2018 IEEE Global Communications Conference (GLOBECOM) 2018
DOI: 10.1109/glocom.2018.8647590
|View full text |Cite
|
Sign up to set email alerts
|

Smart Scaling of the 5G Core Network: An RNN-Based Approach

Abstract: The upcoming mobile core network, which will be based on Virtual Network Functions (VNF), will face an increase of data traffic on both data and control planes. This is due to the increase of the number of connected devices and the newly 5G supported-services like IoT, Connected Health Care etc. Therefore dynamic and accurate scalability techniques should be envisioned in order to answer the needs, in term of resource provisioning, without degrading the Quality Of Service (QoS) already offered by hardware base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…On the other hand, the accuracy of prediction by moving from left to right decreases significantly due to the rareness of the burst occurrence events. The right y-axis represents the rational performance of LSTM versus AR (1). Clearly, LSTM outperforms AR(1) significantly, especially when bursts are occurring infrequently.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…On the other hand, the accuracy of prediction by moving from left to right decreases significantly due to the rareness of the burst occurrence events. The right y-axis represents the rational performance of LSTM versus AR (1). Clearly, LSTM outperforms AR(1) significantly, especially when bursts are occurring infrequently.…”
Section: Resultsmentioning
confidence: 99%
“…Then, given a matrix X m (t) and a binary indicator vector s, we define X s m (t) the submatrix of X m (t), such that all respective rows, for which s indicates a zero value, are removed. For example, let Then, X s m (t) = [1,2]. Now, the research question in Section 1 could be rewritten as:…”
Section: Related Work and Research Gapmentioning
confidence: 99%
See 2 more Smart Citations
“…To overcome the above threshold configuration problem, machine learning (ML) based approach is used [18][19][20]. In [18], [19] and [20], the traffic load of AMF is forecasted by Convolutional Neural Network (CN-N), Deep Neural Network (DNN) and Long Short Term Memory Network (LSTM) based on real datasets in mobile network, respectively. With the forecast traffic result, AMF instances are optimally scaled.…”
Section: The Key Laboratory Of Universal Wireless Communications For mentioning
confidence: 99%