{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:30:13Z","timestamp":1760149813803,"version":"build-2065373602"},"reference-count":44,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF)","doi-asserted-by":"publisher","award":["2021R1A2C2014333"],"award-info":[{"award-number":["2021R1A2C2014333"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>Network slicing is widely regarded as the most critical technique for allocating network resources to varied user needs in 5G networks. A Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two extensively used strategies for slicing the physical infrastructure according to use cases. The most efficient use of virtual networks is realized by the application of optimal resource allocation algorithms. Numerous research papers on 5G network resource allocation focus on network slicing or on the best resource allocation for the sliced network. This study uses network slicing and optimal resource allocation to achieve performance optimization using requirement-based network slicing. The proposed approach includes three phases: (1) Slice Creation by Machine Learning methods (SCML), (2) Slice Isolation through Resource Allocation (SIRA) of requests via a multi-criteria decision-making approach, and (3) Slice Management through Resource Transfer (SMART). We receive a set of Network Service Requests (NSRs) from users. After receiving the NSRs, the SCML is used to form slices, and SIRA and SMART are used to allocate resources to these slices. Accurately measuring the acceptance ratio and resource efficiency helps to enhance overall performance. The simulation results show that the SMART scheme can dynamically change the resource allocation according to the test conditions. For a range of network situations and Network Service Requests (NSRs), the performance benefit is studied. The findings of the simulation are compared to those of the literature in order to illustrate the usefulness of the proposed work.<\/jats:p>","DOI":"10.3390\/jsan12050065","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T05:31:28Z","timestamp":1694583088000},"page":"65","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3761-9360","authenticated-orcid":false,"given":"Thiruvenkadam","family":"Srinivasan","sequence":"first","affiliation":[{"name":"School of Electrical Engineering, Vellore Institute of Technology, Vellore 632014, Tamil Nadu, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2416-2322","authenticated-orcid":false,"given":"Sujitha","family":"Venkatapathy","sequence":"additional","affiliation":[{"name":"TIFAC-CORE in Cyber Security, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore 641112, Tamil Nadu, India"}]},{"given":"Han-Gue","family":"Jo","sequence":"additional","affiliation":[{"name":"School of Software, Kunsan National University, Gunsan 54150, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3936-1116","authenticated-orcid":false,"given":"In-Ho","family":"Ra","sequence":"additional","affiliation":[{"name":"School of Software, Kunsan National University, Gunsan 54150, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"key":"ref_1","unstructured":"5G PPP Architecture Working Group (2017). View on 5G Architecture: Version 2.0, 5G PPP Association."},{"key":"ref_2","first-page":"1","article-title":"Description of network slicing concept","volume":"1","author":"Alliance","year":"2016","journal-title":"NGMN 5G P"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2017.1600940","article-title":"Network slicing based 5G and future mobile networks: Mobility, resource management, and challenges","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","unstructured":"Santos, J.F., van de Belt, J., Liu, W., Kotzsch, V., Fettweis, G., Seskar, I., Pollin, S., Moerman, I., DaSilva, L.A., and Marquez-Barja, J. (2023, July 23). Orchestration Next-Generation Services through End-to-End Networks Slicing. Available online: https:\/\/orca-project.eu\/wp-content\/uploads\/sites\/4\/2018\/10\/orchestrating_e2e_network_slices_Final.pdf."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Nojima, D., Katsumata, Y., Shimojo, T., Morihiro, Y., Asai, T., Yamada, A., and Iwashina, S. (2018, January 3\u20136). Resource isolation in RAN part while utilizing ordinary scheduling algorithm for network slicing. Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal.","DOI":"10.1109\/VTCSpring.2018.8417638"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TNSM.2016.2569020","article-title":"Orchestrating virtualized network functions","volume":"13","author":"Bari","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TNSM.2016.2549563","article-title":"Scheduling wireless virtual networks functions","volume":"13","author":"Riggio","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","article-title":"Network slicing for 5G with SDN\/NFV: Concepts, architectures, and challenges","volume":"55","author":"Ameigeiras","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1186\/s13638-021-01983-7","article-title":"Network slicing: A next generation 5G perspective","volume":"2021","author":"Subedi","year":"2021","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MWC.2016.1500356WC","article-title":"Machine learning paradigms for next-generation wireless networks","volume":"24","author":"Jiang","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_11","unstructured":"Pavan, M., and Reddy, B.R. (2022, January 20\u201321). Machine Learning based Prediction for Channel Stability in a 5G Network. Proceedings of the 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon), Vijaypur, India."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Islam Arif, M.A., Kabir, S., Hussain Khan, M.F., Kumar Dey, S., and Rahman, M.M. (2022, January 17\u201319). Machine Learning and Deep Learning Based Network Slicing Models for 5G Network. Proceedings of the 2022 25th International Conference on Computer and Information Technology (ICCIT), Cox\u2019s Bazar, Bangladesh.","DOI":"10.1109\/ICCIT57492.2022.10054696"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/TCCN.2017.2758370","article-title":"An introduction to deep learning for the physical layer","volume":"3","author":"Hoydis","year":"2017","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TMC.2019.2896950","article-title":"A machine learning approach to 5G infrastructure market optimization","volume":"19","author":"Bega","year":"2019","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"103518","DOI":"10.1016\/j.csi.2021.103518","article-title":"Optimal 5G network slicing using machine learning and deep learning concepts","volume":"76","author":"Abidi","year":"2021","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1109\/JSAC.2019.2959186","article-title":"Offline SLA-constrained deep learning for 5G networks reliable and dynamic end-to-end slicing","volume":"38","author":"Chergui","year":"2019","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"4271","DOI":"10.1109\/TVT.2020.2972999","article-title":"Mode Selection and Resource Allocation in Sliced Fog Radio Access Networks: A Reinforcement Learning Approach","volume":"69","author":"Xiang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/OJCOMS.2022.3146618","article-title":"Deep Learning for B5G Open Radio Access Network: Evolution, Survey, Case Studies, and Challenges","volume":"3","author":"Brik","year":"2022","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2146","DOI":"10.1109\/TWC.2017.2789294","article-title":"Dynamic Network Slicing for Multitenant Heterogeneous Cloud Radio Access Networks","volume":"17","author":"Lee","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s42835-020-00602-7","article-title":"Performance enhancement for microgrids under the demand uncertainties with the presence of multiple DGs through stochastic ranking algorithm","volume":"16","author":"Srinivasan","year":"2021","journal-title":"J. Electr. Eng. Technol."},{"key":"ref_21","unstructured":"Prasad, J., Senthil, M., Yadav, A., Gupta, P., and Anusha, K.S. (2020). A Comparative Study of Machine Learning Algorithms for Gas Leak Detection, Springer."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/JIOT.2017.2769446","article-title":"Joint Application Admission Control and Network Slicing in Virtual Sensor Networks","volume":"5","author":"Delgado","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/MVT.2018.2809473","article-title":"End-to-End Quality of Service in 5G Networks: Examining the Effectiveness of a Network Slicing Framework","volume":"13","author":"Ye","year":"2018","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"19691","DOI":"10.1109\/ACCESS.2018.2822398","article-title":"A Service-Oriented Deployment Policy of End-to-End Network Slicing Based on Complex Network Theory","volume":"6","author":"Guan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/JIOT.2017.2773489","article-title":"Novel node-ranking approach and multiple topology attributes-based embedding algorithm for single-domain virtual network embedding","volume":"5","author":"Cao","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3866","DOI":"10.1109\/TVT.2019.2896586","article-title":"Hierarchical radio resource allocation for network slicing in fog radio access networks","volume":"68","author":"Sun","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"150517","DOI":"10.1109\/ACCESS.2019.2947454","article-title":"Efficient and secure 5G core network slice provisioning based on VIKOR approach","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/TNSE.2018.2876918","article-title":"Learning-based dynamic resource provisioning for network slicing with ensured end-to-end performance bound","volume":"7","author":"Xu","year":"2018","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1109\/TVT.2019.2959193","article-title":"End-to-end slicing with optimised communication and computing resource allocation in multi-tenant 5G systems","volume":"69","author":"Chien","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3409","DOI":"10.1109\/TMC.2020.3000657","article-title":"Service provisioning framework for RAN slicing: User admissibility, slice association and bandwidth allocation","volume":"20","author":"Sun","year":"2020","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1109\/TNSM.2021.3119433","article-title":"A Scalable Monitoring Framework for Network Slicing in 5G and Beyond Mobile Networks","volume":"19","author":"Mekki","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"15860","DOI":"10.1109\/ACCESS.2022.3148703","article-title":"Admission Control and Virtual Network Embedding in 5G Networks: A Deep Reinforcement-Learning Approach","volume":"10","author":"Troia","year":"2022","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Gao, L., Li, P., Pan, Z., Liu, N., and You, X. (2016, January 15\u201318). Virtualization framework and VCG based resource block allocation scheme for LTE virtualization. Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), IEEE, Nanjing, China.","DOI":"10.1109\/VTCSpring.2016.7504529"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Gupta, R.K., and Misra, R. (2019, January 20\u201321). Machine learning-based slice allocation algorithms in 5G networks. Proceedings of the 2019 International Conference on Advances in Computing, Communication and Control (ICAC3), Mumbai, India.","DOI":"10.1109\/ICAC347590.2019.9036741"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Archanaa, R., Athulya, V., Rajasundari, T., and Kiran, M.V.K. (2017, January 6\u20137). A comparative performance analysis on network traffic classification using supervised learning algorithms. Proceedings of the 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India.","DOI":"10.1109\/ICACCS.2017.8014634"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Senjyu, T., Mahalle, P., Perumal, T., and Joshi, A. (2022). IOT with Smart Systems, Springer.","DOI":"10.1007\/978-981-16-3945-6"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.procs.2017.09.089","article-title":"Usage and analysis of Twitter during 2015 Chennai flood towards disaster management","volume":"115","author":"Nair","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_38","unstructured":"Brans, J.P., Mareschal, B., Figueira, J., and Greco, S. (2005). Multiple Criteria Decision Analysis: State of the Art Surveys, Springer Science+ Business Media, Inc."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Greco, S., Figueira, J., and Ehrgott, M. (2016). Multiple Criteria Decision Analysis, Springer.","DOI":"10.1007\/978-1-4939-3094-4"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Venkatapathy, S., Srinivasan, T., Jo, H.G., and Ra, I.H. (2023). Optimal Resource Allocation for 5G Network Slice Requests Based on Combined PROMETHEE-II and SLE Strategy. Sensors, 23.","DOI":"10.3390\/s23031556"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"Albert","year":"1999","journal-title":"Science"},{"key":"ref_42","unstructured":"Aarts, E., and Korst, J. (1989). Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing, John Wiley & Sons, Inc."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/CC.2016.7732010","article-title":"Virtual 5G network embedding in a heterogeneous and multi-domain network infrastructure","volume":"13","author":"Yu","year":"2016","journal-title":"China Commun."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F., and Davy, S. (2015, January 13\u201317). Design and evaluation of algorithms for mapping and scheduling of virtual network functions. Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, UK.","DOI":"10.1109\/NETSOFT.2015.7116120"}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/12\/5\/65\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:49:59Z","timestamp":1760129399000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/12\/5\/65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":44,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["jsan12050065"],"URL":"https:\/\/doi.org\/10.3390\/jsan12050065","relation":{},"ISSN":["2224-2708"],"issn-type":[{"type":"electronic","value":"2224-2708"}],"subject":[],"published":{"date-parts":[[2023,9,13]]}}}