<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Service-oriented model for handling mMTC subscribers&apos; traffic in a 5G cluster</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Viacheslav</forename><surname>Kovtun</surname></persName>
							<email>vkovtun@iitis.pl</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Theoretical and Applied Informatics Polish Academy of Sciences</orgName>
								<address>
									<addrLine>Bałtycka Str., 5</addrLine>
									<postCode>44-100</postCode>
									<settlement>Gliwice</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oksana</forename><surname>Kovtun</surname></persName>
							<email>o.kovtun@donnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Theoretical and Applied Informatics Polish Academy of Sciences</orgName>
								<address>
									<addrLine>Bałtycka Str., 5</addrLine>
									<postCode>44-100</postCode>
									<settlement>Gliwice</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Vasyl&apos; Stus Donetsk National University</orgName>
								<address>
									<addrLine>600-richchya Str., 21</addrLine>
									<postCode>21000</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Workshop on Intelligent Information Technologies and Systems of Information Security</orgName>
								<orgName type="laboratory">IntelITSIS&apos;2024</orgName>
								<address>
									<addrLine>March 28</addrLine>
									<postCode>2024</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Service-oriented model for handling mMTC subscribers&apos; traffic in a 5G cluster</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4174775AB885AEC825B27EB2F436960D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:05+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>5G Cluster</term>
					<term>Sensor Network</term>
					<term>mMTC Traffic</term>
					<term>Communication Resource Handling</term>
					<term>Markov Model</term>
					<term>Quality</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article addresses the research task of rational organization of the data collection process from multiple sensor networks with a finite number of terminals located in the 5G cluster coverage. The proposed solution is based on a Markov model of the controlled process of uplink transfer of segmented informational messages from a finite set of terminals belonging to different sensor networks deployed in the coverage area of the target 5G cluster. The segregation of sensor networks at the model level is ensured by their service orientation in dedicated virtual network segments organized in the information environment of the 5G base station. Moreover, the model allows for establishing priorities for services characteristic of each sensor network. The specificity of mMTC traffic is taken into account by the base station, which accepts an incoming request only if there is a minimum guaranteed amount of available communication resources necessary for its processing. It is assumed that an unaccepted request may wait for processing in a buffer of finite capacity, which it leaves either upon acceptance for service or upon expiration of the assigned waiting time. The model serves as the basis for formalizing the metrics of quality indicators, including the probability of losing an incoming request due to system overload, indicators of the average duration of a request's stay in the system, and indicators of the average number of requests in the system. To demonstrate the functionality of the proposed mathematical framework for the target service-oriented traffic handling system of mMTC subscribers in a 5G cluster, dependencies of quality metric indicators on the intensity of incoming requests to the base station were calculated. The obtained results allowed for the estimation of the volume of communication resources that can be reasonably predicted for the efficient operation of the target 5G cluster with mMTC traffic.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>In the list of technologies proposed by the 5G/IMT-2020 standards specification <ref type="bibr" target="#b0">[1]</ref>, the support for massive Machine Type Communication (mMTC) holds a prominent position, and this is not coincidental. The implementation of Industry 4.0 leads to a continuous expansion of sensor network coverage areas, connecting them to the cloud via wired communication is neither technologically nor economically feasible, and often simply impossible. The mMTC technology is specifically designed to address a plethora of issues related to organizing informational interactions around sensor networks. However, any system operates predictably and efficiently only if its structure is transparent and optimal in the context of its intended purpose. Therefore, the research task of the rational organization of the data collection process from multiple sensor networks with a finite number of terminals, located in the vicinity of a 5G cluster, is relevant and of great practical significance.</p><p>Numerous research papers have delved into the exploration and examination of radio resource management, control and allocation techniques within 5G networks, as evidenced by a collection of studies <ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref>. The intricate aspects of radio resource control and Quality of Service (QoS) provisions for 5G network slices have been introduced and scrutinized in various research endeavours <ref type="bibr" target="#b5">[5,</ref><ref type="bibr" target="#b6">6]</ref>. Recent works have also addressed the introduction and discussion of resource allocation strategies and challenges pertinent to network slicing <ref type="bibr" target="#b7">[7]</ref><ref type="bibr" target="#b8">[8]</ref><ref type="bibr" target="#b9">[9]</ref>.</p><p>The investigation of slice isolation's end-to-end behaviour, particularly from a security standpoint, is the focus of <ref type="bibr" target="#b10">[10]</ref>. This study classifies isolations such as traffic, processing, bandwidth or storage, while also addressing challenges associated with the contemporary trends in 5G slice isolation. The authors emphasize that isolation stands out as the most pivotal characteristic of network slicing. <ref type="bibr" target="#b18">[18]</ref> introduces an effective and secure service-oriented authentication framework designed to facilitate network slicing within the 5G-powered Internet of Things network. The framework aims to provide a robust solution to authentication concerns.</p><p>In <ref type="bibr" target="#b11">[11]</ref>, a flexible network slicing framework is unveiled, featuring a regional orchestrator tasked with coordinating workload dispersion among nearby fog nodes.. This orchestrator enables the dynamic adjustment of allocation of resources to each slice determined by service requests and energy accessibility..</p><p>The utilization of queuing models to address resource allocation challenges in the coexistence of various services with diverse QoS requirements within 4G/5G networks is explored in <ref type="bibr" target="#b12">[12]</ref><ref type="bibr" target="#b13">[13]</ref><ref type="bibr" target="#b14">[14]</ref>. Specifically, the co-occurrence of machine-to-machine (M2M) communications in 4G networks is investigated in <ref type="bibr" target="#b15">[15]</ref>.</p><p>In <ref type="bibr" target="#b16">[16]</ref><ref type="bibr" target="#b17">[17]</ref><ref type="bibr" target="#b18">[18]</ref>, a queuing model is employed to analyze the repercussions of the Co-occurrence between M2M communication within a New Radio (NR) system. This study aims to understand the impacts of simultaneous M2M communication on network dynamics.</p><p>Meanwhile, <ref type="bibr" target="#b19">[19,</ref><ref type="bibr" target="#b20">20]</ref> proposes a resource-sharing approach for Machine-to-Machine (M2M) traffic within a time-regulated scheduling scheme within NR networks. This approach is designed to efficiently manage and allocate resources between machine-based communications, contributing to enhanced network performance.</p><p>Taking into account the identified constraints characteristic of the aforementioned closely related studies, let's formulate the object, subject, aim and tasks of our research.</p><p>The object of the research is the controlled process of uplink transfer of segmented informational messages from a finite set of terminals belonging to different sensor networks deployed in the coverage area of the target 5G cluster.</p><p>The subject of the research is the elements of queuing theory, Markov chains, and functional analysis.</p><p>The aim of the research is to streamline approaches to the analytical assessment of the quality of the service-oriented, controlled process of handling mMTC subscriber traffic in a 5G cluster.</p><p>Tasks of the research include:</p><p>• Parameterizing the research object with the formulation of the optimization problem concerning a metric such as the volume of communication resources available to the 5G base station for handling incoming mMTC traffic; • Formalizing a Markov service-oriented model for handling mMTC subscriber traffic in a 5G cluster; • Formalizing quality metric indicators for evaluating the instance of a 5G cluster with mMTC traffic from multiple sensor networks; • Analyzing empirical results obtained during the demonstration of the proposed mathematical framework's functionality.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Models and methods</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Research Statement</head><p>The focus of our research is on the 5G cluster, whose base station is capable of distributing communication resources in the amount of V units. Within the coverage area of the investigated cluster, mobile network operators potentially can offer subscribers specific services, the list of which is generalized by the set { } S 1, S = . In this context, the k -th operator,</p><formula xml:id="formula_0">{ } K 1, k K ∈ =</formula><p>, provides its subscribers with a list of services, generalized by the subset S k S ⊆ .</p><p>In turn, supporting the s -th service, S s ∈ , in an active state requires a minimum amount of communication resources in the volume of s v units. The number of subscribers willing to use the s -th service of the k -th operator will be denoted by the parameter ks N . Accordingly, the total number of subscribers registered in the investigated 5G cluster will be determined as</p><formula xml:id="formula_1">1 1 S k K K k ks k k s N N N = = ∈ = = ∑ ∑ ∑ .</formula><p>Taking into account that const</p><formula xml:id="formula_2">s v = { } N 1, n N ∀ ∈ =</formula><p>, the process of handling the distribution of V units of communication resources among the elements of the tuple S, K, N can be formulated as an optimization problem with the objective function ( )</p><formula xml:id="formula_3">1 S V max k K ks ks k s z p V = ∈ = → ∑ ∑<label>(1)</label></formula><p>and a system of constraints</p><formula xml:id="formula_4">1 S , 0 , k K ks ks k s ks p V V V V = ∈ ≤ ≤ ≤ ∑ ∑<label>(2)</label></formula><p>where the parameter V represents the matrix form of the distribution, such as</p><formula xml:id="formula_5">( ) , V k ks s S k K V ∈ ⊆ = , 0 ks V &gt; k s S ∀ ⊆ , 0 ks V = k s S ∀ ∉ ; the parameter ks p represents the priority of the s -th service of the k -th operator, S s ∈ , K k ∈ , 0 1 ks p ≤</formula><p>≤ ; the parameter ks V represents the volume of communication resources that the base station allocates to support the s -th service of the k -th operator (respectively,</p><formula xml:id="formula_6">k k ks s S V V ∈ =</formula><p>∑ is the volume of communication resources that the base station allocates to support the entire service package of the k -th operator).</p><p>The optimization problem (1), ( <ref type="formula" target="#formula_4">2</ref>) is formulated considering that the investigated 5G cluster is oriented towards supporting mMTC technology. Therefore, during the problem formulation stage, we only took into account the minimum amount of communication resources s v necessary to support the s -th service, S s ∈ . For example, if we were describing eMBB (enhanced Mobile Broadband) technology, we would have needed to consider both the minimum amount of communication resources Service-oriented model for handling mMTC subscribers' traffic in a 5G cluster Let's formulate a service-oriented model for handling mMTC traffic in a 5G cluster. In doing so, we will take into account the capabilities of the 5G technology's Network Slicing feature. The implementation of this technology in the investigated 5G cluster allows the distribution of communication resources at the base station among independent virtual network segments, each assigned to respective mobile network operators. Within the allocated virtual network segment, an operator ensures the support of a declared range of proprietary services with guaranteed data transfer speeds. We will formulate a model of the investigated process based on the queuing systems theory. Suppose N subscribers direct their requests to the base station to activate available services in the portfolios of operators, each of which is associated with a corresponding virtual network segment. It is assumed that a subscriber cannot submit a new request until receiving a response regarding the recently submitted request (this restriction is introduced to prevent potential DoS attacks). The base station has V units of communication resources available to handle subscribers' requests. The incoming requests to the base station will be characterized by the arrival intensity</p><formula xml:id="formula_7">0 n η &gt; , 1, n N = ,</formula><p>and the average length of the information message n τ ∈  ,</p><formula xml:id="formula_8">1, n N = .</formula><p>If the communication resource allocation of volume V cannot be evenly distributed among requests while adhering to the guaranteed resource volume v , then the incoming request is redirected to a buffer with a capacity of w . Within this concept, we denote the maximum number of requests that the base station can simultaneously handle as</p><formula xml:id="formula_9">V v K =     .</formula><p>Requests redirected to the buffer may wait for service for an extended period, thereby leaving the system at an intensity</p><formula xml:id="formula_10">0 n µ &gt; , individually denoted N n ∀ ∈ .</formula><p>Let's characterize the above-defined process using stochastic dependence</p><formula xml:id="formula_11">( ) { } 0, , K t V v ∈     </formula><p>, representing the number of requests supported by the base station at the moment 0 t ≥ . The state space determined by the dependence ( )</p><formula xml:id="formula_12">K t is identified as ( ) { } { } : 0, , , , min , Y k K N K w = ∈ +  </formula><p>. Depending on the relationship between the available communication resource volume at the base station and the number of active subscribers, the investigated process can evolve according to three scenarios:</p><p>1. The number of incoming requests from active subscribers is less than the number of requests the base station can handle using the available communication resource volume: 0 N K &lt; ≤ . Therefore, all incoming requests will be accepted for service.</p><p>2. The number of incoming requests from active subscribers is greater than the number of requests the base station can handle using the available communication resource volume: K N K w &lt; ≤ + . Therefore, incoming requests are redirected to the buffer.</p><p>3. The number of incoming requests from active subscribers is greater than both the number of requests the base station can handle using the available communication resource volume and the buffer capacity: N K w &gt; + . Therefore, incoming requests will be lost. The system of equilibrium equations for the investigated process, represented by the dependence ( ) K t , taking into account the scenarios of its development described above, is given by the form</p><formula xml:id="formula_13">( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) 0 1 1 1 1 1 1 ,<label>1 1, 1 , 1 1 , 1 , 1 ,</label></formula><formula xml:id="formula_14">k k k k n k K w K w N q Vq N k V q N k q Vq k K N k V k K q N k q V k K q k K K w V w q N K w q η τ η τ η τ η τ µ η τ µ τ µ η − + − + + + − =   − + = − + +   + ∀ = −   − + + − = − + +   + + + − ∀ = + −   + = − − +  (3)</formula><p>where k q denotes the sought stationary probabilities of the investigated process being in the k -th states,</p><formula xml:id="formula_15">( ) { } 0, , , , min , k K N K w ∈ +   .</formula><p>From the system of equations (3), we express the stationary probability distribution as</p><formula xml:id="formula_16">( ) ( ) ( ) ( ) ( ) 0 0 1 1, min , , 1 , min , , k k N K k k k N k K i V p q k K N V q p q k K K w N V i ητ τ η µ τ − =  ∀ =   =  ∀ = + +    +       ∏<label>(4)</label></formula><p>where</p><formula xml:id="formula_17">( ) ( ) ( ) min , min , 0 0 1 1 k K N K w N K k k k N N k k p q p V V V i η ητ τ τ µ − = =       = +         +       ∑ ∑ is involved.</formula><p>At known values of the indicators in (4) for the target service-oriented mMTC traffic handling system in a 5G cluster, it is possible to calculate metrics of performance indicators, including the probability Q of losing an incoming request due to system overload, the average duration sys T of a request's stay in the system (including the average service duration serv T and the average duration of a request's stay in the buffer buf T ), and the average number of requests in the system sys R (including the average of requests in the service stage serv R and the average number of requests in the buffer buf R ):</p><formula xml:id="formula_18">0 0 , , K w N K w Q q N K w + ∀ &lt; ≤ +  =  ∀ &gt; + <label>(5) ( )</label></formula><p>( )</p><formula xml:id="formula_19">1 0 0 1 0 0 0 , , N N i k i k sys K w K w i k i k iq N k q N K w T iq N k q N K w η η − = = + + − = =     − ∀ &lt; ≤ +         =       − ∀ &gt; +           ∑ ∑ ∑ ∑<label>(6) ( ) ( ) (</label></formula><p>)</p><formula xml:id="formula_20">0 1 0 0 1 1 0 0 1 1 0 0 , , , N i i N k k K N K i K i i i serv N k k K w i K i i i K w k k iq N K N k q iq K q T K N K w N k q iq K q N K w N k q η η η = − = − + = = − = + = = + − =    ∀ &lt; ≤  −    +   = ∀ &lt; ≤ +   −    +  ∀ &gt; +   −   ∑ ∑ ∑ ∑ ∑ ∑ ∑ ∑ (7) ( ) ( ) 1 1 0 1 1 0 , , N K N K i k i k buf w K w K i k i k iq N k q K N K w T iq N k q N K w η η − − + = = + − + = =     − ∀ &lt; ≤ +         =       − ∀ &gt; +           ∑ ∑ ∑ ∑ (8) 0 0 0 , , N i i sys K w i i iq N K w R iq N K w = + =  ∀ &lt; ≤ +   =   ∀ &gt; +   ∑ ∑ (9) 0 0 1 0 1 0 , , , N i i K N K serv i K i i i K w i K i i i iq N K R iq K q K N K w iq K q N K w = − + = = + = =  ∀ &lt; ≤    = + ∀ &lt; ≤ +    + ∀ &gt; +   ∑ ∑ ∑ ∑ ∑ (10) 1 1 , . N K K i i buf w K i i iq K N K w R iq N K w − + = + =  ∀ &lt; ≤ +   =   ∀ &gt; +   ∑ ∑ (11)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Results and Discussion</head><p>We will apply the capabilities of the simulation modelling method to evaluate the typical instance of the service-oriented mMTC traffic handling system in a 5G cluster in the qualitative metrics ( <ref type="formula" target="#formula_18">5</ref>)- <ref type="bibr" target="#b11">(11)</ref>. To calculate the indicators (4) by solving the system of equilibrium equations (3), we will assign values to a series of input parameters specific to the investigated instance of the 5G cluster, including: -The number of subscriber terminals Based on the defined input parameters, we solve the system of equilibrium equations (3) using the Gaussian method to determine the probabilities (4). As a result, all the values necessary for calculating the qualitative metric indicators ( <ref type="formula" target="#formula_18">5</ref>)-( <ref type="formula">11</ref>) are determined.</p><p>To demonstrate the informativeness of the proposed qualitative metric using expressions ( <ref type="formula">9</ref>)-( <ref type="formula">11</ref>), we will calculate the dependencies { } ( )   , ,</p><formula xml:id="formula_21">sys serv buf R R R f η = on the specified total volume of 16 V =</formula><p>Mbps of communication resources of the base station for the investigated instance of the 5G cluster. The calculation results, presented in the form of graphs, are visualized in Figure <ref type="figure" target="#fig_2">1</ref>.</p><p>The graphs presented in Fig. <ref type="figure" target="#fig_2">1</ref> show that the quality indicators ( <ref type="formula">9</ref>)-( <ref type="formula">11</ref>) are sensitive to the increasing intensity of incoming requests from subscriber terminals to the base station of the investigated 5G cluster. Under the given initial parameters, buffer overflow is observed at 0.6 η ≥</p><p>, synchronously reflected in the stabilization of the number of serviced requests in the system (the graph of dependency</p><formula xml:id="formula_22">( ) sys R f η = ).</formula><p>An increase in the intensity η beyond the value of 0.6 is accompanied by the loss of new incoming requests, as the system buffer is filled, and all available communication resources are allocated to serve the accepted requests. It is worth noting separately that the nature of the graphs presented in Fig. <ref type="figure" target="#fig_2">1</ref> and beyond corresponds to and is largely determined by the distribution of the stochastic variable-argument. , ,</p><formula xml:id="formula_23">sys serv buf R R R f η = , calculated at 16 V =</formula><p>Mbps.</p><p>We complement the information presented in Fig. <ref type="figure" target="#fig_2">1</ref> by calculating the quality indicators ( <ref type="formula" target="#formula_19">6</ref>)-( <ref type="formula">8</ref>) for the investigated instance of the 5G cluster. The calculation results, visualized in the form of the graphs of dependency { } ( )   , ,</p><formula xml:id="formula_24">sys serv buf T T T f η = at 16 V =</formula><p>Mbps, are presented in Fig. <ref type="figure" target="#fig_4">2</ref>.</p><p>As expected, the shape and dynamics of the graphs of dependency { } ( )   , ,</p><formula xml:id="formula_25">sys serv buf T T T f η =</formula><p>presented in Fig. <ref type="figure" target="#fig_4">2</ref> are similar to the results shown in Fig. <ref type="figure" target="#fig_2">1</ref>. We observe that after 0.6 η =</p><p>, the operation of the investigated 5G cluster stabilizes for all its components (subscriber terminals (request generators), a base station (servicing device for accepted requests), buffer (means of reducing the number of lost requests)).</p><p>However, it should be noted that the plateau saturation of all graphs in Fig. <ref type="figure" target="#fig_4">2</ref> at 0.6 η ≥ indicates that the assigned values of the output parameters µ and w are too small, preventing the base station from processing the parameterized flow of incoming requests without losses.</p><p>This issue can be addressed by increasing either the value of µ (the characteristic parameter of subscriber terminals), or the value of w (characteristic parameter of the base station), or the values of both mentioned parameters. From Fig. <ref type="figure" target="#fig_2">1</ref> and Fig. <ref type="figure" target="#fig_4">2</ref>, it is evident that the specified value of 16 V =</p><p>Mbps is insufficient for the effective operation of the 5G cluster, as defined by the corresponding configuration of output parameter values. Let's explore how the behaviour of the investigated communication system will change if the value of the parameter V significantly increases:</p><formula xml:id="formula_26">2.0 V =</formula><p>Gbps. We will conduct a study similar to the one depicted in Fig. <ref type="figure" target="#fig_2">1</ref> and Fig. <ref type="figure" target="#fig_4">2</ref>.</p><p>The calculation results of the dependencies { } ( )   , ,</p><formula xml:id="formula_27">sys serv buf R R R f η = and { } ( ) , , sys serv buf T T T f η = at 2.0 V =</formula><p>Gbps are presented in Fig. <ref type="figure">3</ref> and Fig. <ref type="figure">4</ref>, respectively.   Let's analyze the results presented in Fig. <ref type="figure">3</ref> and Fig. <ref type="figure">4</ref>. In contrast to the uniform graphs shown in Fig. <ref type="figure" target="#fig_2">1</ref> and Fig. <ref type="figure" target="#fig_4">2</ref>, the graphs in Fig. <ref type="figure">3</ref> and Fig. <ref type="figure">4</ref> have an approximately linear character. This indicates that the specified value of 2.0 V = Gbps is sufficient for servicing the flow of incoming requests from 3.6 V = subscriber terminals directed towards the base station. The flow of incoming requests is serviced without losses across the entire investigated range of argument values η .</p><p>In addition to the character of the graphs of dependencies { } ( ) The obtained results indicate that for the investigated range of intensity values η , the specified value of 2.0 V = Gbps is excessive for the 5G cluster under consideration. This brings us back to the point that the value of the parameter V for the target information and communication system should be chosen not empirically but as a result of solving the optimization problem with the objective function (1), as outlined in Section 2.1.</p><formula xml:id="formula_28">, sys serv R R f η = , { } ( )</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusions</head><p>In the list of technologies proposed by the 5G/IMT-2020 standards specification <ref type="bibr" target="#b0">[1]</ref>, the support for massive Machine Type Communication (mMTC) holds a prominent position, and this is not coincidental. The implementation of Industry 4.0 leads to a continuous expansion of sensor network coverage areas, connecting them to the cloud via wired communication is neither technologically nor economically feasible, and often simply impossible. The mMTC technology is specifically designed to address a plethora of issues related to organizing informational interactions around sensor networks. However, any system operates predictably and efficiently only if its structure is transparent and optimal in the context of its intended purpose. Therefore, the research task of the rational organization of the data collection process from multiple sensor networks with a finite number of terminals, located in the vicinity of a 5G cluster, is relevant and of great practical significance.</p><p>To address the research task, the article proposes a Markov model of the controlled process of uplink transfer of segmented informational messages from a finite set of terminals belonging to different sensor networks deployed in the coverage area of the target 5G cluster. The segregation of sensor networks at the model level is ensured by their service orientation in dedicated virtual network segments organized in the information environment of the 5G base station. Moreover, the model allows for establishing priorities for services characteristic of each sensor network. The specificity of mMTC traffic is taken into account by the base station, which accepts an incoming request only if there is a minimum guaranteed amount of available communication resources necessary for its processing. It is assumed that an unaccepted request may wait for processing in a buffer of finite capacity, which it leaves either upon acceptance for service or upon expiration of the assigned waiting time.</p><p>The model serves as the basis for formalizing the metrics of quality indicators, including the probability of losing an incoming request due to system overload, indicators of the average duration of a request's stay in the system, and indicators of the average number of requests in the system. To demonstrate the functionality of the proposed mathematical framework for the target serviceoriented traffic handling system of mMTC subscribers in a 5G cluster, dependencies of quality metric indicators on the intensity of incoming requests to the base station were calculated. The obtained results allowed for the estimation of the volume of communication resources that can be reasonably predicted for the efficient operation of the target 5G cluster with mMTC traffic. Further research is planned to focus on finding variations in the formulations of optimization problems (1), (2) capable of reflecting the specifics of different operating modes of the instance of the service-oriented traffic handling system for mMTC subscribers in a 5G cluster. Additionally, the intention is to compare and extend the results presented in <ref type="bibr" target="#b21">[21,</ref><ref type="bibr" target="#b22">22]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>would be rational to anticipate for supporting the s -th service.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>80 N = ; -Guaranteed volume of communication resources allocated by the base station to serve an accepted request 512 v = Kbps; -Parameters of the intensity of the exponentially distributed input request flow mathematical expectation of the exponentially distributed stochastic length of an information message 2048 τ = Kb; -The intensity of requests leaving the buffer due to excessive waiting time for service buffer capacity (in the number of requests) 30 w = .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The graphs of dependency { } ( )</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: The graphs of dependency { } ( ) , , sys serv buf T T T</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 3 :Figure 4 :</head><label>34</label><figDesc>Figure 3: The graphs of dependency { } ( ) , , sys serv buf R R R</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head></head><label></label><figDesc>evidenced by the fact that the buffer is not utilized (the to the x-axis with ordinate values near zero).</figDesc></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>The authors are grateful to all colleagues and institutions that contributed to the research and made it possible to publish its results.</p></div>
			</div>


			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Funding</head><p>This research is part of the project No. 2022/45/P/ST7/03450 co-funded by the National Science Centre and the European Union Framework Programme for Research and Innovation Horizon 2020 under the Marie Skłodowska-Curie grant agreement No. 945339.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">5G New Radio Evaluation Against IMT-2020 Key Performance Indicators</title>
		<author>
			<persName><forename type="first">M</forename><surname>Fuentes</surname></persName>
		</author>
		<idno type="DOI">10.1109/access.2020.3001641</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="110880" to="110896" />
			<date type="published" when="2020">2020</date>
			<publisher>IEEE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Network resource management mechanisms in SDN enabled WSNs: A comprehensive review</title>
		<author>
			<persName><forename type="first">V</forename><surname>Tyagi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Singh</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cosrev.2023.100569</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Science Review</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="page">100569</biblScope>
			<date type="published" when="2023-08">Aug. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">5G radio access networks: A survey</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Pana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">P</forename><surname>Babalola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Balyan</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.array.2022.100170</idno>
	</analytic>
	<monogr>
		<title level="j">Array</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page">100170</biblScope>
			<date type="published" when="2022-07">Jul. 2022</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Resource allocation trends for ultra dense networks in 5G and beyond networks: A classification and comprehensive survey</title>
		<author>
			<persName><forename type="first">N</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physical Communication</title>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title/>
		<idno type="DOI">10.1016/j.phycom.2021.101415</idno>
		<imprint>
			<date type="published" when="2021-10">Oct. 2021</date>
			<publisher>Elsevier BV</publisher>
			<biblScope unit="page">101415</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A QoS-aware and channel-aware Radio Resource Management framework for multi-numerology systems</title>
		<author>
			<persName><forename type="first">L</forename><surname>Miuccio</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.comcom.2022.05.009</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Communications</title>
		<imprint>
			<biblScope unit="volume">191</biblScope>
			<biblScope unit="page" from="299" to="314" />
			<date type="published" when="2022-07">Jul. 2022</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sinwar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Singh</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.comcom.2023.10.024</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Communications</title>
		<imprint>
			<biblScope unit="volume">213</biblScope>
			<biblScope unit="page" from="208" to="235" />
			<date type="published" when="2024-01">Jan. 2024</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">An auction-based distributed network slicing scheme for resource allocation in satellite-UAV integrated networks</title>
		<author>
			<persName><forename type="first">X</forename><surname>Tong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.comcom.2023.08.002</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Communications</title>
		<imprint>
			<biblScope unit="volume">210</biblScope>
			<biblScope unit="page" from="58" to="68" />
			<date type="published" when="2023-10">Oct. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Opportunistic capacity based resource allocation for 6G wireless systems with network slicing</title>
		<author>
			<persName><forename type="first">J</forename><surname>Huang</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.future.2022.10.032</idno>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">140</biblScope>
			<biblScope unit="page" from="390" to="401" />
			<date type="published" when="2023-03">Mar. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Opportunistic admission and resource allocation for slicing enhanced IoT networks</title>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Feng</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.dcan.2022.08.007</idno>
	</analytic>
	<monogr>
		<title level="j">Digital Communications and Networks</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1465" to="1476" />
			<date type="published" when="2023-12">Dec. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Performance Analysis of Wireless Local Area Network for a High-/Low-Priority Traffic Ratio at Different Numbers of Access Categories</title>
		<author>
			<persName><forename type="first">K</forename><surname>Obelovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Panova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Karovič</surname><genName>Jr</genName></persName>
		</author>
		<idno type="DOI">10.3390/sym13040693</idno>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">693</biblScope>
			<date type="published" when="2021-04-15">Apr. 15, 2021</date>
			<publisher>MDPI AG</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Dynamic slicing reconfiguration for virtualized 5G networks using ML forecasting of computing capacity</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Camargo</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.comnet.2023.110001</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Networks</title>
		<imprint>
			<biblScope unit="volume">236</biblScope>
			<biblScope unit="page">110001</biblScope>
			<date type="published" when="2023-11">Nov. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Resource allocation in congested queueing systems with time-varying demand: An application to airport operations</title>
		<author>
			<persName><forename type="first">R</forename><surname>Shone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Glazebrook</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">G</forename><surname>Zografos</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ejor.2019.01.024</idno>
	</analytic>
	<monogr>
		<title level="j">European Journal of Operational Research</title>
		<imprint>
			<biblScope unit="volume">276</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="566" to="581" />
			<date type="published" when="2019-07">Jul. 2019</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Resource allocation and routing in parallel multi-server queues with abandonments for cloud profit maximization</title>
		<author>
			<persName><forename type="first">J</forename><surname>Niño-Mora</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cor.2018.11.012</idno>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Operations Research</title>
		<imprint>
			<biblScope unit="volume">103</biblScope>
			<biblScope unit="page" from="221" to="236" />
			<date type="published" when="2019-03">Mar. 2019</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Reactive Task Allocation for Balanced Servicing of Multiple Task Queues</title>
		<author>
			<persName><forename type="first">N</forename><surname>Dahlquist</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Saradagi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Nikolakopoulos</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ifacol.2023.10.293</idno>
	</analytic>
	<monogr>
		<title level="j">IFAC-PapersOnLine</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="9771" to="9776" />
			<date type="published" when="2023">2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Scalable priority-based resource allocation scheme for M2M communication in LTE/LTE-A network</title>
		<author>
			<persName><forename type="first">U</forename><surname>Singh</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.compeleceng.2022.108321</idno>
	</analytic>
	<monogr>
		<title level="j">Computers and Electrical Engineering</title>
		<imprint>
			<biblScope unit="volume">103</biblScope>
			<biblScope unit="page">108321</biblScope>
			<date type="published" when="2022-10">Oct. 2022</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">HetNet/M2M/D2D communication in 5G technologies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Swain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Ray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Shubair</surname></persName>
		</author>
		<idno type="DOI">10.1016/b978-0-323-90548-0.00002-4</idno>
	</analytic>
	<monogr>
		<title level="m">5G IoT and Edge Computing for Smart Healthcare</title>
				<imprint>
			<publisher>Elsevier</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="45" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Scalable priority-based resource allocation scheme for M2M communication in LTE/LTE-A network</title>
		<author>
			<persName><forename type="first">U</forename><surname>Singh</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.compeleceng.2022.108321</idno>
	</analytic>
	<monogr>
		<title level="j">Computers and Electrical Engineering</title>
		<imprint>
			<biblScope unit="volume">103</biblScope>
			<biblScope unit="page">108321</biblScope>
			<date type="published" when="2022-10">Oct. 2022</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Optimal radio resource management in 5G NR featuring network slicing</title>
		<author>
			<persName><forename type="first">K</forename><surname>Boutiba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bagaa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ksentini</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.comnet.2023.109937</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Networks</title>
		<imprint>
			<biblScope unit="volume">234</biblScope>
			<biblScope unit="page">109937</biblScope>
			<date type="published" when="2023-10">Oct. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sinwar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Singh</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.comcom.2023.10.024</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Communications</title>
		<imprint>
			<biblScope unit="volume">213</biblScope>
			<biblScope unit="page" from="208" to="235" />
			<date type="published" when="2024-01">Jan. 2024</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">5G NB-IoT: Design, Considerations, Solutions and Challenges</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">F</forename><surname>Muteba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Djouani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Olwal</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.procs.2021.12.214</idno>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">198</biblScope>
			<biblScope unit="page" from="86" to="93" />
			<date type="published" when="2022">2022</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Investigation of the competitive nature of eMBB and mMTC 5G services in conditions of limited communication resource</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kovtun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Grochla</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41598-022-20135-5</idno>
	</analytic>
	<monogr>
		<title level="j">Scientific Reports</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2022-09-26">Sep. 26, 2022</date>
			<publisher>Springer Science and Business Media LLC</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Modeling a session of subject-system interaction in a wireless communication infrastructure with a mixed resource</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kovtun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Izonin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gregus</surname></persName>
		</author>
		<idno type="DOI">10.1371/journal.pone.0271536</idno>
	</analytic>
	<monogr>
		<title level="j">PLOS ONE</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page">e0271536</biblScope>
			<date type="published" when="2022-07-18">Jul. 18, 2022</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
