Enhancing 5G network performance through advanced network slicing: A Comprehensive evaluation using machine learning techniques


Abstract

This study explores the potential of network slicing to enhance 5G telecom network performance. By determining end-to-end network resource allocation based on service needs, programmable network slicing is proposed. Utilizing a comprehensive dataset of network architecture and service requirements, the study employs decision trees, neural networks, and clustering techniques to evaluate and optimize network slicing configurations. The analysis aims to uncover patterns and correlations in the dataset to enhance the network slicing process. Key performance indicators encompass metrics like bandwidth, coverage, security, latency, and reliability. The findings demonstrate that network slicing greatly enhances the velocity and efficiency of 5G apps and services. The logistic regression model used for threat detection had high accuracy (77.8%), precision (82.9%), recall (68.8%), and F1-score (65.4%). The Singular Value Decomposition (SVD) model had 76.6% accuracy, 56.5% precision, 66.7% recall, and 60.7% F1-score. These high metrics suggest effective real-time network control. The systematic approach entails a series of processes, including data preparation, feature engineering, model training, and evaluation. This article highlights the significance of strong security standards, flexible and interoperable network slicing technology, and innovative optimization methods. Network providers and mobile operators can greatly benefit from the strategic adoption of network slicing, which allows them to maximize the advantages of 5G networks. The findings derived from this research offer opportunities for further exploration of advanced network slicing technologies and their broader use in the evolving telecommunications industry.
Ask to review this manuscript

Notes for potential reviewers

  • Volunteering is not a guarantee that you will be asked to review. There are many reasons: reviewers must be qualified, there should be no conflicts of interest, a minimum of two reviewers have already accepted an invitation, etc.
  • This is NOT OPEN peer review. The review is single-blind, and all recommendations are sent privately to the Academic Editor handling the manuscript. All reviews are published and reviewers can choose to sign their reviews.
  • What happens after volunteering? It may be a few days before you receive an invitation to review with further instructions. You will need to accept the invitation to then become an official referee for the manuscript. If you do not receive an invitation it is for one of many possible reasons as noted above.

  • PeerJ Computer Science does not judge submissions based on subjective measures such as novelty, impact or degree of advance. Effectively, reviewers are asked to comment on whether or not the submission is scientifically and technically sound and therefore deserves to join the scientific literature. Our Peer Review criteria can be found on the "Editorial Criteria" page - reviewers are specifically asked to comment on 3 broad areas: "Basic Reporting", "Experimental Design" and "Validity of the Findings".
  • Reviewers are expected to comment in a timely, professional, and constructive manner.
  • Until the article is published, reviewers must regard all information relating to the submission as strictly confidential.
  • When submitting a review, reviewers are given the option to "sign" their review (i.e. to associate their name with their comments). Otherwise, all review comments remain anonymous.
  • All reviews of published articles are published. This includes manuscript files, peer review comments, author rebuttals and revised materials.
  • Each time a decision is made by the Academic Editor, each reviewer will receive a copy of the Decision Letter (which will include the comments of all reviewers).

If you have any questions about submitting your review, please email us at peer.review@peerj.com.