Font Size: a A A

Research On 5G MMTC Slice Resource Allocation And Scheduling Mechanism

Posted on:2023-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y F NiuFull Text:PDF
GTID:2558306914959169Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the explosive growth of the IoT industry around the world,massive machine type communication(mMTC)applications and services,one of the three important application scenarios of 5G,have surged.New visions and challenges.By integrating SDN/NFV technologies,operators currently use network slicing to carry this service to meet the actual needs of 5G networks to support multiple services and manage and control multiple resources.During the deployment of mMTC slice mapping,a series of features such as diverse terminal devices,high device connection density,centralized group authentication,and security performance requirements also put forward higher requirements for network resource orchestration and management.Therefore,in the process of mMTC network slice mapping,in order to meet the key performance indicators and ensure slice service quality as the premise,how to jointly optimize the arrangement of multi-dimensional edge node heterogeneous resources,and design mMTC slice mapping strategy for optical access network has become an urgent problem to be solved.the problem.This paper designs and implements the mMTC slice model,and conducts research on the mMTC slice mapping strategy that meets the requirements of group authentication and security assurance.The following are the main research projects and innovations:(1)From the standpoint of centralized management and control of disparate resources,this paper designs and implements 5G mMTC fronthaul network slicing based on the idea of separation of baseband processing functions,aiming at the problem that traditional optical fronthaul networks cannot meet the QoS requirements of differentiated IoT services.Considering the impact of differentiated service performance requirements on segmentation decisions,this paper discusses potential segmentation schemes based on the analysis of mMTC slice traffic characteristics.(2)From the point of view of the authentication requirements of massive IoT terminal groups,aiming at the actual performance requirements of mMTC slices and the characteristics of IoT services,this paper proposes the mMTC slice traffic model,and analyzes the calculation,bandwidth and delay overhead required for slice deployment.Research.And based on this,the group leader election scheme is further proposed,and a mMTC slice mapping algorithm for group authentication requirements is designed and implemented to study the QoS guarantee and resource utilization in the deployment of mMTC slice mapping of different scales.The simulation results show that,compared with the benchmark algorithm,under the parameters of traffic load and slice scale,the SM-GA method described in this research reduces slice blockage rate and improves network resource usage.(3)From the perspective of IoT terminal access security requirements,this paper designs a DDoS attack model with three modes and proposes a DDoS attack-oriented attack model for the problem of insufficient resources for subsequent mMTC slice deployment due to DDoS attacks on the edge nodes of the optical access network.mMTC slice mapping scheme.The scheme comprehensively evaluates network edge nodes and selects the best node for traffic offloading to carry subsequent slice mappings in combination with delay constraints,thereby effectively alleviating the computational pressure of attacked nodes.The simulation results show that the proposed adaptive mMTC slice mapping algorithm for DDoS attacks can jointly optimize the remaining heterogeneous resources of the network based on ensuring the differentiated delay requirements of slices,minimize the impact of DDoS attacks on slice mapping,and take into account the network resource overhead.
Keywords/Search Tags:5G mMTC service, radio access network, network slicing, DDoS attack, resource management
PDF Full Text Request
Related items