BENS−B5G: History
Please note this is an old version of this entry, which may differ significantly from the current revision.

Fifth-generation (5G) technology is anticipated to allow a slew of novel applications across a variety of industries. The wireless communication of the 5G and Beyond-5G (B5G) networks will accommodate a wide variety of services and user expectations, including intense end-user connectivity, sub-1 ms delay, and a transmission rate of 100 Gbps. Network slicing is envisioned as an appropriate technique that can meet these disparate requirements. The intrinsic qualities of a blockchain, which has lately acquired prominence, mean that it is critical for the 5G network and B5G networks. In particular, the incorporation of blockchain technology into B5G enables the network to effectively monitor and control resource utilization and sharing. Using blockchain technology, a network-slicing architecture referred to as the Blockchain Consensus Framework is introduced that allows resource providers to dynamically contract resources, especially the radio access network (RAN) schedule, to guarantee that their end-to-end services are effortlessly executed. 

  • blockchain
  • network slicing
  • 5G communications

1. Introduction

As a result of the Internet of Things era, new time- and mission-critical applications that incorporate 5G or B5G have been created for every sector of human activity. These end-to-end applications are organized using a series of network services [1]. As a result, infrastructure operators must bring computational capabilities closer to end-users to meet the delay requirements of cloud computing. Wireless data traffic will surge in the coming years as the number of mobile users and the wide range of bandwidth-hungry apps they use increase dramatically. Next-generation (5G) and 5G wireless communication networks will support a broader communication ecosystem, including the Internet of Things (IoT) and Internet of Vehicles (IoV) [2]. The 5G and beyond 5G wireless communications are expected to constitute the foundation for several new applications to enable this progress. Customer’s needs for applications have a wide range of complexity and customers will want to be met with 5G and beyond wireless communications. Some vertical sectors, such as industrial automation control systems and the Internet of Vehicles, need an exceptionally high reliability and low latency communications to meet rigorous QoS requirements [3]. To meet the diverse and personalized QoS needs of 5G and beyond networks, it is necessary to re-examine networking technology and network design. The International Telecommunication Union (ITU) has categorized three sorts of users in terms of service classification: enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC), which are all examples of new technologies that are being developed to meet the needs of today’s mobile devices [3]. Enterprises are searching for creative solutions to satisfy their demands and address new prospects as a result of the arrival of new technologies brought about by 5G, as well as the new business chances that have been created across all sectors. When it comes to enterprise customers, they demand automated business and operational processes from the time they buy the service through activation, delivery, and decommissioning. They anticipate that services will be provided more quickly while maintaining a high level of safety. Through the use of network slicing, communication service providers can fulfil all of the requirements posed by their corporate clients.
The 5G network design, based on network slicing is expected to play a significant role in the future generation of networks. The virtual network is described as a slice in network slicing, which allows numerous independent and separated virtual networks to coexist in the same physical network infrastructure. Using Software Defined Networks (SDN) and Network Function Virtualization (NFV), networks may be sliced to accommodate new services with a broad range of needs, while still using the same physical network (PN). Slices are created by abstracting control logic and resources from the SDN controller and making them available to the SDN nodes. SDN network slicing also makes it possible for several tenants to share the same PN resources. On the other hand, NFV was created to address a lack of particular communication equipment in the market. Virtual network functions are at the heart of NFV, and they may be performed on standard servers without the need for specialized hardware. Due to these attractive benefits, network slicing is often used [4]. Multi-tenancy is supported via network slicing, which allows the same physical infrastructure to be used by many virtual network operators. Network slicing may be used to provide differentiated service and meet service level agreements. Network slicing facilitates the capacity to build and alter network slices on demand, which increases the adaptability and flexibility of network administration. 
By splitting the same PN into many isolated logical networks, RAN slicing may deliver tailored services for isolated logical networks. This cost-effective and high-efficiency network management approach is built on the concept of PN sharing. Ref. [5] has found that RAN sharing might save the global economy about 60 billion dollars by 2022 in terms of both capital and operating expenses. The 3GPP has conducted an extensive study of 5G network slicing in practice.
To meet diverse QoS requirements, it is necessary to find a method for allocating network resources that is both flexible and efficient, and this is where RAN slicing comes into play. RAN slicing allows network operators to effectively and flexibly distribute resources based on the performance needs of individual users. In addition to wireless resources, these resources include those for computing and cache storage. The resources may be used more efficiently and at a higher rate with the help of resource-allocation technology, which can also merge diverse slices. Network slicing may be categorized as either a static or dynamic allocation, depending on the circumstance. After deciding on a resource allocation and mapping approach for network slicing, the allocation will remain static, no matter what changes occur in the environment. A key characteristic of dynamic resource management is the capacity to adapt resource-allocation tactics in response to changes in the environment, ultimately resulting in improved communication service quality.
It is critical to construct cross-domain RAN slicing that incorporates different operators and infrastructure suppliers. For example, an autonomous driving module requires a RAN slice that can cover a large geographical region by using services from a variety of local operators located across the city [6]. On the other hand, traditional cross-domain orchestrators are built on a master–slave design, which has a number of problems. A self-interested master virtual mobile network operator (VMNO) can capture super profits over other players, preventing them from entering the system, since they are responsible for collecting occupants’ slice requests, resource allocations, and incentive distributions. Second, the master VMNO must negotiate the cost of access to all the tenants’ resources on a frequently time-intensive and wasteful basis. To alleviate incumbents’ concerns about the ‘Master’, both research and commerce have recently laid great emphasis on the blockchain, a distributed immutable data recorder that is capable of establishing trust between untrusted peers. Additionally, smart contracts, which are contracts that have been encoded and managed by computers, are optionally utilized by the blockchain without the approval of the authority. With smart contracts, blockchain technology enables the management systems to easily handle the complicated operations.

2. Cognitive Radio over 5G and beyond Networks

Abubakar Makarf et al. (2020) [7] explored combining the Radio Information System (RIS) and Monte Carlo concept within a network to maximize the potential benefits. Two different RIS-based network models were investigated, and many performance measures connected with the CR secondary user were implemented. The obtained equations were validated using Monte Carlo simulations. In the presence of an RIS-enhanced main network, the results showed the influence of key system parameters and a clear improvement in the CR network. According to Zhaoyuan Shi et al., the massive MIMO which is, underlying the cognitive radio user selection schema, is aware of the QoS requirements of the channel requested (2019) [8]. There are two major ways in which a CR may be implemented: The Channel State Indicator (CSI) of any cross-network is inaccessible at the secondary base station (SBS), but the SBS has access to the CSI of the cross-channel channel state. Low-complexity algorithms for increasing users while using the least amount of power (IUMP) and methods for decreasing users while using the most amount of power (DUMP) were developed to solve user selection via power allocation. The intractable challenge was addressed using a deep reinforcement-learning-based method, enabling the SBS to accomplish effective and intelligent user selection. In simulations, these algorithms dramatically outperform the current user selection approaches. Theneural network was able to rapidly learn the best user selection strategy in an unknown dynamic environment with a high success rate and fast convergence, as the findings also revealed. Kok-Lim Alvin Yau et al. [9] focused on how CR and the Cognition Cycle have been integrated into 5G to deliver spectrum efficiency, energy efficiency, enhanced quality of service and experience, and cost-efficiency (2018). Open research opportunities and platform implementation were made accessible to inspire new research in this area. Gianfranco Nencioni et al. (2018) [10] discussed the fifth-generation (5G) of cellular networks, which is expected to represent a significant advancement in wireless technology. A variety of new wireless technologies will be implemented to better serve 5G’s wide set of requirements, including upgrades to the radio access network. It was demonstrated that the convergence of many communication technologies has been facilitated by embedding softwarizations such as Software-Defined Networking (SDN) and Network Functions Virtualization (NFV). Through network slicing, 5G networks may be constructed at low cost. By using an SDN/NFV architecture, 5G radio access and core networks will be able to deliver network services more efficiently, flexibly, and in a more scalable manner. The researchers also discussed software-defined 5G radio access and core networks, as well as a wide range of future research topics in orchestration and control. Johana Hernández et al. proposed cognitive radio management (2018) [11].

3. Network Management in 5G and beyond Networks

The most available route for the opportunistic transmission of secondary user data is chosen throughout the decision-making process as a result of the main user characterization-model’s efficiency. It was claimed that an approach based on deep learning and long short-term memory might lessen the forecasting error now present in future significant user estimates in the Global System for Mobile Communication (GSM) and WiFi frequency bands. When compared to alternative approaches, such as multi-layer perceptron neural networks, Bayesian networks, and adaptive neuro-fuzzy inference systems, the results indicate that a lengthy short-term memory may significantly enhance the estimates of channel utilization (ANFIS−Grid). The neural structure has input, forget, and output gates, which complicates its implementation in cognitive radio networks (CRNs) based on core network topologies, despite the fact that a long short-term memory fared better at time series forecasting. Aaron Yi Ding et al. developed the criteria for assessing the restrictions of 5G-driven applications (2018) [12]. The usual hurdles and needs for various application domains were studied using 5G networks as a basis. The major objective was to create a network architecture that could adapt to changing traffic patterns, while also supporting diverse technologies, such as edge computing, blockchain-based distributed ledgers, software-defined networking, and virtualization. Researchers underlined the need to perform 5G application pilots to better understand how 5G networks are deployed and utilized in different vertical industries. Xingjian Li et al. investigated the issue of spectrum sharing in a cognitive radio system with a main and secondary user (2018) [13]. Secondary users are at odds with prime users. In particular, it was assumed that the primary user would alter its transmitted power in accordance with a pre-defined power management strategy. The secondary user has no idea what the main user’s transmission power and power control method are. For the secondary user, a power control system based on learning was developed to share the same spectrum with the main. To assist the secondary user, a network of sensor nodes was strategically placed across the wireless network to collect data on the received signal strength. The secondary user’s transmission power may be automatically adjusted using a deep reinforcement learning algorithm. This may be performed after a few rounds of interaction with the principal user. The results showed that secondary users might effectively connect with main users to achieve the desired state from any beginning situation in a few steps. When Maria Massaro et al. (2017) [14] examined the Licensed Shared Access (LSA) and Shared Access Spectrum (SAS) regimes in the EU, they discovered significant disparities between the LSA and SAS regimes. To acquire information on the technical and regulatory components of current and forthcoming spectrum-sharing regimes, policy documents, research publications, position papers, and analytical studies were studied. The LSA regime is notable for providing mobile operators with the regulatory certainty they need to invest in 5G, while also granting them access to an additional spectrum below 6 GHz. Other spectrum-sharing regimes will not safeguard cell operators from hazardous interference or ensure trustworthy Quality of Service (QoS) while utilizing sub-6 GHz airwaves. Due to its lower level of technical complexity, the LSA regime can be deployed more rapidly and with less effort when the two techniques are compared. However, as technology progresses, the LSA regime is projected to be surpassed in the long run by the SAS regime. More persons may share the same frequency channels under the SAS setup. A cognitive WLAN overlay over an OFDMA TDD main network was tested for saturation throughput by Parisa Rahimzadeh et al. (2017) [15], e.g., using LTE or WiMAX. The successful node delivers its data packet in the main network’s downlink and uplink subframes that have empty resource blocks (RBs). Unlike the OFDMA structure and time-scheduled resources in the primary network, the opportunity length in the secondary network does not follow a straightforward exponential on–off pattern. There is a mathematical model for the dynamic behavior of secondary node opportunities and contentions that incorporates a discrete-time Markov chain and two connected open multi-class queueing networks (QNs). As a random number is created when data are downloaded and uploaded, the research includes the random packet transmission time on WLANs, the dependency on the number of empty RBs in the subsequent frames, and aspects of the 802.11 MAC protocol. Multiple resource allotments were inserted into the main network for the purpose of conducting the analysis. Researchers were able to demonstrate the correctness of the method via simulations in a variety of different situations. Cheng Wu et al. (2016) [16] developed a multi-agent reinforcement learning-based spectrum management approach. For efficient spectrum and transmit power allocation, the approach employed value functions to evaluate the advantages of different transmission features, maximizing long-term return. Using a variety of learning factors, students were exposed to a variety of real-world circumstances, and their communication skills were evaluated. A Kanerva-based function approximation was utilized to enhance the management of large CRNs, and to examine the impact on communication performance in these networks. The proposed reinforcement learning-based spectrum management in a cognitive radio ad hoc network is shown to considerably minimize interference to licensed users, while preserving a high probability of successful transmissions in this network. The secondary users’ average sum rate was increased by Yang Yang et al. (2017) [17] by determining the best way to access and regulate their power in multiple bands (ASR). Researchers represented the random distributions of PUs and SUs using Poisson point processes (PPPs) based on stochastic geometry, from which researchers were able to compute the closed-form outage probability and estimate the ASR of SUs. On a number of bands, the ASR maximization problem included an outage probability. The optimal density of SUs with a given power was determined using closed-form convex optimization, and the optimal SU power was calculated and ASR convexity was checked. These findings prompted the creation of a spectrum access and power management strategy aimed at optimizing the ASR of SUs over several bands. The results of the simulations reveal that PUs and network interference limit SUs’ density and power, and that the proposed approach can achieve the maximum ASR for the SUs.
 

This entry is adapted from the peer-reviewed paper 10.3390/s22166068

References

  1. An, N.; Kim, Y.; Park, J.; Kwon, D.H.; Lim, H. Slice management for quality of service differentiation in wireless network slicing. Sensors 2019, 19, 2745.
  2. Theodorou, V.; Lekidis, A.; Bozios, T.; Meth, K.; Fernandez-Fernandez, A.; Tavlor, J.; Diogo, P.; Martins, P.; Behravesh, R. Blockchain-based zero touch service assurance in cross-domain network slicing. In Proceedings of the 2021 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit, Porto, Portugal, 8–11 June 2021; pp. 395–400.
  3. Zanzi, L.; Albanese, A.; Sciancalepore, V.; Costa-Perez, X. NSBchain: A Secure Blockchain Framework for Network Slicing Brokerage. In Proceedings of the IEEE International Conference on Communications, Dublin, Ireland, 7–11 June 2020.
  4. Sattar, D.; Matrawy, A. Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices. In Proceedings of the 2019 IEEE Conference on Communications and Network Security, CNS, Washington, WA, USA, 10–12 June 2019; pp. 82–90.
  5. Li, X.; Samaka, M.; Chan, H.A.; Bhamare, D.; Gupta, L.; Guo, C.; Jain, R. Network Slicing for 5G: Challenges and Opportunities. IEEE Internet Comput. 2018, 21, 20–27.
  6. Makarfi, A.U.; Kharel, R.; Rabie, K.M.; Kaiwartya, O.; Li, X.; Do, D.-T. Reconfigurable Intelligent Surfaces Based Cognitive Radio Networks. 2021. Available online: http://arxiv.org/abs/2008.10946 (accessed on 20 February 2022).
  7. Shi, Z.; Xie, X.; Lu, H. Deep Reinforcement Learning Based Intelligent User Selection in Massive MIMO Underlay Cognitive Radios. IEEE Access 2019, 7, 110884–110894.
  8. Yau, K.L.A.; Komisarczuk, P.; Paul, D.T. Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning. In Proceedings of the Local Computer Networks, LCN, Denver, CO, USA, 10–14 October 2010; pp. 152–159.
  9. Nencioni, G.; Garroppo, R.G.; Gonzalez, A.J.; Helvik, B.E.; Procissi, G. Orchestration and Control in Software-Defined 5G Networks: Research Challenges. Wirel. Commun. Mob. Comput. 2018, 2018, 6923867.
  10. Hernández, J.; López, D.; Vera, N. Primary user characterization for cognitive radio wireless networks using long short-term memory. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718811828.
  11. Ding, A.Y.; Janssen, M. 5G Applications: Requirements, Challenges, and Outlook. In Proceedings of the Seventh International Conference on Telecommunications and Remote Sensing, Barcelona, Spain, 8–9 October 2018.
  12. Li, X.; Fang, J.; Cheng, W.; Duan, H.; Chen, Z.; Li, H. Intelligent Power Control for Spectrum Sharing in Cognitive Radios: A Deep Reinforcement Learning Approach. IEEE Access 2018, 6, 25463–25473.
  13. Massaro, M. Next generation of radio spectrum management: Licensed shared access for 5G. Telecommun. Policy 2017, 41, 422–433.
  14. Rahimzadeh, P.; Ashtiani, F. Analytical Evaluation of Saturation Throughput of a Cognitive WLAN Overlaid on a Time-Scheduled OFDMA Network. IEEE Trans. Mob. Comput. 2017, 16, 634–647.
  15. Wu, Q.; Wang, Y.; Yin, Z.; Deng, H.; Wu, C. A Novel Approach of Cognitive Base Station with Dynamic Spectrum Management for High-Speed Rail. 2016. Available online: https://openreview.net/forum?id=B1bmYVz_br (accessed on 20 February 2022).
  16. Yang, Y.; Dai, L.; Li, J.; Mumtaz, S.; Rodriguez, J. Optimal spectrum access and power control of secondary users in cognitive radio networks. Eurasip J. Wirel. Commun. Netw. 2017, 2017, 98.
  17. Rajesh Babu, C.; Amutha, B. Blockchain and extreme learning machine based spectrum management in cognitive radio networks. Trans. Emerg. Telecommun. Technol. 2020, e4174.
More
This entry is offline, you can click here to edit this entry!
Video Production Service