<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Service-oriented model for handling mMTC subscribers' traffic in a 5G cluster</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viacheslav Kovtun</string-name>
          <email>vkovtun@iitis.pl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oksana Kovtun</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Theoretical and Applied Informatics Polish Academy of Sciences</institution>
          ,
          <addr-line>Bałtycka Str., 5, Gliwice, 44-100</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Vasyl' Stus Donetsk National University</institution>
          ,
          <addr-line>600-richchya Str., 21, Vinnytsia, 21000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article addresses the research task of rational organization of the data collection process from multiple sensor networks with a finite number of terminals located in the 5G cluster coverage. The proposed solution is based on a Markov model of the controlled process of uplink transfer of segmented informational messages from a finite set of terminals belonging to different sensor networks deployed in the coverage area of the target 5G cluster. The segregation of sensor networks at the model level is ensured by their service orientation in dedicated virtual network segments organized in the information environment of the 5G base station. Moreover, the model allows for establishing priorities for services characteristic of each sensor network. The specificity of mMTC traffic is taken into account by the base station, which accepts an incoming request only if there is a minimum guaranteed amount of available communication resources necessary for its processing. It is assumed that an unaccepted request may wait for processing in a buffer of finite capacity, which it leaves either upon acceptance for service or upon expiration of the assigned waiting time. The model serves as the basis for formalizing the metrics of quality indicators, including the probability of losing an incoming request due to system overload, indicators of the average duration of a request's stay in the system, and indicators of the average number of requests in the system. To demonstrate the functionality of the proposed mathematical framework for the target service-oriented traffic handling system of mMTC subscribers in a 5G cluster, dependencies of quality metric indicators on the intensity of incoming requests to the base station were calculated. The obtained results allowed for the estimation of the volume of communication resources that can be reasonably predicted for the efficient operation of the target 5G cluster with mMTC traffic.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;5G Cluster</kwd>
        <kwd>Sensor Network</kwd>
        <kwd>mMTC Traffic</kwd>
        <kwd>Communication Resource Handling</kwd>
        <kwd>Markov Model</kwd>
        <kwd>Quality Metrics</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>In the list of technologies proposed by the 5G/IMT-2020 standards specification [1], the support for
massive Machine Type Communication (mMTC) holds a prominent position, and this is not
coincidental. The implementation of Industry 4.0 leads to a continuous expansion of sensor network
coverage areas, connecting them to the cloud via wired communication is neither technologically
nor economically feasible, and often simply impossible. The mMTC technology is specifically
designed to address a plethora of issues related to organizing informational interactions around
sensor networks. However, any system operates predictably and efficiently only if its structure is
transparent and optimal in the context of its intended purpose. Therefore, the research task of the
rational organization of the data collection process from multiple sensor networks with a finite
number of terminals, located in the vicinity of a 5G cluster, is relevant and of great practical
significance.</p>
      <p>Numerous research papers have delved into the exploration and examination of radio resource
management, control and allocation techniques within 5G networks, as evidenced by a collection of
studies [2-4]. The intricate aspects of radio resource control and Quality of Service (QoS) provisions
for 5G network slices have been introduced and scrutinized in various research endeavours [5, 6].
Recent works have also addressed the introduction and discussion of resource allocation strategies
and challenges pertinent to network slicing [7-9].</p>
      <p>The investigation of slice isolation's end-to-end behaviour, particularly from a security
standpoint, is the focus of [10]. This study classifies isolations such as traffic, processing, bandwidth
or storage, while also addressing challenges associated with the contemporary trends in 5G slice
isolation. The authors emphasize that isolation stands out as the most pivotal characteristic of
network slicing.</p>
      <p>[18] introduces an effective and secure service-oriented authentication framework designed to
facilitate network slicing within the 5G-powered Internet of Things network. The framework aims
to provide a robust solution to authentication concerns.</p>
      <p>In [11], a flexible network slicing framework is unveiled, featuring a regional orchestrator tasked
with coordinating workload dispersion among nearby fog nodes.. This orchestrator enables the
dynamic adjustment of allocation of resources to each slice determined by service requests and
energy accessibility..</p>
      <p>The utilization of queuing models to address resource allocation challenges in the coexistence of
various services with diverse QoS requirements within 4G/5G networks is explored in [12-14].
Specifically, the co-occurrence of machine-to-machine (M2M) communications in 4G networks is
investigated in [15].</p>
      <p>In [16-18], a queuing model is employed to analyze the repercussions of the Co-occurrence
between M2M communication within a New Radio (NR) system. This study aims to understand the
impacts of simultaneous M2M communication on network dynamics.</p>
      <p>Meanwhile, [19, 20] proposes a resource-sharing approach for Machine-to-Machine (M2M)
traffic within a time-regulated scheduling scheme within NR networks. This approach is designed
to efficiently manage and allocate resources between machine-based communications, contributing
to enhanced network performance.</p>
      <p>Taking into account the identified constraints characteristic of the aforementioned closely
related studies, let's formulate the object, subject, aim and tasks of our research.</p>
      <p>The object of the research is the controlled process of uplink transfer of segmented
informational messages from a finite set of terminals belonging to different sensor networks
deployed in the coverage area of the target 5G cluster.</p>
      <p>The subject of the research is the elements of queuing theory, Markov chains, and functional
analysis.</p>
      <p>The aim of the research is to streamline approaches to the analytical assessment of the quality of
the service-oriented, controlled process of handling mMTC subscriber traffic in a 5G cluster.</p>
      <p>Tasks of the research include:
•
•
•
•</p>
      <p>Parameterizing the research object with the formulation of the optimization problem
concerning a metric such as the volume of communication resources available to the 5G
base station for handling incoming mMTC traffic;
Formalizing a Markov service-oriented model for handling mMTC subscriber traffic in a
5G cluster;
Formalizing quality metric indicators for evaluating the instance of a 5G cluster with
mMTC traffic from multiple sensor networks;
Analyzing empirical results obtained during the demonstration of the proposed
mathematical framework's functionality.</p>
    </sec>
    <sec id="sec-2">
      <title>Models and methods</title>
      <p>Research Statement</p>
      <p>The focus of our research is on the 5G cluster, whose base station is capable of distributing
communication resources in the amount of V units. Within the coverage area of the
investigated cluster, mobile network operators potentially can offer subscribers specific
services, the list of which is generalized by the set S = {1, S} . In this context, the k -th operator,
k ∈ K ={1, K} , provides its subscribers with a list of services, generalized by the subset Sk ⊆ S .
In turn, supporting the s -th service, s ∈S , in an active state requires a minimum amount of
communication resources in the volume of vs units. The number of subscribers willing to use
the s -th service of the k -th operator will be denoted by the parameter Nks . Accordingly, the
total number of subscribers registered in the investigated 5G cluster will be determined as</p>
      <p>K K
N =∑ Nk =∑ ∑ Nks .</p>
      <p>k=1 k=1 s∈Sk</p>
      <p>Taking into account that vs = const ∀n ∈ N ={1, N} , the process of handling the distribution of
V units of communication resources among the elements of the tuple
S, K, N
can be
formulated as an optimization problem with the objective function
and a system of constraints
z ( V)</p>
      <p>K
=∑∑ pksVks → max</p>
      <p>
        k=1 s∈Sk
K
∑ ∑ pksVks ≤ V ,
k=1 s∈Sk
0 ≤ Vks ≤ V ,
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
where the parameter V represents the matrix form of the distribution, such as V = (Vks )s∈Sk ,k⊆K ,
Vks &gt; 0 ∀s ⊆ Sk , Vks = 0 ∀s ∉ Sk ; the parameter pks represents the priority of the s -th service of
the k -th operator, s ∈S , k ∈ K , 0 ≤ pks ≤ 1; the parameter Vks represents the volume of
communication resources that the base station allocates to support the s -th service of the k -th
operator (respectively, Vk = ∑ Vks is the volume of communication resources that the base
s∈Sk
station allocates to support the entire service package of the k -th operator).
      </p>
      <p>
        The optimization problem (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is formulated considering that the investigated 5G cluster
is oriented towards supporting mMTC technology. Therefore, during the problem formulation
stage, we only took into account the minimum amount of communication resources vs
necessary to support the s -th service, s ∈S . For example, if we were describing eMBB
(enhanced Mobile Broadband) technology, we would have needed to consider both the
minimum amount of communication resources vsmax and the maximum volume of
communication resources vsmax , which would be rational to anticipate for supporting the s -th
service.
      </p>
      <p>Service-oriented model for handling mMTC subscribers’ traffic in a 5G cluster
Let's formulate a service-oriented model for handling mMTC traffic in a 5G cluster. In doing so, we
will take into account the capabilities of the 5G technology's Network Slicing feature. The
implementation of this technology in the investigated 5G cluster allows the distribution of
communication resources at the base station among independent virtual network segments, each
assigned to respective mobile network operators. Within the allocated virtual network segment, an
operator ensures the support of a declared range of proprietary services with guaranteed data
transfer speeds.</p>
      <p>We will formulate a model of the investigated process based on the queuing systems theory.
Suppose N subscribers direct their requests to the base station to activate available services in the
portfolios of operators, each of which is associated with a corresponding virtual network segment.
It is assumed that a subscriber cannot submit a new request until receiving a response regarding the
recently submitted request (this restriction is introduced to prevent potential DoS attacks). The base
station has V units of communication resources available to handle subscribers' requests. The
incoming requests to the base station will be characterized by the arrival intensity η n &gt; 0 , n = 1, N ,
and the average length of the information message τ n ∈  , n = 1, N .</p>
      <p>If the communication resource allocation of volume V cannot be evenly distributed among
requests while adhering to the guaranteed resource volume v , then the incoming request is
redirected to a buffer with a capacity of w . Within this concept, we denote the maximum number
of requests that the base station can simultaneously handle as V v = K . Requests redirected to
the buffer may wait for service for an extended period, thereby leaving the system at an intensity
µ n &gt; 0 , individually denoted ∀n ∈ N .</p>
      <p>Let's characterize the above-defined process using stochastic dependence
K (t ) ∈{0,, V v} , representing the number of requests supported by the base station at the
moment t ≥ 0 . The state space determined by the dependence
K (t ) is identified as
Y : =∈{0,, {k K ,, min ( N , K + w)}} . Depending on the relationship between the available
communication resource volume at the base station and the number of active subscribers, the
investigated process can evolve according to three scenarios:</p>
      <p>1. The number of incoming requests from active subscribers is less than the number of
requests the base station can handle using the available communication resource volume:
0 &lt; N ≤ K . Therefore, all incoming requests will be accepted for service.</p>
      <p>2. The number of incoming requests from active subscribers is greater than the number of
requests the base station can handle using the available communication resource volume:
K &lt; N ≤ K + w . Therefore, incoming requests are redirected to the buffer.</p>
      <p>3. The number of incoming requests from active subscribers is greater than both the number
of requests the base station can handle using the available communication resource volume and
the buffer capacity: N &gt; K + w . Therefore, incoming requests will be lost.</p>
      <p>
        The system of equilibrium equations for the investigated process, represented by the
dependence K (t ) , taking into account the scenarios of its development described above, is
given by the form
Nη q0 = Vq1 τ ,

(( N − k )η + V τ ) qk = ( N − k + 1)η qk−1 +

+Vqk+1 τ ∀k =1,( K −1),

(( N − k )η + V τ + ( k − K )µ ) qk = ( N − k + 1)η qn−1 +

+ (V τ + ( k + 1 − K )µ ) qk+1∀k =K ,( K + w −1),

(V τ + wµ ) qK +w = ( N − K − w + 1)η qK +w−1,
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
where qk denotes the sought stationary probabilities of the investigated process being in the
k -th states, k ∈{0,, K ,, min ( N , K + w)} .
      </p>
      <p>
        From the system of equations (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), we express the stationary probability distribution as
(ητ V )k pNk q0∀k =1, min ( K , N ),

qk =  (τ V )K η k
 k−K  V + µ i  pNk q0∀k = ( K + 1), min ( K + w, N ),
∏
 i=1  τ 
where
q0
      </p>
      <p> min(K ,N ) ητ k
=∑ 1 
 k =p 0  V </p>
      <p> τ  K min(w,N −K )
Nk +   ∑
 V  k 1</p>
      <p>η k pNk 
=)+ (V τ µ i 
is involved.</p>
      <p>
        At known values of the indicators in (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) for the target service-oriented mMTC traffic
handling system in a 5G cluster, it is possible to calculate metrics of performance indicators,
including the probability Q of losing an incoming request due to system overload, the average
duration Tsys of a request's stay in the system (including the average service duration Tserv and
the average duration of a request's stay in the buffer Tbuf ), and the average number of requests
in the system Rsys (including the average number of requests in the service stage Rserv and the
average number of requests in the buffer Rbuf ):
      </p>
      <p>0∀0 &lt; N ≤ K + w,
Q = </p>
      <p>qK +w∀N &gt; K + w,
 N   N −1 
 ∑ iqi   ∑ ( N − k )η qk ∀0 &lt; N ≤ K + w,
 i =0  k =0 
Tsys =  K +w   K +w−1 
 ∑ iqi   ∑ ( N − k )η qk ∀N &gt; K + w,
 i =0  k =0 

</p>
      <p>N
∑ iqi
i=0
 ∑N−1( N − k )η qk</p>
      <p>
        ∀0 &lt; N ≤ K ,
Tserv
 k=0
 K N −K
 ∑ iqi + K ∑ qK +i
==−1  i 0N i =1∀K &lt; N ≤ K + w,
 ∑ ( N − k )η qk
 k=0
 K w
 ∑ iqi + K ∑ qK +i
 iK =+0w−1 i =1∀N &gt; K + w,
 ∑ ( N − k )η qk
 k=0
 N −K   N −1 
 ∑ iqK +i   ∑ ( N − k )η qk ∀K &lt; N ≤ K + w,
 i =1  k =0 
Tbuf =  w   K +w−1 
 ∑ iqK +i   ∑ ( N − k )η qk ∀N &gt; K + w,
 i =1  k =0 
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(7)
(8)
Rserv
 N
∑ iqi∀0 &lt; N ≤ K + w,
Rsys =  i=0
      </p>
      <p>K +w
 ∑ iqi∀N &gt; K + w,
 i=0
 N
∑ iqi∀0 &lt; N ≤ K ,
 i=0
 K N −K
=∑ iqi + K ∑ qK +i∀K &lt; N ≤ K + w,
 i =0 i =1
 K w
∑ iqi + K ∑ qK +i∀N &gt; K + w,
 i =0 i =1
N −K
 ∑ iqK +i∀K &lt; N ≤ K + w,
 i=1
Rbuf =  w
∑ iqK +i∀N &gt; K + w.

 i=1
(9)
(10)
(11)</p>
    </sec>
    <sec id="sec-3">
      <title>Results and Discussion</title>
      <p>
        We will apply the capabilities of the simulation modelling method to evaluate the typical instance
of the service-oriented mMTC traffic handling system in a 5G cluster in the qualitative metrics
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )(11).
      </p>
      <p>
        To calculate the indicators (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) by solving the system of equilibrium equations (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), we will assign
values to a series of input parameters specific to the investigated instance of the 5G cluster,
including: - The number of subscriber terminals N = 80 ; - Guaranteed volume of communication
resources allocated by the base station to serve an accepted request v = 512 Kbps; - Parameters of
the intensity of the exponentially distributed input request flow η = [0.01;30] ; - The
mathematical expectation of the exponentially distributed stochastic length of an information
message τ = 2048 Kb; - The intensity of requests leaving the buffer due to excessive waiting
time for service µ = 10−7 ; - The buffer capacity (in the number of requests) w = 30 .
      </p>
      <p>
        Based on the defined input parameters, we solve the system of equilibrium equations (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
using the Gaussian method to determine the probabilities (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ). As a result, all the values
necessary for calculating the qualitative metric indicators (
        <xref ref-type="bibr" rid="ref5">5</xref>
        )-(11) are determined.
      </p>
      <p>To demonstrate the informativeness of the proposed qualitative metric using expressions
(9)-(11), we will calculate the dependencies {Rsys , Rserv , Rbuf } = f (η ) on the specified total
volume of V = 16 Mbps of communication resources of the base station for the investigated
instance of the 5G cluster. The calculation results, presented in the form of graphs, are
visualized in Figure 1.</p>
      <p>The graphs presented in Fig. 1 show that the quality indicators (9)-(11) are sensitive to the
increasing intensity of incoming requests from subscriber terminals to the base station of the
investigated 5G cluster. Under the given initial parameters, buffer overflow is observed at
η ≥ 0.6 , synchronously reflected in the stabilization of the number of serviced requests in the
system (the graph of dependency Rsys = f (η ) ).</p>
      <p>An increase in the intensity η beyond the value of 0.6 is accompanied by the loss of new
incoming requests, as the system buffer is filled, and all available communication resources are
allocated to serve the accepted requests. It is worth noting separately that the nature of the
graphs presented in Fig. 1 and beyond corresponds to and is largely determined by the
distribution of the stochastic variable-argument.
R
20
10
0</p>
      <p>Rsys
Rserv</p>
      <p>Rbuf</p>
      <p>V=16 Mbps
0,0
0,2
0,4
0,8
1,0</p>
      <p>1,2
η</p>
      <p>0,6</p>
      <p>
        We complement the information presented in Fig. 1 by calculating the quality indicators
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )(8) for the investigated instance of the 5G cluster. The calculation results, visualized in the form
of the graphs of dependency {Tsys ,Tserv ,Tbuf } = f (η ) at V = 16 Mbps, are presented in Fig. 2.
      </p>
      <p>As expected, the shape and dynamics of the graphs of dependency {Tsys ,Tserv ,Tbuf } = f (η )
presented in Fig. 2 are similar to the results shown in Fig. 1.</p>
      <p>We observe that after η = 0.6 , the operation of the investigated 5G cluster stabilizes for all its
components (subscriber terminals (request generators), a base station (servicing device for
accepted requests), buffer (means of reducing the number of lost requests)).</p>
      <p>However, it should be noted that the plateau saturation of all graphs in Fig. 2 at η ≥ 0.6
indicates that the assigned values of the output parameters µ and w are too small, preventing
the base station from processing the parameterized flow of incoming requests without losses.</p>
      <p>This issue can be addressed by increasing either the value of µ (the characteristic parameter
of subscriber terminals), or the value of w (characteristic parameter of the base station), or the
values of both mentioned parameters.</p>
      <p>From Fig. 1 and Fig. 2, it is evident that the specified value of V = 16 Mbps is insufficient for the
effective operation of the 5G cluster, as defined by the corresponding configuration of output
parameter values. Let's explore how the behaviour of the investigated communication system will
change if the value of the parameter V significantly increases: V = 2.0 Gbps.</p>
      <p>We will conduct a study similar to the one depicted in Fig. 1 and Fig. 2.</p>
      <p>The calculation results of the dependencies {Rsys , Rserv , Rbuf } = f (η ) and {Tsys ,Tserv ,Tbuf } = f (η )
at V = 2.0 Gbps are presented in Fig. 3 and Fig. 4, respectively.
T
20
10</p>
      <p>0
40
35
30
25
20
R
15
10
5
0
-5
0,0
0,2
0,4
η
0,6
0,8
1,0
1,2</p>
      <p>Tsys, msec
Tserv, msec</p>
      <p>Tbuf, msec
V=3.6 Gbps
0
5
10
η
15
20</p>
      <p>Let's analyze the results presented in Fig. 3 and Fig. 4. In contrast to the uniform graphs shown
in Fig. 1 and Fig. 2, the graphs in Fig. 3 and Fig. 4 have an approximately linear character. This
indicates that the specified value of V = 2.0 Gbps is sufficient for servicing the flow of incoming
requests from V = 3.6 subscriber terminals directed towards the base station. The flow of incoming
requests is serviced without losses across the entire investigated range of argument values η .</p>
      <p>In
addition to the character of the
graphs of dependencies
{Rsys , Rserv} = f (η ) ,
{Tsys ,Tserv} = f (η ) , this is evidenced by the fact that the buffer is not utilized (the Rbuf = f (η ) ,
Tbuf = f (η ) graphs are parallel to the x-axis with ordinate values near zero).</p>
      <p>
        The obtained results indicate that for the investigated range of intensity values η , the specified
value of V = 2.0 Gbps is excessive for the 5G cluster under consideration. This brings us back to the
point that the value of the parameter V for the target information and communication system
should be chosen not empirically but as a result of solving the optimization problem with the
objective function (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), as outlined in Section 2.1.
      </p>
      <sec id="sec-3-1">
        <title>Conclusions</title>
        <p>In the list of technologies proposed by the 5G/IMT-2020 standards specification [1], the support for
massive Machine Type Communication (mMTC) holds a prominent position, and this is not
coincidental. The implementation of Industry 4.0 leads to a continuous expansion of sensor network
coverage areas, connecting them to the cloud via wired communication is neither technologically
nor economically feasible, and often simply impossible. The mMTC technology is specifically
designed to address a plethora of issues related to organizing informational interactions around
sensor networks. However, any system operates predictably and efficiently only if its structure is
transparent and optimal in the context of its intended purpose. Therefore, the research task of the
rational organization of the data collection process from multiple sensor networks with a finite
number of terminals, located in the vicinity of a 5G cluster, is relevant and of great practical
significance.</p>
        <p>To address the research task, the article proposes a Markov model of the controlled process of
uplink transfer of segmented informational messages from a finite set of terminals belonging to
different sensor networks deployed in the coverage area of the target 5G cluster. The segregation of
sensor networks at the model level is ensured by their service orientation in dedicated virtual
network segments organized in the information environment of the 5G base station. Moreover, the
model allows for establishing priorities for services characteristic of each sensor network. The
specificity of mMTC traffic is taken into account by the base station, which accepts an incoming
request only if there is a minimum guaranteed amount of available communication resources
necessary for its processing. It is assumed that an unaccepted request may wait for processing in a
buffer of finite capacity, which it leaves either upon acceptance for service or upon expiration of the
assigned waiting time.</p>
        <p>
          The model serves as the basis for formalizing the metrics of quality indicators, including the
probability of losing an incoming request due to system overload, indicators of the average duration
of a request's stay in the system, and indicators of the average number of requests in the system. To
demonstrate the functionality of the proposed mathematical framework for the target
serviceoriented traffic handling system of mMTC subscribers in a 5G cluster, dependencies of quality
metric indicators on the intensity of incoming requests to the base station were calculated. The
obtained results allowed for the estimation of the volume of communication resources that can be
reasonably predicted for the efficient operation of the target 5G cluster with mMTC traffic.
Further research is planned to focus on finding variations in the formulations of optimization
problems (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) capable of reflecting the specifics of different operating modes of the instance of
the service-oriented traffic handling system for mMTC subscribers in a 5G cluster. Additionally, the
intention is to compare and extend the results presented in [21, 22].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Acknowledgements</title>
        <p>The authors are grateful to all colleagues and institutions that contributed to the research and made
it possible to publish its results.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Funding</title>
        <p>This research is part of the project No. 2022/45/P/ST7/03450 co-funded by the National Science
Centre and the European Union Framework Programme for Research and Innovation Horizon 2020
under the Marie Skłodowska-Curie grant agreement No. 945339.</p>
      </sec>
      <sec id="sec-3-4">
        <title>References</title>
        <p>[7] X. Tong, X. Li, and Y. Liu, “An auction-based distributed network slicing scheme for resource
allocation in satellite-UAV integrated networks,” Computer Communications, vol. 210. Elsevier
BV, pp. 58–68, Oct. 2023. doi: 10.1016/j.comcom.2023.08.002.
[8] J. Huang et al., “Opportunistic capacity based resource allocation for 6G wireless systems with
network slicing,” Future Generation Computer Systems, vol. 140. Elsevier BV, pp. 390–401,
Mar. 2023. doi: 10.1016/j.future.2022.10.032.
[9] L. Zhang, B. Cao, and G. Feng, “Opportunistic admission and resource allocation for slicing
enhanced IoT networks,” Digital Communications and Networks, vol. 9, no. 6. Elsevier BV, pp.
1465–1476, Dec. 2023. doi: 10.1016/j.dcan.2022.08.007.
[10] K. Obelovska, O. Panova, and V. Karovič Jr., “Performance Analysis of Wireless Local Area
Network for a High-/Low-Priority Traffic Ratio at Different Numbers of Access Categories,”
Symmetry, vol. 13, no. 4. MDPI AG, p. 693, Apr. 15, 2021. doi: 10.3390/sym13040693..
[11] J. S. Camargo et al., “Dynamic slicing reconfiguration for virtualized 5G networks using ML
forecasting of computing capacity,” Computer Networks, vol. 236. Elsevier BV, p. 110001, Nov.
2023. doi: 10.1016/j.comnet.2023.110001.
[12] R. Shone, K. Glazebrook, and K. G. Zografos, “Resource allocation in congested queueing
systems with time-varying demand: An application to airport operations,” European Journal of
Operational Research, vol. 276, no. 2. Elsevier BV, pp. 566–581, Jul. 2019. doi:
10.1016/j.ejor.2019.01.024.
[13] J. Niño-Mora, “Resource allocation and routing in parallel multi-server queues with
abandonments for cloud profit maximization,” Computers &amp; Operations Research, vol. 103.</p>
        <p>Elsevier BV, pp. 221–236, Mar. 2019. doi: 10.1016/j.cor.2018.11.012.
[14] N. Dahlquist, A. Saradagi, and G. Nikolakopoulos, “Reactive Task Allocation for Balanced
Servicing of Multiple Task Queues,” IFAC-PapersOnLine, vol. 56, no. 2. Elsevier BV, pp. 9771–
9776, 2023. doi: 10.1016/j.ifacol.2023.10.293.
[15] U. Singh et al., “Scalable priority-based resource allocation scheme for M2M communication in
LTE/LTE-A network,” Computers and Electrical Engineering, vol. 103. Elsevier BV, p. 108321,
Oct. 2022. doi: 10.1016/j.compeleceng.2022.108321.
[16] A. Mishra, A. Swain, A. K. Ray, and R. M. Shubair, “HetNet/M2M/D2D communication in 5G
technologies,” 5G IoT and Edge Computing for Smart Healthcare. Elsevier, pp. 45–87, 2022. doi:
10.1016/b978-0-323-90548-0.00002-4.
[17] U. Singh et al., “Scalable priority-based resource allocation scheme for M2M communication in
LTE/LTE-A network,” Computers and Electrical Engineering, vol. 103. Elsevier BV, p. 108321,
Oct. 2022. doi: 10.1016/j.compeleceng.2022.108321.
[18] K. Boutiba, M. Bagaa, and A. Ksentini, “Optimal radio resource management in 5G NR
featuring network slicing,” Computer Networks, vol. 234. Elsevier BV, p. 109937, Oct. 2023. doi:
10.1016/j.comnet.2023.109937.
[19] R. Kumar, D. Sinwar, and V. Singh, “QoS aware resource allocation for coexistence mechanisms
between eMBB and URLLC: Issues, challenges, and future directions in 5G,” Computer
Communications, vol. 213. Elsevier BV, pp. 208–235, Jan. 2024. doi:
10.1016/j.comcom.2023.10.024.
[20] K. F. Muteba, K. Djouani, and T. Olwal, “5G NB-IoT: Design, Considerations, Solutions and
Challenges,” Procedia Computer Science, vol. 198. Elsevier BV, pp. 86–93, 2022. doi:
10.1016/j.procs.2021.12.214.
[21] V. Kovtun and K. Grochla, “Investigation of the competitive nature of eMBB and mMTC 5G
services in conditions of limited communication resource,” Scientific Reports, vol. 12, no. 1.</p>
        <p>Springer Science and Business Media LLC, Sep. 26, 2022. doi: 10.1038/s41598-022-20135-5.
[22] V. Kovtun, I. Izonin, and M. Gregus, “Modeling a session of subject-system interaction in a
wireless communication infrastructure with a mixed resource,” PLOS ONE, vol. 17, no. 7.
Public Library of Science (PLoS), p. e0271536, Jul. 18, 2022. doi: 10.1371/journal.pone.0271536.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fuentes</surname>
          </string-name>
          et al.,
          <source>“5G New Radio Evaluation Against IMT-2020 Key Performance Indicators,” IEEE Access</source>
          , vol.
          <volume>8</volume>
          . Institute of Electrical and Electronics
          <string-name>
            <surname>Engineers</surname>
          </string-name>
          (IEEE), pp.
          <fpage>110880</fpage>
          -
          <lpage>110896</lpage>
          ,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .1109/access.
          <year>2020</year>
          .
          <volume>3001641</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tyagi</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>Network resource management mechanisms in SDN enabled WSNs: A comprehensive review</article-title>
          ,” Computer Science Review, vol.
          <volume>49</volume>
          .
          <string-name>
            <surname>Elsevier</surname>
            <given-names>BV</given-names>
          </string-name>
          , p.
          <fpage>100569</fpage>
          ,
          <string-name>
            <surname>Aug</surname>
          </string-name>
          .
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .1016/j.cosrev.
          <year>2023</year>
          .
          <volume>100569</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Pana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. P.</given-names>
            <surname>Babalola</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Balyan</surname>
          </string-name>
          , “
          <article-title>5G radio access networks: A survey,” Array</article-title>
          , vol.
          <volume>14</volume>
          .
          <string-name>
            <surname>Elsevier</surname>
            <given-names>BV</given-names>
          </string-name>
          , p.
          <fpage>100170</fpage>
          ,
          <string-name>
            <surname>Jul</surname>
          </string-name>
          .
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1016/j.array.
          <year>2022</year>
          .
          <volume>100170</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Sharma</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , “
          <article-title>Resource allocation trends for ultra dense networks in 5G and beyond networks: A classification and comprehensive survey,” Physical Communication</article-title>
          , vol.
          <volume>48</volume>
          .
          <string-name>
            <surname>Elsevier</surname>
            <given-names>BV</given-names>
          </string-name>
          , p.
          <fpage>101415</fpage>
          ,
          <string-name>
            <surname>Oct</surname>
          </string-name>
          .
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1016/j.phycom.
          <year>2021</year>
          .
          <volume>101415</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>Miuccio</surname>
          </string-name>
          et al.,
          <article-title>“A QoS-aware and channel-aware Radio Resource Management framework for multi-numerology systems</article-title>
          ,” Computer Communications, vol.
          <volume>191</volume>
          .
          <string-name>
            <surname>Elsevier</surname>
            <given-names>BV</given-names>
          </string-name>
          , pp.
          <fpage>299</fpage>
          -
          <lpage>314</lpage>
          , Jul.
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1016/j.comcom.
          <year>2022</year>
          .
          <volume>05</volume>
          .009.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sinwar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G,” Computer Communications</article-title>
          , vol.
          <volume>213</volume>
          .
          <string-name>
            <surname>Elsevier</surname>
            <given-names>BV</given-names>
          </string-name>
          , pp.
          <fpage>208</fpage>
          -
          <lpage>235</lpage>
          , Jan.
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1016/j.comcom.
          <year>2023</year>
          .
          <volume>10</volume>
          .024.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>