</title>
          <p>calculated according to the Algorithm 1.</p>
          <p>Data: y
Result:  ̂</p>
          <p>( ,   )
1 if  ⩽   then</p>
          <p>̂  ( ,   ) =  
2
4
6
5 else
7 end</p>
          <p>̂  ( ,   ) =  min
3 else if</p>
          <p>&lt;  ⩽  max then
 ̂  ( ,   ) =  
 − ( 
 − min)(−  )
 max−</p>
        </sec>
        <sec id="sec-2-3-2">
          <title>Algorithm 1: The values of  ̂  .</title>
          <p>Based on the definitions given above, the overall latency utility function is defined as follows:
   =   ⋅  ̂
 ( max,   ) + (1 −   ) ⋅  ̂
 (</p>
          <p>,   ), ∀ ∈ ,
where   is the weight coeficient specified by the tenant. The coeficient
priority of the network slice using the latency utility function in terms of  
max or   .

 determines the
Throuhgput utility function. We define the total user throughput for one slice:
  =
  
1
∑   [ ] ⋅   , ∀ ∈ ,
where   [ ] is the total number of packets, transferred to the user  , and   
time, during which bufer is active for packets transmission. The throughput utility function is
is the total
defined as follows:
   ( ,   ) =
⎪
⎪</p>
          <p>−
⎧  , if  ⩾   ,
⎪</p>
          <p>−  
⎨ min  min −  
⎪
⎩0, if  ⩽</p>
          <p>,
 −  min)( −   )
 min −</p>
          <p>, if   ⩾  ⩾  min,
, if  min ⩾  ⩾   ,
(2)
where  =   is the aggregate throughput of the user of slice  and   = {  ,  min,  
} are
the throughput requirements;</p>
          <p>— the basic bit-rate for each slice;  min — the minimum
guaranteed bit-rate, which is necessary to provide the standard quality of service;  min — the
value of the utility function corresponding to  min;  
— the bit-rate, which is necessary to
function  ̂  are calculated according to the Algorithm 2.
provide a high quality of service;   is the maximum value of the utility function corresponding
to   . The general view of the throughput utility function is in Figure 4. The values of the
2
4
6
8
7 else
9 end</p>
          <p>Result:    ( ,   )
1 if  ⩽  
3 else if</p>
          <p>then
   ( ,   ) = 0</p>
          <p>− 
   ( ,   ) =  min  min−</p>
          <p>&lt;  ⩽  min then
5 else if  min &lt;  ⩽</p>
          <p>then
   ( ,   ) =  
 − ( 
 − min)(−  )</p>
          <p>min− 

   ( ,   ) =</p>
        </sec>
        <sec id="sec-2-3-3">
          <title>Algorithm 2: The values of    .</title>
          <p>
            The resource allocation problem. The scheduler assigns physical resources to users based on
utility function    , defined above. In addition, we introduce a specific parameter
the requirements of the network slice, using the latency utility function    and the throughput
  for a network
slice in order to start the mechanism that allows tenants themselves to determine the weights
of the corresponding utility function.
problem [
            <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
            ] in the following statement
where

=1
∑   [] ⩽ 1, ∀ ∈  ,
          </p>
          <p>[] ⩽   [ − 1], ∀ ∈  , ∀ ∈  ,
∈
∑   [] ⋅   [] ⩽   [] ⋅   , ∀ ∈  , ∀ ∈  ,</p>
          <p>∑   [] ⋅   [] ⩾   [] ⋅   , ∀ ∈  , ∀ ∈  ,
  [] = {
0, if   [] =   []</p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>1, otherwise</title>
        <p>, ∀ ∈  , ∀ ∈ 
 , ∀ ∈ .</p>
        <p>Here the optimal solution provides maximum weighted sum of the utility functions of the slices
for all slices of the network. The problem is formulated for both performance indicators, that
is,   = {   ,    },   = {  ,   }. The first constraint ensures, that the scheduler does not assign
more resources than those are available in network at every time slot  . The second constraint
shows, that the packet can be considered successfully transmitted only at the end of the time
slot or at the beginning of the next time slot. The third constraint ensures, that the number
of bits transmitted cannot be more than the total number of bits received in the system at one
time slot. The fourth constraint updates the total number of received packets at each time slot
 , taking into account the total number of received bits. Finally, the fith constraint determines
the state of the bufer.</p>
        <p>The proposed formulation of the resource allocation problem always guarantees the
maximization of the utility function for each network slice. Therefore, in the case of a suficient
amount of resources in the system, we can assume that each network slice reaches maximum of
its utility function. However, the mobile network operator (MNO) must be ready for situations
when resources are not enough, for example, due to network congestion. Therefore it is assumed
max ∑   ⋅   ,
∈

=1
allows tenants:
that the tenant can monitor the performance of the slice in real time and can change its priority
indicators in order to scale the utility function and get various network performance indicators.</p>
        <p>By introducing the specific parameter   for the slice, we enable a tenant to configure and
diferentiate the network slice. This becomes especially impotant in case of congestion of the
network, since MNO has to make decisions how to deal with slices, when it is known beforehand
that the execution of all the requirements may not be possible. In this sense, the adjusting of  
— to prioritize a set of network performance indicators within a single slice (slice customization).</p>
      </sec>
      <sec id="sec-2-5">
        <title>That is, whenever MNO is not be able to fulfill all the requirements for the slice, resources is allocated to maximize utility of the indicator with higher priority. slices, that require higher priority.</title>
        <p>— to prioritize slices (slice diferentiation ). In this case, when the MNO is not able to provide
maximum value of the utility function for all slices, parameter   indicates the most critical</p>
      </sec>
      <sec id="sec-2-6">
        <title>Note, that the utility function is defined for both latency and throughput. Therefore, it is</title>
        <p>possible to consider services with diferent parameters of latency and throughput, using the
capabilities of Network Slicing. Let’s consider the following services: TI (Tactile Internet), eMBB
(enhanced Mobile BroadBand), mMTC (massive Machine Type Communication), cMTC (critical</p>
      </sec>
      <sec id="sec-2-7">
        <title>Machine Type Communication) [13]. These services are supported by 5G, the principles of</title>
        <p>Network Slicing are applicable to which, and for which it is possible to construct utility functions,
that take into account both latency and throughput. It is shown in Figure 5 the latency utility

functions for four types of the slices, namely:  ̂</p>
        <p>( ,    ),  ̂
( ,</p>
        <p>),  ̂ 
( , 
 
),
( ,</p>
        <p>), based on (1).</p>
        <p>̂</p>
        <p>), based on (2).</p>
        <p>
          TI and cMTC services relate to URLLC (Ultra-Reliable Low Latency Communication)
applications. These two slices are the most critical applications in terms of latency. Latency
requirements can even have values below 1 ms [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. These applications also require high
throughput. It is assumed that eMBB and mMTC slices are more flexible with respect to latency
requirements and their utility is less afected by delays in scheduling decisions. It is shown

in Figure 6 the throughput utility functions for four types of the slices, namely:   
( ,    ),
        </p>
        <p>It is assumed, that for applications with weak throughput requirements, achieving a minimum
guaranteed bit-rate is suficient to provide satisfactory service, which means a high value for
utility. It takes place for TI, cMTC, mMTC. On the contrary, for the eMBB slice, the utility
value is set much lower, which means low provide quality. As we can see, as a result of strict
latency requirements, for applications TI and cMTC, an increase in throughput leads to a
decrease in latency. On the contrary, applications, which are not latency-critical, are more
demanding in terms of aggregate throughput. Namely, for the mMTC slice it is assumed that
the minimum guaranteed bit-rate should be provided, but the aggregate throughput can be
high, given the huge number of connected devices. It is assumed for the eMBB slice, a high
throughput requirement for each user, but with relatively few users at the same time active per
cell.</p>
      </sec>
      <sec id="sec-2-8">
        <title>The parameters for the utility functions in Figures 5, 6 are derived according to [13]. But we</title>
        <p>consider slightly diferent combinations of parameters for the presented slices.</p>
      </sec>
      <sec id="sec-2-9">
        <title>The approach considered in this paper, using the construction of the utility function of the</title>
        <p>
          slice, can be recommended to MNO. For their set of services, operators will be able to evaluate
the profitability of these services and determine the tarifs for users. So, in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] a numerical
analysis was performed for TI, cMTC, eMBB, mMTC slices. The scheduling tactics depend
mainly on two factors: how utility functions are defined for the diferent types of slices and how
tenants determine weights by choosing the parameter   . Some recommendations are given.
        </p>
      </sec>
      <sec id="sec-2-10">
        <title>In order to maximize the utility of the latency-critical slices, it is necessary to schedule user</title>
        <p>service, as soon as the packet arrives at the bufer, regardless of the state of their channel. This
method gives the highest priority to such users and does not allow the scheduler to make more
efective scheduling decisions. On the contrary, for slices that are oriented to high throughput,
the state of the user channel may also influence the increase in utility.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>In this paper we propose an algorithm for the dynamic sharing of network resources by network
slices. The utility function of the network slice is described, which allows to customize the
behavior of various types of slices. Diferentiation between tenants is achieved through change
in specific parameters of the slices. These parameters, in turn, dynamically change the view
of the utility function of the slice. In the future it is planned to study in detail the efect of
parameter changes in some slices of the network on service latency in other slices. It is planned to
investigate the minimum value of the utility function, corresponding to the minimum guaranteed
bit-rate for each slice. It is planned to consider the impact of changing of the parameters of the
task in connection with the interaction between tenants and mobile network operators.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgments</title>
      <sec id="sec-4-1">
        <title>The work is supported by RUDN Program «5-100» and by RFFR in the framework of the scientific projects № 18-07-00576, 19-07-00933. The authors thank Natalia Yarkina for the materials that were used in the Introduction.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] 3GPP, Study on management and orchestration of network slicing for next generation network, 2017</article-title>
          . URL: https://portal.3gpp.org/desktopmodules/Specifications/ SpecificationDetails.aspx?specificationId=
          <fpage>3091</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Sattar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Matrawy</surname>
          </string-name>
          ,
          <article-title>Optimal slice allocation in 5g core networks</article-title>
          ,
          <source>IEEE Networking Letters</source>
          <volume>1</volume>
          (
          <year>2019</year>
          )
          <fpage>48</fpage>
          -
          <lpage>51</lpage>
          .
          <source>doi:1 0 . 1 1</source>
          0 9 / L N E T .
          <volume>2 0 1 9 . 2 9 0 8 3 5 1 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Malanchini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Valentin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Aydin</surname>
          </string-name>
          ,
          <article-title>An analysis of generalized resource sharing for multiple operators in cellular networks</article-title>
          ,
          <source>in: 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)</source>
          , IEEE,
          <year>2014</year>
          , pp.
          <fpage>1157</fpage>
          -
          <lpage>1162</lpage>
          .
          <source>doi:1 0 . 1 1</source>
          <volume>0</volume>
          <fpage>9</fpage>
          <string-name>
            <surname>/ P I M R C .</surname>
          </string-name>
          <article-title>2 0 1 4 . 7 1 3 6 3 4 2</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Malanchini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Valentin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Aydin</surname>
          </string-name>
          ,
          <article-title>Wireless resource sharing for multiple operators: Generalization, fairness, and the value of prediction</article-title>
          ,
          <source>Computer Networks</source>
          <volume>100</volume>
          (
          <year>2016</year>
          )
          <fpage>110</fpage>
          -
          <lpage>123</lpage>
          .
          <source>doi:1 0 . 1 0</source>
          <volume>1 6</volume>
          / j . c
          <source>o m n e t . 2 0 1 6 . 0 2 . 0 1 4 .</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sciancalepore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zanzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Costa-Perez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Capone</surname>
          </string-name>
          ,
          <article-title>Onets: online network slice broker from theory to practice</article-title>
          , arXiv preprint arXiv:
          <year>1801</year>
          .
          <volume>03484</volume>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lieto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Moro</surname>
          </string-name>
          , I. Malanchini,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mandelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Capone</surname>
          </string-name>
          ,
          <article-title>Strategies for network slicing negotiation in a dynamic resource market</article-title>
          ,
          <source>in: 2019 IEEE 20th International Symposium on ”A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
          <source>doi:1 0 . 1 1 0 9 / W o W M o M . 2 0</source>
          <volume>1 9 . 8 7 9 2 9 9 9 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y. K.</given-names>
            <surname>Tun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. H.</given-names>
            <surname>Tran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. T.</given-names>
            <surname>Ngo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Pandey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. S.</given-names>
            <surname>Hong</surname>
          </string-name>
          ,
          <article-title>Wireless network slicing: Generalized kelly mechanism-based resource allocation</article-title>
          ,
          <source>IEEE Journal on Selected Areas in Communications</source>
          <volume>37</volume>
          (
          <year>2019</year>
          )
          <fpage>1794</fpage>
          -
          <lpage>1807</lpage>
          .
          <source>doi:1 0 . 1 1 0 9 / J S A C . 2 0</source>
          <volume>1 9 . 2 9 2 7 1 0 0 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F. P.</given-names>
            <surname>Kelly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Maulloo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. K.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <article-title>Rate control for communication networks: shadow prices, proportional fairness and stability</article-title>
          ,
          <source>Journal of the Operational Research society</source>
          <volume>49</volume>
          (
          <year>1998</year>
          )
          <fpage>237</fpage>
          -
          <lpage>252</lpage>
          . doi:
          <article-title>1 0 . 1 0 5 7 / p a l g r a v e</article-title>
          .
          <source>j o r s . 2 6</source>
          <volume>0 0 5 2 3 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kelly</surname>
          </string-name>
          ,
          <article-title>Charging and rate control for elastic trafic</article-title>
          ,
          <source>European transactions on Telecommunications</source>
          <volume>8</volume>
          (
          <year>1997</year>
          )
          <fpage>33</fpage>
          -
          <lpage>37</lpage>
          .
          <source>doi:1 0 . 1 0</source>
          <volume>0 2</volume>
          / e t t .
          <volume>4 4 6 0 0 8 0 1 0 6 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vincenzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lopez-Aguilera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Garcia-Villegas</surname>
          </string-name>
          ,
          <article-title>Maximizing infrastructure providers' revenue through network slicing in 5g, IEEE Access 7 (</article-title>
          <year>2019</year>
          )
          <fpage>128283</fpage>
          -
          <lpage>128297</lpage>
          .
          <source>doi:1 0 . 1 1 0</source>
          <string-name>
            <given-names>9</given-names>
            <surname>/ A C C E S S</surname>
          </string-name>
          .
          <volume>2 0 1 9 . 2 9 3 9 9 3 5 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.</given-names>
            <surname>Vilà</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sallent</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Umbert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pérez-Romero</surname>
          </string-name>
          ,
          <article-title>An analytical model for multi-tenant radio access networks supporting guaranteed bit rate services</article-title>
          ,
          <source>IEEE access 7</source>
          (
          <year>2019</year>
          )
          <fpage>57651</fpage>
          -
          <lpage>57662</lpage>
          .
          <source>doi:1 0 . 1 1 0</source>
          <string-name>
            <given-names>9</given-names>
            <surname>/ A C C E S S</surname>
          </string-name>
          .
          <volume>2 0 1 9 . 2 9 1 3 3 2 3 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gaidamaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pechinkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Razumchik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Samouylov</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Sopin,</surname>
          </string-name>
          <article-title>Analysis of an mg 1 r queue with batch arrivals and two hysteretic overload control policies</article-title>
          ,
          <source>International Journal of Applied Mathematics and Computer Science</source>
          <volume>24</volume>
          (
          <year>2014</year>
          )
          <fpage>519</fpage>
          -
          <lpage>534</lpage>
          .
          <source>doi:1 0 . 2 4</source>
          <volume>7 8</volume>
          / a m c
          <source>s - 2</source>
          <volume>0 1 4 - 0 0 3 8 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lieto</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Malanchini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Capone</surname>
          </string-name>
          ,
          <article-title>Enabling dynamic resource sharing for slice customization in 5g networks</article-title>
          ,
          <source>in: 2018 IEEE Global Communications Conference (GLOBECOM)</source>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
          <source>doi:1 0 . 1 1</source>
          <volume>0</volume>
          <fpage>9</fpage>
          <string-name>
            <surname>/ G L O C O M</surname>
          </string-name>
          .
          <volume>2 0 1 8 . 8 6 4 7 2 4 9 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Taha</surname>
          </string-name>
          ,
          <article-title>Operations research: an introduction, seventh edition</article-title>
          ,
          <source>Williams Publishing House</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>