Next Article in Journal
Aerodynamic Robust Design Research Using Adjoint-Based Optimization under Operating Uncertainties
Next Article in Special Issue
Methods, Standards and Components for Wireless Communications and Power Transfer Aimed at Intra-Vehicular Applications of Launchers
Previous Article in Journal
Study on the Aerothermoelastic Characteristics of a Body Flap Considering the Nozzle–Jet Interference
Previous Article in Special Issue
Task Offloading with Data-Dependent Constraints in Satellite Edge Computing Networks: A Multi-Objective Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Domain Network Slicing in Satellite–Terrestrial Integrated Networks: A Multi-Sided Ascending-Price Auction Approach

1
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
2
State Grid Jiangsu Electric Power Co., Ltd., Research Institute, Nanjing 211103, China
*
Author to whom correspondence should be addressed.
Aerospace 2023, 10(10), 830; https://doi.org/10.3390/aerospace10100830
Submission received: 11 August 2023 / Revised: 15 September 2023 / Accepted: 20 September 2023 / Published: 23 September 2023

Abstract

:
With the growing demand for massive access and data transmission requests, terrestrial communication systems are inefficient in providing satisfactory services. Compared with terrestrial communication networks, satellite communication networks have the advantages of wide coverage and support for massive access services. Satellite–terrestrial integrated networks are indispensable parts of future B5G/6G networks. Challenges arise for implementing and operating a successful satellite–terrestrial integrated network, including differentiated user requirements, infrastructure compatibility, limited resource constraints, and service provider incentives. In order to support diversified services, a multi-domain network slicing approach is proposed in this study, in which network resources from both terrestrial and satellite networks are combined to build alternative routes when serving the same slice request as virtual private networks. To improve the utilization efficiency of limited resources, slice admission control is formulated as a mechanism design problem. To encourage participation and cooperation among different service providers, a multi-sided ascending-price auction mechanism is further proposed as a game theory-based solution for slice admission control and resource allocation, in which multiple strategic service providers maximize their own utilities by trading bandwidth resources. The proposed auction mechanism is proven to be strongly budget-balanced, individually rational, and obviously truthful. To validate the effectiveness of the proposed approach, real-world historical traffic data are used in the simulation experiments and the results show that the proposed approach is asymptotically optimal with the increase in users and competitive with the polynomial-time optimal trade mechanism, in terms of admission ratio and service provider profit.

1. Introduction

Satellite communication makes up for the shortage of terrestrial networks with its advantages including wide coverage and support for massive access services, and the satellite–terrestrial integrated network is proposed to achieve ubiquitous connectivity [1]. Satellite network guarantees reliable communication services for remote areas not covered by existing terrestrial networks, e.g., 4G and 5G [2]. The integration expands the network coverage area and supports continuous service for massive Internet of Things (IoT) devices and mobile terminals, e.g., ships and aircraft. With the support for broadcast and multicast services, the satellite network offers data distribution services for users with a higher communication efficiency [3]. Besides these technological benefits, the satellite–terrestrial integrated network brings some economic benefit for remote areas, in which the deployment of 5G terrestrial networks is economically prohibitive [4].
Although the satellite–terrestrial integrated network has been seen as an important part of future B5G/6G networks, there are still many technological and economic challenges [5]. The first challenge is the differentiated user requirements, which cannot be fulfilled within a single network domain. The second challenge is the technological compatibility when heterogeneous infrastructures have different communication standards, protocols, and systems on the ground and in the space. The third challenge is the limited resource constraint, especially when the user demand exceeds the transmission capacity [6]. The last challenge is the service provider (SP) incentive, especially when network service providers in different domains need to cooperate with each other to serve user requests, and it becomes impossible to neglect the problem of how to encourage the participation and resource sharing from different operators.
As one of the key technologies in 5G, network slicing (NS) is proposed for solving the first and second challenges in the satellite–terrestrial integrated network and adopted in this study [7]. Both intra-domain and inter-domain network slices have been considered before. In this paper, the inter-domain network slice was considered with multiple routes supported and without delegating the specific domains along the route as long as the service can be provided. For example, with the deployment of low-Earth-orbit (LEO) satellite constellations, cross-continent network slicing can be fulfilled with inter-satellite links involving only one domain (i.e., the satellite network). Alternatively, network slicing can be fulfilled with multiple domains on the ground, e.g., radio access networks, wide-area networks and submarine cables. Since the network slicing service cannot be accomplished alone for the network service providers in some domains, the cooperation among several network operators is required to establish a feasible slice. When considering the admission decision for a slice request, a joint decision is made with the involvement of multiple parties with their own interests, making the admission control problem far more complex than the single-domain case.
To solve the third challenge and improve the utilization efficiency of limited resources, slice admission control is introduced and formulated as a mechanism design problem, in which different combinations of users and service providers are considered, as long as the network slices can be formulated [8]. While two-sided markets (e.g., buyers and sellers) have drawn much research attention in recent decades, multi-sided markets are much less seen in the literature due to both theoretical and practical challenges [9]. The trade decision process in a two-sided market only involves a buyer and a seller, while in a multi-sided market, it becomes a combinatorial problem when more than one combination of participants can form a deal.
To solve the fourth challenge and encourage the participation and cooperation among different service providers, a multi-sided ascending-price auction mechanism is further proposed as a game theory-based solution for slice admission control and resource allocation, in which multiple strategic service providers maximize their own utilities by trading bandwidth resources. Existing solutions for the multi-domain network slicing admission control problem are mainly based on game theory, for example, matching games [10], especially when the incentives of both users and network service providers are non-negligible. However, these existing solutions are not flexible, when only a single and fixed combination of associated users and service providers is permitted, e.g., with one-to-one matching between a user and a service provider, without allowing multiple potential routes for provisioning the network slicing service.
In this paper, we propose a multi-sided ascending-price mechanism for sliced network service provision with bandwidth requirements, in which the network resource to allocate is the network bandwidth represented as a positive quantity. We design a novel optimal trade scheme calculation method and a novel ascending-price auction mechanism, with the consideration for the continuous value space, instead of the binary value space as in the previous study [11]. We also prove that, in the new and continuous setting, our proposed optimal trade scheme has a polynomial time complexity and performs as an upper bound for the auction mechanism, which is proven to be strongly budget-balanced, individually rational, and obviously truthful. Simulation experiments based on real-world data are designed to validate the effectiveness of the proposed ascending-price auction mechanism for the satellite–terrestrial integrated network.
The main contributions of this paper are summarized as follows:
  • The multi-domain network slicing admission control is formulated as a multi-sided mechanism design problem when multiple routes can be used simultaneously in the satellite–terrestrial integrated network.
  • A polynomial-time optimal trade mechanism is proposed as an upper bound that calculates the optimal trade scheme for the mechanism design problem.
  • A multi-sided ascending-price auction mechanism is proposed as a strongly budget-balanced, individually rational, and obviously truthful solution for the mechanism design problem, and its asymptotically optimal performance is validated with simulation experiments based on real-world data.
The rest of this paper is organized as follows. The relevant studies are reviewed and discussed in Section 2. The system model and the multi-sided mechanism design formulation are defined in Section 3. The proposed optimal trade mechanism and proof of its polynomial time complexity are presented in Section 4. The proposed multi-sided ascending-price auction mechanism and the proof for its desirable properties are presented in Section 5. Numerical experiments and results are discussed in Section 6. Section 7 concludes this paper with some potential future research directions.
The acronyms for terminologies used in this study are summarized in Table 1 for reference.

2. Related Work

In this section, related work about multi-domain network slicing service provision is briefly reviewed. For further discussion about relevant research topics, interested readers are referred to recent surveys [12,13].

2.1. Network Slicing Background

Network slicing provides logically isolated network transmission tunnels using shared physical network resources, with a guarantee of end-to-end QoS requirements, e.g., bandwidth, delay, etc. Network slicing presents the key enabler of cellular network improvements, especially for the 5G cellular network [14], in which three typical network slice types are defined as ultra-reliable low-latency communication (uRLLC), massive machine type communication (mMTC), and enhanced mobile broadband (eMBB). Powered by network function virtualization (NFV) and software-defined networking (SDN), network slicing has been supported in satellite networks [15,16,17] and broader network scenarios, e.g., sensor networks [18], LoRa networks [19], vehicular networks [20], and IoT networks [21,22].
More challenges arise when network slicing is extended from a single domain to multiple domains, both theoretically and practically. Since network service providers from different domains have heterogeneous costs and interests, it would be important to consider the incentive to encourage cooperation among multiple domains, along with the service quality requirements. While network service provision in a single domain has been widely discussed, there are much fewer relevant studies for the multi-domain case.
It is confirmed that no disclosure of the intra-domain topology information is preferable by infrastructure operators [23]. Thus, it is more acceptable to allow operators from each domain to provide an end-to-end network service without revealing the private and internal topology information. Some existing tools may be used, e.g., the border gateway protocol is a conventional routing protocol widely used as an inter-domain solution in the Internet. Another potential solution is the federated learning approach, which is used to build a solution without revealing data privacy for the participants, and has already been proposed to provide multi-domain network slicing orchestration and federated resource control [24,25].
SDN has also become one of the key enablers of a successful satellite–terrestrial integrated network [26]. With SDN techniques, satellite network service providers can efficiently create, deploy, and manage network services and achieve seamless handovers, both among different satellites/beams or between the terrestrial and satellite segments. In other words, the end users can be served without/barely knowing which kind of network is being used or wondering about the high dynamic feature of satellite networks. To manage the LEO satellite constellations, which is the trend of next-generation satellite networks, a centralized SDN controller can be deployed in a geosynchronous equatorial orbit (GEO) satellite [27] or a medium-Earth orbit (MEO) satellite [28] or in the ground station [29]. Software-defined satellite networks have drawn attention from both academia and the industry with impressive progress in recent years [30], e.g., Amazon, Microsoft, and Google all cooperated with satellite operators to build virtual ground stations with NFV and SDN techniques in recent years.
SDN-empowered systems are further proposed for the implementation of network slices with the objectives of efficiency and security, both in the terrestrial and satellite networks [12]. Based on the storage and computational resources from both edge and cloud servers, a software-defined edge-cloud computing framework for the resource slice formulation is proposed in ref. [31]. To mitigate the impacts of the slice-initiated attacks, the Benders decomposition and quadratic transformation methods are applied for the interslice and intraslice resource orchestrations, respectively, with the optimization objectives of minimizing the delay and resource utilization simultaneously. Unmanned aerial vehicle (UAV)-enabled mobile edge computing is further incorporated to provide the cross-domain network slices in the ground and aerial segments and a software-defined scheme is proposed for customizing UAV-enabled services in ref. [32]. A Lyapunov optimization-based offloading algorithm is developed for the efficient selection of resource slices [33].

2.2. Game Theory for Network Slicing

In recent years, game theory has been proven to be an effective tool for solving various problems in satellite–terrestrial integrated networks which involve user participation and strategic behaviors. For example, to balance the utilities of the network operator and IoT users, a game theory-based mode selection and dynamic pricing scheme is proposed in ref. [34] to maximize the average throughput and reduce the delay, in which the network operator adopts the Stackelberg game strategy and the users adopt the evolutionary game strategy. Various auctions are further proposed as potential solutions for resource allocation, spectrum sharing, edge computing, and handover in satellite–terrestrial integrated networks. A second-price auction-based traffic offloading mechanism is proposed to achieve the symmetric Bayesian equilibrium and obtain the maximum expected utility of the mobile network operator [35]. To minimize the difference between the allocated and required data rate, a double auction-based resource allocation scheme is proposed in ref. [36], in which the utilities of both the network operator and users are maximized. A double auction mechanism is also used in the satellite mobile edge computing to optimize the rationality of resource allocation by considering successful trades and social welfare [37]. A multi-round auction-based resource allocation scheme is proposed to maximize the user sanctification when allocating the satellite network resource to ground users by considering the satellite network operator as the seller and the ground users as the buyers [38]. To achieve the effective and efficient secondary relay selection, a Vickery auction is introduced in the cognitive hybrid satellite–terrestrial overlay networks with non-orthogonal multiple access as a solution by distinct sub-time slot allocation for a one shot in terms of a distributed manner [39,40,41]. A deep-learning-based auction design approach is proposed in ref. [42] to achieve a trustworthy handover in LEO satellite network, in which a distributed and scalable auction can be applied to guarantee optimal revenue and enable self-configurable operations for adapting various conditions.
Taking the privacy-preserving requirement into consideration, game theory has been an ideal tool for designing potential solutions in multi-domain network slicing service provision problems with different objectives, e.g., maximizing social welfare, maximizing profit for service providers only, and achieving a stable solution.
The most frequently used objective in the literature is the maximization of social welfare, which is defined as the sum of the utilities from all participants. For example, an iterative double-auction mechanism is proposed for multi-domain network service provision with an SDN-based infrastructure, in which social welfare is maximized while keeping the truthful bidding property [43]. The iterative auction game approach is also used in ref. [44] for the multi-domain network slicing in mobile networks and the proposed distributed privacy-saving mechanism converges to the optimal solution within only a few (less than 10) iterations.
The many-to-one matching game theory framework is used for associating a slice user with an access point in a tier and an infrastructure provider in the multi-tier multi-domain network slicing scenario, with the aim of maximizing the transformed utility [10]. Then, a recursive distributed backtracking technique is leveraged to find the optimal solution and outperforms the genetic algorithm-based and static slicing resource allocation schemes. Both incentive-driven broker competition (i.e., non-cooperative gaming) and market share-based broker bargain (i.e., cooperative gaming) cases are considered for end-to-end light path provisioning across multiple domains in the multi-domain software-defined elastic optical network [45]. In the competitive gaming setting, the Nash equilibrium result is outperformed by an effective bidding strategy based on the kernel density estimation. In the cooperative gaming setting, the proposed Nash bargaining scheme is more effective.
Instead of maximizing the social welfare or utility sum of all participants, some studies focus on the guarantee of profit for service providers. For example, a profitable auction-based approach for multi-domain network service orchestration in 5G networks is proposed for increasing the profit of service providers, while keeping the QoS requirements [46].
Another type of design objective is the stability of the game theory-based solution. A stable solution is one that is accepted by all the participants and no violation would appear. For example, a hierarchical auction and dynamic programming-based resource allocation algorithm is proposed for achieving a stable solution in 5G radio access network slicing [47].
Table 2 presents the summary of existing game theory-based access control mechanisms as well as our differences with them. Compared with existing game theory-based solutions for multi-domain network slicing admission control, this work is the first to model the cooperation and competition among different network service providers simultaneously and the previous solutions no longer hold for this new and more realistic scenario. Most of the previous studies only consider a non-cooperative case or a cooperative case. Even for the only one exception that both cases are considered, they are seen as two different problems with two solutions [45]. This work is also the first to consider both terrestrial and satellite networks for providing a multi-domain network service simultaneously, based on SDN and network slicing techniques. The satellite network is featured with its global connectivity ability powered by inter-satellite links regardless of the terrestrial obstacles.
Our mechanism is designed for boosting the competition and cooperation between satellite and terrestrial networks, especially those operating LEO constellations with limited budgets and willing to provide commercial services, and achieving a win–win–win result for satellite network service providers, terrestrial network service providers, and end users. As the main beneficiary, satellite network service providers can be involved in the telecommunication market, which was previously dominated by terrestrial network service providers. The users have more options for their data transmission missions or Internet connections [48]. The whole market can be more efficient for all participants with the asymptotic maximum gain from trade and the terrestrial network service providers which would also benefit from our mechanism.
For the implementation of game theory-based solutions, distributed ledger technologies have been proven to be the ideal choice with trust, security, transparency, and traceability abilities [49]. The Microsoft Confidential Consortium Framework platform is leveraged to provide a privacy-preserving multi-domain network slice orchestration architecture and a bilateral evaluation mechanism based on game theory is proposed to guarantee fairness and quality-of-experience (QoE) by suppressing malicious behaviors during multi-domain network slice orchestration [50]. Ethereum is used as another blockchain-based solution to deploy multi-domain network slices [51].
Since the internal topology information is usually a commercial secret and network service providers are not willing to reveal such private information [23], it is difficult and impractical to deploy our proposed mechanism in a centralized approach. Instead, a decentralized approach is preferred for deploying our mechanism in the near future, e.g., with blockchains after the software-defined satellite networks become mature and commercialized [52]. As indicated in the literature, a careful design of the auction mechanism and strict regulations are required for mitigating drawbacks and risks such as multi-round auction overhead, biased bidding, and cheating [53].

3. System Model

In this section, we describe the mathematical system model for the scenario of the multi-domain network slicing service provision market in the satellite–terrestrial integrated network scenario. Compared with previous studies, our system model incorporates both competitive and cooperative relationships among different network service providers, with the simplest example as an illustration of a better and easier understanding. Some link properties are also simplified (e.g., delay and jitter) and the bandwidth and price are used to demonstrate the key ideas of our newly defined problem and proposed mechanisms. Our system model and proposed mechanisms can be easily extended to much more complex and realistic integrated satellite and terrestrial network scenarios without a heavy modification.
In our problem formulation, the optimization objectives of both the network service providers and users are to maximize their own utilities, which are mathematically defined in this section. Since the value of providing/using the network service is the private information, the participants may want to behave strategically through their bids for their own interests, which would damage the overall efficiency. Thus, our design goals are the economic properties, which include the budget balance, individually rationality, and obvious truthfulness, to inhibit such selfish behaviors. We also demonstrate that our proposed multi-sided ascending-price auction mechanism guarantees these economic properties with theoretical proofs in Section 5 and achieves a desirable asymptotically optimal gain from trade with numeral experiments in Section 6.
Table 3 provides a list of the major mathematical symbols used in this paper for a convenient reference.

3.1. Model Description

In this paper, a basic structure of the multi-domain network slicing service provision market is described and used, as shown in Figure 1. Both users and network service providers are seen as participants. Users send network resource requests and network service providers serve user requests. The service providers from different domains are seen as different categories. In the example of Figure 1, there are four categories of participants and the participant type set G is denoted as G = { 1 , 2 , 3 , 4 } . In Figure 1, the user set is denoted as N 1 , which contains all users. The service provider set in the satellite network domain is denoted as N 2 , which contains all satellite network service providers. The service provider set in the radio access network (RAN) domain is denoted as N 3 , which contains all RAN service providers. And, the service provider set in the wide area network (WAN) domain is denoted as N 4 , which contains all WAN service providers. We assume that the participant sets of different categories are pairwise-disjoint, e.g., a single service provider cannot appear in the satellite network domain and the RAN domain simultaneously. In more complex cases, the number of participant categories could be more than four.
A group of users with size N (i.e.,  | N 1 | = N ) aims to request the network slicing service between the source and destination domains. Two alternative routes are established to provide this network slicing service. The first route (the upper route in Figure 1) is named a service shortcut route, which only goes through a single domain. The second route (the lower route in Figure 1) is named a service chain route, which passes through K different domains (e.g.,  K = 2 in Figure 1). It is worth mentioning that complex structures with more routes can also be described in a similar approach to the concepts we define in this section.
In a single timeslot, user i submits a network slice bandwidth request r i 0 and a unit bid price b i 0 for using the network service. The unit value v i 0 of using the service is the user’s private information and b i = v i if the user bids truthfully. We assume that the user’s utility u i is quasi-linear, which is the value v i minus the price p i the user pays, multiplied by the bandwidth, i.e.,  u i = v i × r i p i × r i . We also assume that a binary admission decision is made for a user, i.e., either the user is admitted and served with the bandwidth amount r i , or the user is rejected without service. The user may behave strategically to maximize their own utility. We assume that the strategic behavior of users only exists in the submitted bid price information instead of the requested bandwidth information. In other words, if the submitted bandwidth is more than the user’s actual need, the extra part if served brings no excess benefit to the user, and if the submitted bandwidth is less than the user’s actual need, the network slicing service cannot be fulfilled as the user expects.
In each domain, we assume M service providers exist, each of which has the ability to provide the cross-domain network service. The same number of service providers is used for model description simplicity, i.e.,  | N 2 | = | N 3 | = | N 4 | = M  (in practice, if the numbers of service providers from different domains are not equal, we can add dummy service providers with zero bandwidth resources to make this assumption hold). For the time period of interest, we assume that a service provider j submits a network slice bandwidth resource amount r j 0 and a unit ask price b j 0 for providing the network service. Similarly, the unit value v j 0 of providing the service is the service provider’s private information and b j = v j if the service provider bids truthfully. Note that the same mathematical symbols of the bandwidth and bid are used for the users and service providers. The value and price of the service providers are typically negative for representing the cost of deploying the infrastructure.
A similar quasi-linear utility format is assumed for the service provider, which is u j = v j × r j p j × r j . While v j and p j are both negative, utility, as their difference, is typically required as a positive value for the service provider to participate willingly. Different from the binary admission decision for a user, a service provider may use all or part of its bandwidth resource. We also assume that the strategic behavior of the service provider is limited to price information, e.g., by imposing a prohibitory penalty if the service provider fails to fulfill the submitted bandwidth resource in practice.
Following the terminology borrowed from [11], each possible route is formulated as a recipe, which is a binary projection from the category set to a vector, e.g., the two routes in Figure 1 are mapped as ( 1 , 1 , 0 , 0 ) and ( 1 , 0 , 1 , 1 ) , respectively. For example, in recipe ( 1 , 1 , 0 , 0 ) , a user is served by a satellite network service provider. Since we assume there is no loop in the routes, each recipe R can be represented by a path in a tree, as shown in Figure 2a. The user category is used as the root node for convenience so that each path from the root to a leaf is a feasible recipe. An example of the values and bandwidths of the participants is shown in Figure 2b (note that the values and bandwidths are not necessarily integers in this paper. Integer values are used in examples for simplicity).
A procurement set S can be generated by following a recipe and adding the served bandwidth value. For example, by following the recipe ( 1 , 1 , 0 , 0 ) , the user with a value of 17 can be served by the satellite network service provider with a value of −4, for the served bandwidth amount of 2. The gain from trade (GFT) of the procurement set S is defined as the sum of the values of all participants in S, i.e.,  G F T ( S ) : = i S v i × r ^ S , where r ^ S is the served bandwidth amount, which satisfies r ^ S r i , i S . A trade scheme S = { S 1 , S 2 , . . . , S k } is a collection of procurement sets, with a gain from trade as the sum of the GFT of all procurement sets, i.e.,  G F T ( S ) : = S S G F T ( S ) .

3.2. Mechanism Design Problem Formulation

In this paper, multi-domain network slicing admission control is formulated as a mechanism design problem. The designed mechanism can be classified as deterministic or randomized. In a deterministic mechanism, the outcome is purely decided by the inputs. In a randomized mechanism, the outcome is decided by both the inputs and some random variable(s). A randomized mechanism can also be seen as a lottery over deterministic mechanisms. The designed mechanism can also be classified as direct or sequential. In a direct mechanism, the participant’s private information is revealed only once, e.g., when submitting the bandwidth and price information. In a sequential mechanism, the participant’s private information is revealed sequentially, e.g., by answering questions about whether a price is acceptable or not.
Specifically, a deterministic direct mechanism aims to find a function that takes as input a bid vector b of bid/ask prices and a bandwidth vector r of bandwidth requests/resources and returns a trade scheme S ( b , r ) and a price vector p ( b ) . For the trade scheme S ( b , r ) to be bandwidth-feasible, the following constraints must be satisfied:
S : i S r ^ S = r i , i N 1
S : j S r ^ S r j , j N 2 N 3 N 4
where Constraint (1) requires that the admitted users are served exactly with the requested bandwidth and Constraint (2) requires that the consumed bandwidth from the service providers cannot exceed their available resources.
The desirable properties of the designed mechanism include optimality (i.e., with the maximum gain from trade), individual rationality, budget balance, truthfulness. It is well known that these properties cannot be achieved simultaneously in a two-sided market [54]. This impossibility theorem holds for the multi-sided market considered in this paper, which becomes a two-sided market when only one category of service providers exists.
A deterministic direct mechanism is optimal if the gain from trade of its trade scheme is maximum over all bandwidth-feasible trade schemes, regardless of the price vector.
A deterministic direct mechanism is truthful if a participant bids truthfully based on their value when maximizing their own utility. Formally, the participant’s utility is denoted by u i , the bid is b i and the bids of all other participants are denoted by b i = { b 1 , b 2 , , b i 1 , b i + 1 } . Then, a mechanism is truthful if, for every participant i and any fixed bids of all the other participants, u i ( v i , b i ) u i ( b i , b i ) .
A stronger propriety called obvious truthfulness [55] requires that the lowest utility for a participant by bidding truthfully is at least as high as the highest utility they may obtain by acting non-truthfully. Formally, a mechanism is obviously truthful if for every participant i and bid vector b , u i ( v i , b i ) u i ( b ) . In other words, the bids of all the other participants do not need to be fixed.
A deterministic direct mechanism is individually rational if a participant loses nothing to participate in the market. In other words, the participant’s utility u i should be non-negative, regardless of the bids of all other participants. For those participants that are not in any procurement set, the price should be zero.
A deterministic direct mechanism is weakly budget-balanced if the total amount paid by all participants together should be at least zero. Similar to the values and bids, the prices of the service providers are negative. A negative price for the service provider means that he pays a negative value to the market operator, which is equivalent to the case in which the service provider receives a positive payment from the market operator. A deterministic direct mechanism is strongly budget-balanced if the total amount paid by all participants together is exactly zero, which is more desirable when the market operator is non-profit.
A randomized direct mechanism can be seen as a lottery over deterministic direct mechanisms. The randomized direct mechanism has the above properties as long as they hold for all deterministic direct mechanisms.
A deterministic sequential mechanism considered in this paper uses a answer vector  a instead of the bid vector b , in which each answer replies to a query about the participant’s value v i , e.g., whether a price p i is greater than or equal to the value v i . The direct mechanism can be seen as a special case of the sequential mechanism, when only one query is used, i.e., what is the value? If the participant answers truthfully, we would have b i = v i . Similar properties can be defined for the deterministic sequential mechanism and a randomized sequential mechanism can be seen as a lottery over deterministic sequential mechanisms.

4. Optimal Trade Mechanism

Before presenting the proposed multi-sided ascending price algorithm, an optimal trade mechanism with a polynomial time complexity is described in this section as an upper bound for all possible solutions to the mechanism design problem in Section 3.2. In this optimal trade mechanism, only the trade scheme is returned as the output regardless of the price vector and without considering the participant’s strategic behavior. The optimal trade mechanism is calculated assuming all bandwidths and values are known by the market operator. The algorithm for calculating the optimal trade scheme is based on the basic operations of vertical contraction and horizontal contraction with the recipe tree structure shown in Figure 2a. The participants in each category are ordered with a decreasing value first.
The vertical contraction operation is used to combine the network service providers that cannot meet the end-to-end slice request solely, for example, the RAN service providers in N 3 and the WAN service providers in N 4 . In Figure 1, N 3 and N 4 are two nodes and the purpose of vertical contraction is to combine them into a new node N 3 N 4 . New values and bandwidths are also calculated by the vertical contraction operation for N 3 N 4 , as shown in Figure 3. The vertical contraction is used to combine a leaf node that is a single child with its parent node with the process shown in Algorithm 1. The combination process for the participants from the leaf node and its parent node is conducted iteratively. The combined values and bandwidths in the combined node are seen as “new participants" in the follow-up operations until only one node remains in the recipe tree. An example of the vertical contraction algorithm following Figure 2b is shown in Figure 3.
The horizontal contraction operation is used to combine the network service providers that can meet the end-to-end slice request into a single set, e.g., the satellite network service providers in N 2 and the combined node N 3 N 4 . The new node is denoted as N 2 ( N 3 N 4 ) , with new values and bandwidths calculated by the horizontal contraction operation shown in Figure 4. Similarly to the vertical contraction, the horizontal contraction is used to combine two sibling leaves into a new node with the process shown in the Algorithm 2. An example of the horizontal contraction algorithm following Figure 3 is shown in Figure 4. When there are more than two sibling leaves, a pairwise horizontal contraction can be conducted with two nodes combined in each operation. One may easily find that the combined result as one final node is irrelevant to the order of the pairwise horizontal contraction operations.
Algorithm 1 The vertical contraction
  • Input: A sorted value vector v l and a corresponding bandwidth vector r l of the participants N g l from the leaf node, a sorted value vector v p and a corresponding bandwidth vector r p of the participants N g p from the parent node.
  • Output: A sorted value vector v o , a corresponding bandwidth vector r o , and a corresponding participant identity set N g o .
1.
Initialization: v o = , r o = , N g o = .
2.
If  | v l | = = 0 or | v p | = = 0 :
     return  v o , r o and N g o .
3.
If the first element of r l is smaller than or equal to the first element of r p , i.e.,  r l [ 0 ] r p [ 0 ] :
  • Add v l [ 0 ] + v p [ 0 ] to v o ;
  • Add r l [ 0 ] to r o ;
  • Add a new participant identity N g l [ 0 ] Λ N g p [ 0 ] to N g o ;
  • Remove v l [ 0 ] from v l ;
  • Remove r l [ 0 ] from r l ;
  • Remove N g l [ 0 ] from N g l ;
  • Update r p [ 0 ] = r p [ 0 ] r l [ 0 ] ;
  • Go back to step 2.
4.
Else:
  • Add v l [ 0 ] + v p [ 0 ] to v o ;
  • Add r p [ 0 ] to r o ;
  • Add a new participant identity N g l [ 0 ] Λ N g p [ 0 ] to N g o ;
  • Remove v p [ 0 ] from v p ;
  • Remove r p [ 0 ] from r p ;
  • Remove N g p [ 0 ] from N g p ;
  • Update r l [ 0 ] = r l [ 0 ] r p [ 0 ] .
  • Go back to step 2.
Algorithm 2 The horizontal contraction
  • Input: A sorted value vector v l and a corresponding bandwidth vector r l of the participants N g l from the leaf node, a sorted value vector v s and a corresponding bandwidth vector r s of the participants N g s from the sibling node.
  • Output: A sorted value vector v o , a corresponding bandwidth vector r o , and a corresponding participant identity set N g o .
1.
Initialization: v o = , r o = , N g o = .
2.
If  | v l | = = 0 and | v s | = = 0 :
     return  v o , r o and N g o .
3.
If  | v s | = = 0 or the first element of v l is smaller than the first element of v s , i.e.,  v l [ 0 ] < v s [ 0 ] :
     Add v l [ 0 ] to v o ;
     Add r l [ 0 ] to r o ;
     Add N g l [ 0 ] to N g o ;
     Remove v l [ 0 ] from v l ;
     Remove r l [ 0 ] from r l ;
     Remove N g l [ 0 ] from N g l ;
     Go back to step 2.
4.
Else, if  | v l | = = 0 or v l [ 0 ] > v s [ 0 ] :
     Add v s [ 0 ] to v o ;
     Add r s [ 0 ] to r o ;
     Add N g s [ 0 ] to N g o ;
     Remove v s [ 0 ] from v s ;
     Remove r s [ 0 ] from r s ;
     Remove N g s [ 0 ] from N g s ;
     Go back to step 2.
5.
Else:
     Add v l [ 0 ] to v o ;
     Add r l [ 0 ] + r s [ 0 ] to r o ;
     Add a new participant identity N g l [ 0 ] N g s [ 0 ] to N g o ;
     Remove v l [ 0 ] from v l ;
     Remove r l [ 0 ] from r l ;
     Remove N g l [ 0 ] from N g l ;
     Remove v s [ 0 ] from v s ;
     Remove r s [ 0 ] from r s ;
     Remove N g s [ 0 ] from N g s .
     Go back to step 2.
Figure 4. The example of the horizontal contraction algorithm. (a) The result of the recipe tree after the horizontal contraction. (b) The result of combined values and bandwidths.
Figure 4. The example of the horizontal contraction algorithm. (a) The result of the recipe tree after the horizontal contraction. (b) The result of combined values and bandwidths.
Aerospace 10 00830 g004
Based on the vertical and horizontal contraction operations, the algorithm to find the optimal trade scheme is shown in Algorithm 3. After the recipe tree is contracted to a single root node, only the participants with a positive value are incorporated in the output trade scheme. It would be easier to calculate the gain from trade for the trade scheme by adding the values multiplied by the served bandwidths, i.e.,  G F T = i v i × r i , where v and r are the outputs of Algorithm 3. It is not difficult to generate the procurement sets by referring to the recorded participant identity sets and decomposing the combined values and bandwidths to the corresponding original users and service providers. An example of the procurement sets generated by the optimal trade mechanism for Figure 2b is shown in Table 4. Note that a single user may be served by multiple network services as long as the sum of the served bandwidth is equal to the requested amount. For example, the user with a value of 17 is served in three procurement sets, as shown in the first three lines in Table 4. In the first line of Table 4, a bandwidth value of 1 is provided by the RAN and WAN providers together. In the second line of Table 4, a bandwidth value of 2 is provided by the satellite network provider solely. And, in the third line of Table 4, a bandwidth value of 2 is provided by the RAN and WAN providers together, in which the RAN provider has a higher price than the RAN provider in the first line. A service provider’s bandwidth resource may not be fully utilized. For example, only half of the bandwidth resource from the WAN provider with a value of −4 is utilized.
Two theorems are presented to conclude this section. Theorem 1 demonstrates that the trade scheme generated by Algorithm 3 is optimal. Theorem 2 demonstrates that Algorithm 3 runs with a polynomial time complexity.
Theorem 1. 
The trade scheme of Algorithm 3 is optimal, i.e., with the maximum gain from trade over all trade schemes.
Algorithm 3 The optimal trade mechanism
  • Input:  A set of categories G, a set of participants N g for all g G , a recipe tree, the values and bandwidths of all participants.
  • Output: A sorted value vector v o , a corresponding bandwidth vector r o , and a corresponding participant identity set N g o .
1.
If the recipe tree has a single root node g:
     Return { v i } v g , { r i } r g and { i } N g , where i N g : v i > 0 .
2.
Otherwise, if there is a leaf g l that is a single child of its parent g p :
     Do a vertical contraction of g l into g p by Algorithm 1;
     Go back to step 1.
3.
Else, if there is a leaf g l with a sibling leaf g s :
     Do a horizontal contraction of g l into g s by Algorithm 2;
     Go back to step 1.
Proof of Theorem 1.  
This proof is conducted by showing that no further improvement can be achieved with the trade scheme output of Algorithm 3. First, it is not hard to find that each value for the participant from the final single node is the value sum for a path from the root to a leaf, e.g., a recipe. Since all the positive values from the final single node are already counted, adding more procurement sets can only produce a zero or negative surplus. Conversely, removing any existing procurement sets from the trade scheme of Algorithm 3 can only cause a positive loss. Another observation is that both the users and service providers are chosen according to the decreasing value order before replacing any user or service provider with one that is not previously included in the trade scheme of Algorithm 3, which can only cause a decrease in the value sum.    □
Theorem 2. 
The optimal trade scheme can be calculated in polynomial time with Algorithm 3.
Proof of Theorem 2.  
Denote n as the total number of participants, e.g.,  n = N + 3 M for Figure 2a. Denote k as the total number of categories, e.g.,  k = 1 + 3 = 4 for Figure 2a. Usually, we assume k n .
The time complexity for the pre-processing step of sorting the participants into different categories is at most O ( n log n ) , by adopting an efficient sorting algorithm, e.g., the quick sort algorithm or the merge sort algorithm. Note that the participants can be sorted together once and then assigned to each category.
The time complexity for Algorithm 1 or Algorithm 2 is at most O ( n ) since, in each loop, at least one participant is removed and only some linear operations are conducted. Then, the time complexity for Algorithm 3 is at most O ( n · k ) since, in each loop, either Algorithm 1 or Algorithm 2 is invoked to remove a category. The process of choosing the positive values in step 1 of Algorithm 3 is linear, i.e.,  O ( n ) .
Since we assume that k n , the overall time complexity for calculating the optimal trade scheme with Algorithm 3 is O ( n log n + n · k + n ) = O ( n log n ) , which is bounded by O ( n 2 ) and thus polynomial.    □

5. Multi-Sided Ascending-Price Auction Mechanism

Generally, the proposed multi-sided ascending-price auction mechanism is a randomized sequential mechanism, in which each category g is charged with a unified price  p g and the ascending price means that this price increased by Δ in each step, accompanied by a query for each participant in a pre-specified order of whether the increased price is acceptable, e.g., whether the value is still higher than the price. Those who cannot accept the increased price would be permanently removed from the market, for example, those who would receive a potential negative utility if they stayed. The price sum for a recipe is monitored, and the auction terminates when this price sum crosses zero. The final procurement sets and prices are determined from the remaining participants. In practice, the bids and prices can be counted with a specific currency so that the quantity Δ can be set as a currency unit, e.g., a dollar.
The general process of the proposed multi-sided ascending-price auction mechanism is shown in Algorithm 4. The first step is initialization, in which the initial prices are well designed with a sufficiently large value V, which satisfies V < v i < V for any participant i. To determine the initial prices, the max depth M a x D e p t h of the recipe tree R and the depth D e p t h ( g ) for each category g G are calculated in advance. The initial prices are calculated for the non-leaf and leaf nodes separately so that the price sum in each path from the root to a leaf is the same.
Algorithm 4 The ascending-price auction mechanism
  • Input: A set of categories G, a set of participants N g for all g G , a recipe tree R , the values and bandwidths of all participants.
  • Output: The procurement sets S and a price vector p = { p g } for all g G .
1.
initialization: Determine the initial price vector p :
     For each non-leaf node g, set p g : = V ;
     For each leaf node g, set p g : = V · ( M a x D e p t h D e p t h ( g ) + 1 ) .
2.
Select G * G for price ascending with Algorithm 5.
3.
Price ascending: For each g * G * , ask each participant i N g * whether v i > p g * with a pre-specified order:
     If the answer is negative, then remove i from N g * , and go back to step 2.
     If the answers from all participants for all g * G * are positive, then for all g * G * , update p g * = p g * + Δ ;
     If, after the increase, the price sum of a recipe R crosses zero, i.e.,  g G p g · R g 0 , reset p g * = p g * g G p g · R g so that the price sum of a recipe is exactly zero. Then, go on to step 4.
4.
Determine the final trade scheme with Algorithm 6.
The next part chooses a subset of categories to be used for the price ascending process, which is accomplished by Algorithm 5. Note that m g represents the sum of bandwidths for category g in our study, instead of the user numbers in ref. [11]. The key idea is to use the supply and demand relationship to determine the prices to be increased. Generally, if the bandwidth sum of the root node, i.e., the user, is greater than the bandwidth sum of its children, i.e., the service providers, the price charged for the users is increased so that some user would leave the market. In the opposite situation, wherein the price charged for the service providers is increased (equally, the price paid for the service providers is decreased) so that some service providers would leave the market. A desirable property of Algorithm 5 is that the chosen subset contains exactly one price for each path from a root a leaf. Recall that the initial price sum in all recipes is set to be the same. By simultaneously increasing the prices in the chosen subset, the price sum in all recipes remains the same.
Algorithm 5 The subset selection for price ascending
  • Input: A set of categories G, a set of remaining participants N g for all g G , a recipe tree R , the values and bandwidths of all remaining participants.
  • Output: A subset of G containing categories whose prices are to be increased.
1.
Initialization: For each category g G , define m g : = i N g r i =the bandwidth sum of participants of N g who remain in the market.
2.
Denote g 0 as the root category:
     If g 0 has no children or m g 0 > g C h i l d r e n ( g ) m g , return { g 0 } ;
     Else for each child g of g 0 , apply Algorithm 5 on the sub-tree rooted at g
     recursively and take the union set of the outcome I g , i.e., return g C h i l d r e n ( g ) I g .
At some time step, the price sum of a recipe crosses zero, which triggers the termination of the price ascending process. To maintain the strong budget balance, the increased prices are reset so that the price sum of a recipe is exactly zero, as shown in Step 3 of Algorithm 5. After the auction is terminated and the price vector is finalized, the final trade scheme is further determined by Algorithm 6.
Algorithm 6 The trade scheme determination
  • Input: A set of categories G, a set of remaining participants N g for all g G , a recipe tree R , the values and bandwidths of all remaining participants.
  • Output: The procurement sets S .
1.
If the recipe tree has a single root node g:
     Return the remaining participants in category g, with the original participant identity reversed from the recorded participant identity set.
2.
Else, if the recipe tree has a single root node g and a single child g c :
    If m g > m g c , i.e., the bandwidth sum requested by the users is larger than the bandwidth resource provided by the service providers:
        Remove the participant in N g in a random order until m g m g c ;
     Randomly order the participants in N g and N g c ;
     Do a vertical contraction of g c into g by Algorithm 1;
     Go back to step 1.
3.
Else, pick an arbitrary leaf g l .
4.
If  g l is the single child of its parent g p :
     Randomly order the participants in N g l and N g p ;
     Do a vertical contraction of g l into g p by Algorithm 1;
     Go back to step 1.
5.
Else, choose a sibling g s of g l :
     Randomly order the participants in N g l and N g s ;
     Do a horizontal contraction of g l into g s by Algorithm 2;
     Go back to step 1.
Since the supply and demand of bandwidth resources may not be balanced after the auction terminates, some participants must be removed from the market in the trade scheme determination. To avoid non-truthful and strategic behaviors, the selection of the remaining participants is independent of the values but conducted in a random fashion, as shown in Algorithm 6. The vertical contraction algorithm defined in Algorithm 1 and the horizontal contraction algorithm defined in Algorithm 2 are both leveraged in the trade scheme determination, but with a randomized order of input participants, instead of the value-decreasing order, to maintain truthfulness. When the bandwidth sum requested by the users is larger than the bandwidth resource provided by service providers, some users are removed from the market as a binary decision of admission rejection, instead of being partially served, until the remaining users can be fully served.
An example is used to demonstrate the multi-sided ascending-price auction mechanism as shown in Table 5, following the values and bandwidths from Figure 2b, when Δ is set to 1. In the initialization step, the prices for the users, satellite network service providers, RAN service providers, and WAN service providers are set to V , 2 V , V , and V , respectively. The initial price sums for recipes ( 1 , 1 , 0 , 0 ) and ( 1 , 0 , 1 , 1 ) are both 3 V , i.e., V 2 V = V V V = 3 V .
In the first round of price ascending, the bandwidth sum of the users is less than the bandwidth sum of the satellite network service providers and RAN service providers, i.e., 13 < 7 + 6 . The bandwidth sum of the RAN service providers is less than the WAN service providers, i.e., 6 < 8 . Thus, the subset G * is chosen as { 2 , 4 } , i.e., satellite network service providers and the WAN service providers. The prices are increased until the WAN provider with value of -6 exits the market. Afterwards, the price vector becomes ( V , V 6 , V , 6 ) and the price sum for a recipe becomes 2 V 6 .
A similar process continues until the last line of Table 5, when the price sum for a recipe crosses zero as ( 10 , 10 , 5 , 5 ) , and the auction terminates. An example of the procurement sets generated by the ascending-price auction mechanism is shown in Table 6. Note that the served users are chosen at random instead of their values. The same rule applies for the service providers. Different users or network service providers in the same domain use the same price, making it indifferent for a user to choose between different routes or service providers, as long as the bandwidth requirement can be satisfied. One may easily validate the gain from trade for the trade scheme in Table 6 (which is ( 17 4 ) × 2 + ( 17 5 ) × 3 + ( 15 3 4 ) × 2 + ( 13 1 1 ) × 1 = 89 ) is less than that of the optimal trade scheme in Table 4 (which is ( 17 1 1 ) × 1 + ( 17 4 ) × 2 + ( 17 3 1 ) × 2 + ( 15 5 ) × 2 + ( 14 5 ) × 1 + ( 14 8 ) × 1 + ( 13 5 4 ) × 1 = 106 ).
To conclude this section, some theoretical analysis is given through Theorem 3, which demonstrates that the proposed multi-sided ascending-price auction mechanism satisfies the desirable properties.
Theorem 3. 
The multi-sided ascending-price auction mechanism of Algorithm 4 is strongly budget-balanced, individually rational, and obviously truthful.
Proof of Theorem 3. 
Since the proposed multi-sided ascending-price auction mechanism is a randomized mechanism, it is sufficient to prove that any deterministic variant with a pre-specified order of the participants satisfies these properties, i.e., all the random ordering operations in Algorithm 6 are conducted with a pre-specified order.
A strong budget balance is guaranteed by two properties of Algorithm 4. The first property is that the price sum of all the recipes is the same as the price ascending operation. The second property is that the auction is terminated with an exact zero price sum, guaranteed by the price reset step.
Individual rationality is guaranteed by the property of Algorithm 4 that only those participants with values greater than or equal to the prices would remain in the market. Otherwise, they should leave the market after the price increase to avoid negative utility.
To prove the obvious truthfulness, consider the behavior of a specific participant i from category g during the process of price ascending when asked whether v i > p g .
If the true case is v i > p g and the participant answers truthfully, the lowest possible utility they can expect is 0 since the mechanism is individually rational. However, if the participant answers untruthfully, they would be immediately removed from the market, with the highest possible utility of 0.
If the true case is v i p g and the participant answers truthfully, the lowest possible utility they can expect is 0 because they are removed from the market immediately. However, if the participant answers untruthfully, the highest possible utility they can expect from remaining in the market is 0, since the price can only increase and their utility can only decrease.
For the trade scheme determination, no strategic behaviors from the participant can change the result since the adopted order is pre-specified, regardless of their values. This completes the proof that the lowest possible utility of a participant acting truthfully is at least as high as the highest possible utility of acting untruthfully. □

6. Numerical Experiments

To evaluate the performance of the proposed multi-sided ascending-price auction approach for providing the multi-domain network slicing service, real-world data are leveraged in the simulation experiments in this section. Our main objectives in this section are to evaluate the gap between the proposed multi-sided ascending-price auction mechanism and the optimal trade mechanism, which is used as an upper bound without desirable economic properties, and to evaluate the influence of different parameters on the performance. To demonstrate the effectiveness of the proposed multi-sided ascending-price auction mechanism, a second-price auction is used as the baseline in this section. The second-price auction has the desirable truthfulness property and has been proven effective in previous relevant studies [35]. However, since previous game theory-based solutions do not fit to our newly defined problem as shown in Table 2 in Section 2, the standard second-price auction is not applicable and a variant is designed as follows. The service providers from the service chain route with K domains are paired up randomly and act as a coalition to compete with the service provider from the service shortcut route in a standard second-price auction approach.

6.1. Experiment Settings

For the recipe tree, we adopt the basic structure of a user group and two alternative routes, e.g., the first route as the service shortcut route and the second route as the service chain route (with K different domains), as shown in Figure 2a. More complex structures will be considered in our future studies.
The bandwidth amount requested by users is modeled with historical traffic data collected from the China Education and Research Network (CERNET). During this time period, the CERNET topology contained 14 nodes and 16 bi-directional links [56]. The historical traffic is recorded for each node pair every five minutes from 19 February 2013 to 26 March 2013, with a total number of 9999 time slots used in the experiments. After filtering the node pairs with only zero values, a total of 159 node pairs remain, out of which N node pairs are chosen at random and without replacement as the users (e.g., N = 10, 20, 50, 100, or 150). The historical traffic data distribution is shown in Figure 5, in which 300 Mbps is approximately the 90th percentile value. Only the requested bandwidth from users is modeled as time-varying in the experiments.
The available bandwidth amount provided by service providers is drawn from a uniform distribution U [ 0 , 300 / α ] , in which α = M / N is the service provider/user ratio. When the number of users is equal to the number of service providers in a domain, the uniform distribution becomes U [ 0 , 300 ] . With a lower service provider/user ratio (i.e., a smaller α ), the bandwidth resource provided by the remaining service provider increases accordingly to maintain the same expected total bandwidth for a fair comparison of the different service provider/user ratios in Section 6.3.
The bid prices of users and the ask prices of service providers in the service shortcut route are drawn from a uniform distribution U [ 0 , 100 ] , and the ask prices of service providers in the service chain route are drawn from a uniform distribution U [ 0 , 100 / K ] , which is affected by the domain number in the service chain route. With a longer service chain (i.e., a larger K), the ask price from the growing domains decreases accordingly to maintain the same expected total cost of using the service chain route for a fair comparison of different domain numbers in Section 6.4. Otherwise, if the ask prices increase with the domain numbers linearly, then no users would prefer a longer service chain route and this comparison becomes trivial (and thus, the service chain route becomes economically prohibitive in practice). The economic intuition is that, if more service providers are meant to cooperate in the service chain route, the overall cost must be controlled to be competitive with the satellite service provider in the service shortcut route.
The parameters used in the experiments as well as their value ranges are summarized in Table 7. Only the bandwidth information is derived from real-world historical traffic values and the user or price information is difficult to obtain, even from the existing terrestrial network service providers, as such information is usually their commercial secret. It is also impossible to obtain such information from the satellite network service provider, which is at the very early stage of providing commercial services. Instead, we set the similar parameters and the uniform distribution format following previous relevant studies [8,44,57].
In each time slot, N user requests are generated, and the market operator attempts to admit or reject these requests based on the bandwidth and price information. Both the optimal trade mechanism and the proposed ascending auction mechanism are implemented and compared. To evaluate the admission results and quantify the influence of different parameter values, different evaluation metrics are defined and used in the experiments.
The first evaluation metric is the admission ratio within the range of 0–1, which calculates the ratio of the admitted requests to all the requests. The second evaluation metric is the served bandwidth per user in Mbps, in which both the admitted and rejected users are counted as the denominator to reflect the overall service ability of different mechanisms under different user sizes in a fair way. The third evaluation metric is the gain from trade per user, in which all the users are counted for the same reason. The gain from trade per user can be further divided into two parts, namely the user gain and the service provider profit, which are used in Section 6.4.

6.2. Impact of User Numbers

Different user numbers correspond to different market sizes, e.g., thin, medium, and thick markets. In the experiments of this section, the user number and the service provider number in a single domain are assumed to be the same, i.e., N = M . In other words, when the user number increases, the service provider number also increases, so that the supply and demand relationship remains stable.
The evaluation result of the impact with different user numbers is shown in Figure 6. In a thicker market with more users, all three evaluation metrics of the proposed ascending auction mechanism increase. The performance of the ascending auction mechanism also becomes closer to the optimal trade mechanism, showing that it is asymptotically optimal with an increasing market size. This observation makes our proposed mechanism favorable in practice, with both a theoretical guarantee of economic properties and an asymptotically optimal service provision performance.

6.3. Impact of Service Provider/User Ratios

In the previous part, an assumption is made that the user number is the same as the service provider number in a single domain, which may not be the case in practice when a large number of users are actually served by a few telecommunications companies. To reflect this market feature, we alter the service provider/user ratio to a smaller value and evaluate its impact on the service provision performance of both the optimal trade and our proposed ascending auction mechanisms when the user number is fixed as N = 10 (e.g., a thin market) and N = 100 (e.g., a thick market). It is worth mentioning that even when the number of service providers decreases, each remaining service provider is endorsed with a stronger service ability (e.g., a bandwidth value drawn from a larger range) to maintain the overall service level. Otherwise, the outcome would be obvious and trivial because a lower overall service level would impair the performance of any mechanism.
The evaluation of different service provider/user ratios is shown in Figure 7. With a more centralized market, i.e., in the case of a smaller service provider/user ratio, the performance of either the ascending auction mechanism or the optimal trade mechanism decreases, but to different degrees. The performance of the optimal trade mechanism is slightly affected, especially for the metrics of admission ratio and served bandwidth per user. However, the performance of the ascending auction mechanism is highly affected, e.g., the admission ratio drops by approximately 50% in Figure 7a. The implication is that a diverse and fully competitive market with a large number of service providers is more favorable for our proposed ascending auction mechanism, in which its performance is closer to the optimal trade mechanism.
It is also found in Figure 7 that the ascending auction mechanism is less affected in the thick market than in the thin market, which gives another implication that the thick market with more users is more robust to the centralization of service providers.

6.4. Impact of Domain Numbers

In this part, the impact of different domain numbers is further evaluated in both the thin market (i.e., N = 10 ) and the thick market (i.e., N = 100 ). The motivation is to validate whether it would be more difficult to provide network slicing services involving more domains in the service chain route and whether the service shortcut route would become more favorable or not. Similarly to the previous part, to avoid an unfair comparison, the ask price of the service providers from the domains in the service chain route decreases accordingly when the domain number decreases to maintain a stable overall service cost.
The evaluation of different domain numbers in the service chain route is shown in Figure 8. Both the ascending auction and the optimal trade mechanisms are hardly affected by the increasing domain numbers in the service chain route, as long as the service cost for using the two alternative routes remains at the same level. Intuitively, when more domains with a fixed ask price level are required to build the network slices, fewer users who are capable of affording the increasing service cost remain. Our result implies that the difficulty of providing multi-domain network slicing services does not rely on the domain number but the overall service cost along the service chain route.
Figure 9 is used to compare the user gain and service provider profit with different domain numbers in the service chain route. The gain from trade per use is decomposed into two parts, namely, the user gain and the service provider profit, in the results of the ascending auction mechanism. The user gain is defined as the gap between the user’s value and the auction price. Similarly, the service provider profit is defined as the gap between the auction price and the service provider’s value. For the second route, i.e., the service chain route, the sum of the service provider profit is used to compare with the profit of the first route. As shown in Figure 9, the service provider’s profit increases with a larger domain number, and the increase part is filled with the decrease in the user gain. This implies that more gain from trade is transferred from the user side to the service provider side when it becomes more cumbersome to provide the network slicing service in the service chain route involving more domains. In other words, the service provider can earn more profit, even without increasing the overall service cost and impairing the overall performance in the ascending auction mechanism. Furthermore, this internal impact is more obvious in a thin market (i.e., Figure 9a), compared with a thick market (i.e., Figure 9b). In other words, in a thin market with only 10 users or service providers, the decrease in the user gain is more obvious with the increase in the domain number K, compared to that in a thick market with 100 users or service providers.

7. Conclusions

For implementing and operating the satellite-terrestrial integrated network, network slicing is adopted as a solution to meet the differentiated service requirements and orchestrate the underlying network infrastructures in a unified manner. To improve resource utilization efficiency and motivate the participation of different service providers, slice admission control is further introduced. However, admission control for multi-domain network slicing becomes much more complex when multi-sided participants are involved and there is no perfect solution to date.
In this paper, a multi-sided auction approach is proposed for modeling multi-domain network slicing admission control as a mechanism design problem. Theoretical analysis shows that the proposed ascending-price auction mechanism is individually rational, strongly budget balanced, and obviously truthful. Numerical experiments based on both real-world and simulated data demonstrate that the ascending-price auction mechanism is asymptotically optimal with the increase in users compared with the optimal trade mechanism.
Some potential future research directions are also considered. The first consideration is a more complex market structures, for example, more than two alternative routes are available, or a single domain may be used within multiple routes. From the user’s perspective, more choices bring more opportunities for using the network slicing service with a lower price. From the service provider’s perspective, both a deeper entangled cooperation relationship among the domains in the same route and a harsh competition relationship among the domains in the different routes exist. More numerical experiments are expected to be designed to evaluate the ascending-price auction mechanism in more complex and realistic settings.
Another consideration is the extension from the bandwidth requirements to more requirements, e.g., transmission delay and energy consumption constraints. Similar constraints have been considered in relevant multi-domain tasks, e.g., network slicing orchestration with impatient tenants [58] and energy-efficient service function chaining orchestration [57]. It is worth further consideration to incorporate these factors in the ascending-price auction mechanism, while maintaining the desirable properties.
In addition, some statistical analysis and analysis of variance can be conducted to demonstrate the statistical significance of the performance for the proposed ascending-price auction mechanism in future numerical experiments.

Author Contributions

Conceptualization, W.J. and Y.Z.; methodology, W.J. and Y.Z.; software, W.J. and Y.Z.; validation, W.J. and Y.Z.; formal analysis, W.J. and Y.Z.; investigation, W.J. and Y.Z.; resources, W.J. and Y.Z.; data curation, W.J. and Y.Z.; writing—original draft preparation, W.J. and Y.Z.; writing—review and editing, W.J., Y.Z. and X.X.; visualization, W.J. and Y.Z.; supervision, Y.Z. and X.X.; project administration, Y.Z. and X.X.; funding acquisition, Y.Z. and X.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Science and Technology Project of the State Grid Corporation of China (5400-202255158A-1-1-ZN).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Fang, X.; Feng, W.; Wei, T.; Chen, Y.; Ge, N.; Wang, C.X. 5G embraces satellites for 6G ubiquitous IoT: Basic models for integrated satellite terrestrial networks. IEEE Internet Things J. 2021, 8, 14399–14417. [Google Scholar] [CrossRef]
  2. Sheng, M.; Zhou, D.; Bai, W.; Liu, J.; Li, H.; Shi, Y.; Li, J. Coverage enhancement for 6G satellite-terrestrial integrated networks: Performance metrics, constellation configuration and resource allocation. Sci. China Inf. Sci. 2023, 66, 130303. [Google Scholar] [CrossRef]
  3. Xu, G.; Zhang, N.; Xu, M.; Xu, Z.; Zhang, Q.; Song, Z. Outage Probability and Average BER of UAV-assisted Dual-hop FSO Communication with Amplify-and-Forward Relaying. IEEE Trans. Veh. Technol. 2023, in press. [Google Scholar]
  4. Jiang, W.; Zhan, Y.; Xiao, X.; Sha, G. Network Simulators for Satellite-Terrestrial Integrated Networks: A Survey. IEEE Access 2023, 11, 98269–98292. [Google Scholar] [CrossRef]
  5. Singh, P.R.; Singh, V.; Yadav, R.; Chaurasia, S. 6G Networks for Artificial Intelligence-Enabled Smart Cities Applications: A Scoping Review. Telemat. Inform. Rep. 2023, 9, 100044. [Google Scholar] [CrossRef]
  6. Tan, J.; Guan, W. Resource allocation of fog radio access network based on deep reinforcement learning. Eng. Rep. 2022, 4, e12497. [Google Scholar] [CrossRef]
  7. Zahoor, S.; Ahmad, I.; Othman, M.T.B.; Mamoon, A.; Rehman, A.U.; Shafiq, M.; Hamam, H. Comprehensive analysis of network slicing for the developing commercial needs and networking challenges. Sensors 2022, 22, 6623. [Google Scholar] [CrossRef]
  8. Jiang, W.; Zhan, Y.; Zeng, G.; Lu, J. Probabilistic-forecasting-based admission control for network slicing in software-defined networks. IEEE Internet Things J. 2022, 9, 14030–14047. [Google Scholar] [CrossRef]
  9. Wang, J.; Liu, J.; Li, J.; Kato, N. Artificial Intelligence-Assisted Network Slicing: Network Assurance and Service Provisioning in 6G. IEEE Veh. Technol. Mag. 2023, 18, 49–58. [Google Scholar] [CrossRef]
  10. Oladejo, S.O.; Ekwe, S.O.; Akinyemi, L.A. Multi-Tier Multi-Domain Network Slicing: A Resource Allocation Perspective. In Proceedings of the IEEE AFRICON, Arusha, Tanzania, 13–15 September 2021; pp. 1–6. [Google Scholar]
  11. Gilor, D.; Gonen, R.; Segal-Halevi, E. Ascending-price mechanism for general multi-sided markets. In Proceedings of the European Conference on Multi-Agent Systems, Virtual, 28–29 June 2021; pp. 1–18. [Google Scholar]
  12. Barakabitze, A.A.; Ahmad, A.; Mijumbi, R.; Hines, A. 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Comput. Networks 2020, 167, 106984. [Google Scholar] [CrossRef]
  13. Ojijo, M.O.; Falowo, O.E. A survey on slice admission control strategies and optimization schemes in 5G network. IEEE Access 2020, 8, 14977–14990. [Google Scholar] [CrossRef]
  14. Debbabi, F.; Jmal, R.; Chaari Fourati, L. 5G network slicing: Fundamental concepts, architectures, algorithmics, projects practices, and open issues. Concurr. Comput. Pract. Exp. 2021, 33, e6352. [Google Scholar] [CrossRef]
  15. Ahmed, T.; Alleg, A.; Ferrus, R.; Riggio, R. On-demand network slicing using SDN/NFV-enabled satellite ground segment systems. In Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, Canada, 25–29 June 2018; pp. 242–246. [Google Scholar]
  16. Suzhi, C.; Junyong, W.; Hao, H.; Yi, Z.; Shuling, Y.; Lei, Y.; Shaojun, W.; Yongsheng, G. Space edge cloud enabling network slicing for 5G satellite network. In Proceedings of the 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 787–792. [Google Scholar]
  17. Hendaoui, S.; Zangarz, C.N. Leveraging SDN slicing isolation for improved adaptive satellite-5G downlink scheduler. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October–2 November 2021; pp. 1–5. [Google Scholar]
  18. Delgado, C.; Canales, M.; Ortín, J.; Gállego, J.R.; Redondi, A.; Bousnina, S.; Cesana, M. Joint application admission control and network slicing in virtual sensor networks. IEEE Internet Things J. 2017, 5, 28–43. [Google Scholar] [CrossRef]
  19. Dawaliby, S.; Bradai, A.; Pousset, Y. Adaptive dynamic network slicing in LoRa networks. Future Gener. Comput. Syst. 2019, 98, 697–707. [Google Scholar] [CrossRef]
  20. Nassar, A.; Yilmaz, Y. Deep reinforcement learning for adaptive network slicing in 5G for intelligent vehicular systems and smart cities. IEEE Internet Things J. 2021, 9, 222–235. [Google Scholar] [CrossRef]
  21. Wu, D.; Zhang, Z.; Wu, S.; Yang, J.; Wang, R. Biologically inspired resource allocation for network slices in 5G-enabled Internet of Things. IEEE Internet Things J. 2018, 6, 9266–9279. [Google Scholar] [CrossRef]
  22. Dawaliby, S.; Bradai, A.; Pousset, Y. Distributed network slicing in large scale iot based on coalitional multi-game theory. IEEE Trans. Netw. Serv. Manag. 2019, 16, 1567–1580. [Google Scholar] [CrossRef]
  23. Mano, T.; Inoue, T.; Ikarashi, D.; Hamada, K.; Mizutani, K.; Akashi, O. Efficient virtual network optimization across multiple domains without revealing private information. IEEE Trans. Netw. Serv. Manag. 2016, 13, 477–488. [Google Scholar] [CrossRef]
  24. Taleb, T.; Afolabi, I.; Samdanis, K.; Yousaf, F.Z. On multi-domain network slicing orchestration architecture and federated resource control. IEEE Netw. 2019, 33, 242–252. [Google Scholar] [CrossRef]
  25. Liu, Y.J.; Feng, G.; Wang, J.; Sun, Y.; Qin, S. Access Control for RAN Slicing based on Federated Deep Reinforcement Learning. In Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar]
  26. Jiang, W. Graph-based deep learning for communication networks: A survey. Comput. Commun. 2022, 185, 40–54. [Google Scholar] [CrossRef]
  27. Shi, X.; Li, Y.; Zhao, S.; Wang, W.; Wang, X. Multi-QoS objective optimization routing algorithm of satellite network based on SDN. Syst. Eng. Electron. 2020, 42, 1395–1401. [Google Scholar]
  28. Dong, P.; Gao, M.; Tang, F.; Cao, L.; Zhang, X.; Han, P.; Yang, Y.; Xu, W.; Zhang, X. Multi-Layer and Heterogeneous Resource Management in SDN-Based Space-Terrestrial Integrated Networks. In Proceedings of the IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Yanuca Island, Cuvu, Fiji, 14–16 December 2020; pp. 377–384. [Google Scholar]
  29. Sheng, M.; Wang, Y.; Li, J.; Liu, R.; Zhou, D.; He, L. Toward a flexible and reconfigurable broadband satellite network: Resource management architecture and strategies. IEEE Wirel. Commun. 2017, 24, 127–133. [Google Scholar] [CrossRef]
  30. Jiang, W. Software defined satellite networks: A survey. Digit. Commun. Netw. 2023, in press. [Google Scholar] [CrossRef]
  31. Tang, J.; Nie, J.; Xiong, Z.; Zhao, J.; Zhang, Y.; Niyato, D. Slicing-based Reliable Resource Orchestration for Secure Software Defined Edge-Cloud Computing Systems. IEEE Internet Things J. 2021, 9, 2637–2648. [Google Scholar] [CrossRef]
  32. Tang, J.; Nie, J.; Zhao, J.; Zhou, Y.; Xiong, Z.; Guizani, M. Slicing-Based Software-Defined Mobile Edge Computing in the Air. IEEE Wirel. Commun. 2022, 29, 119–125. [Google Scholar] [CrossRef]
  33. Jiang, W. Cellular traffic prediction with machine learning: A survey. Expert Syst. Appl. 2022, 201, 117163. [Google Scholar] [CrossRef]
  34. Zhang, X.; Qian, B.; Qin, X.; Ma, T.; Chen, J.; Zhou, H.; Shen, X.S. Cybertwin-Assisted Mode Selection in Ultra-Dense LEO Integrated Satellite-Terrestrial Network. J. Commun. Inf. Networks 2022, 7, 360–374. [Google Scholar] [CrossRef]
  35. Du, J.; Jiang, C.; Zhang, H.; Ren, Y.; Guizani, M. Auction design and analysis for SDN-based traffic offloading in hybrid satellite-terrestrial networks. IEEE J. Sel. Areas Commun. 2018, 36, 2202–2217. [Google Scholar] [CrossRef]
  36. Chen, Q.; Meng, W.; Han, S.; Li, C. Service-oriented fair resource allocation and auction for civil aircrafts augmented space-air-ground integrated networks. IEEE Trans. Veh. Technol. 2020, 69, 13658–13672. [Google Scholar] [CrossRef]
  37. Li, Z.; Jiang, C.; Kuang, L. Double auction mechanism for resource allocation in satellite MEC. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 1112–1125. [Google Scholar] [CrossRef]
  38. Xie, W.; Lin, L.; Lyu, T.; Xu, H. Multi-Round Auction-Based Resource Allocation in Multi-Access Edge Computing Assisted Satellite Networks. Electronics 2023, 12, 2482. [Google Scholar] [CrossRef]
  39. Zhang, X.; Zhang, B.; An, K.; Chen, Z.; Guo, D. Auction-based secondary relay selection on overlay spectrum sharing in hybrid satellite–terrestrial sensor networks. Sensors 2019, 19, 5039. [Google Scholar] [CrossRef] [PubMed]
  40. Zhang, X.; An, K.; Zhang, B.; Chen, Z.; Yan, Y.; Guo, D. Vickrey auction-based secondary relay selection in cognitive hybrid satellite-terrestrial overlay networks with non-orthogonal multiple access. IEEE Wirel. Commun. Lett. 2020, 9, 628–632. [Google Scholar] [CrossRef]
  41. Zhang, X.; Guo, D.; An, K.; Zheng, G.; Chatzinotas, S.; Zhang, B. Auction-based multichannel cooperative spectrum sharing in hybrid satellite-terrestrial IoT networks. IEEE Internet Things J. 2020, 8, 7009–7023. [Google Scholar] [CrossRef]
  42. Jung, S.; Lee, M.S.; Kim, J.; Yun, M.Y.; Kim, J.; Kim, J.H. Trustworthy handover in LEO satellite mobile networks. ICT Express 2022, 8, 432–437. [Google Scholar] [CrossRef]
  43. Zhang, D.; Chang, Z.; Yu, F.R.; Chen, X.; Hämäläinen, T. A double auction mechanism for virtual resource allocation in SDN-based cellular network. In Proceedings of the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–8 September 2016; pp. 1–6. [Google Scholar]
  44. Khamse-Ashari, J.; Senarath, G.; Bor-Yaliniz, I.; Yanikomeroglu, H. An agile and distributed mechanism for inter-domain network slicing in next-generation mobile networks. IEEE Trans. Mob. Comput. 2021, 21, 3486–3501. [Google Scholar] [CrossRef]
  45. Zhu, Z. Economics of Multi-Domain Software-Defined EONs: Games among Brokers. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  46. Dieye, M.; Jaafar, W.; Elbiaze, H.; Glitho, R.H. Market driven multidomain network service orchestration in 5g networks. IEEE J. Sel. Areas Commun. 2020, 38, 1417–1431. [Google Scholar] [CrossRef]
  47. Shi, J.; Tian, H.; Fan, S.; Zhao, P.; Zhao, K. Hierarchical auction and dynamic programming based resource allocation (HA&DP-RA) algorithm for 5G RAN slicing. In Proceedings of the 24th Asia-Pacific Conference on Communications (APCC), Ningbo, China, 12–14 November 2018; pp. 207–212. [Google Scholar]
  48. Xu, Z.; Tang, N.; Xu, C.; Cheng, X. Data science: Connotation, methods, technologies, and development. Data Sci. Manag. 2021, 1, 32–37. [Google Scholar] [CrossRef]
  49. Antevski, K.; Bernardos, C.J. Federation of 5g services using distributed ledger technologies. Internet Technol. Lett. 2020, 3, e193. [Google Scholar] [CrossRef]
  50. He, G.; Su, W.; Gao, S.; Liu, N.; Das, S.K. NetChain: A Blockchain-enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture. IEEE Trans. Netw. Serv. Manag. 2021, 19, 188–202. [Google Scholar] [CrossRef]
  51. Alemany, P.; Vilalta, R.; Muñoz, R.; Casellas, R.; Maríinez, R. Peer-to-Peer Blockchain-based NFV Service Platform for End-to-End Network Slice Orchestration Across Multiple NFVI Domains. In Proceedings of the IEEE 3rd 5G World Forum (5GWF), Bangalore, India, 10–12 September 2020; pp. 151–156. [Google Scholar]
  52. Far, S.B.; Bamakan, S.M.H. Blockchain-based reporting protocols as a collective monitoring mechanism in DAOs. Data Sci. Manag. 2022, 5, 11–12. [Google Scholar]
  53. Han, B.; Schotten, H.D. Machine Learning for Network Slicing Resource Management Resource Management: A Comprehensive Survey. ZTE Commun. 2019, 68, 17. [Google Scholar]
  54. Myerson, R.B.; Satterthwaite, M.A. Efficient mechanisms for bilateral trading. J. Econ. Theory 1983, 29, 265–281. [Google Scholar] [CrossRef]
  55. Li, S. Obviously strategy-proof mechanisms. Am. Econ. Rev. 2017, 107, 3257–3287. [Google Scholar] [CrossRef]
  56. Liu, Z.; Wang, Z.; Yin, X.; Shi, X.; Guo, Y.; Tian, Y. Traffic Matrix Prediction Based on Deep Learning for Dynamic Traffic Engineering. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June–3 July 2019; pp. 1–7. [Google Scholar]
  57. Sun, G.; Li, Y.; Yu, H.; Vasilakos, A.V.; Du, X.; Guizani, M. Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks. Future Gener. Comput. Syst. 2019, 91, 347–360. [Google Scholar] [CrossRef]
  58. Han, B.; Sciancalepore, V.; Costa-Perez, X.; Feng, D.; Schotten, H.D. Multiservice-based network slicing orchestration with impatient tenants. IEEE Trans. Wirel. Commun. 2020, 19, 5010–5024. [Google Scholar] [CrossRef]
Figure 1. The basic structure of the multi-domain network slicing service provision market. (a) The physical infrastructure; and (b) the logical structure.
Figure 1. The basic structure of the multi-domain network slicing service provision market. (a) The physical infrastructure; and (b) the logical structure.
Aerospace 10 00830 g001
Figure 2. The recipe tree example: (a) a recipe tree with two recipes; and (b) the values and bandwidths of the participants.
Figure 2. The recipe tree example: (a) a recipe tree with two recipes; and (b) the values and bandwidths of the participants.
Aerospace 10 00830 g002
Figure 3. The example of the vertical contraction algorithm: (a) The result of the recipe tree after the vertical contraction; and (b) The result of combined values and bandwidths.
Figure 3. The example of the vertical contraction algorithm: (a) The result of the recipe tree after the vertical contraction; and (b) The result of combined values and bandwidths.
Aerospace 10 00830 g003
Figure 5. Histogram of the historical traffic data used in the experiments.
Figure 5. Histogram of the historical traffic data used in the experiments.
Aerospace 10 00830 g005
Figure 6. The comparison with the cases of different user numbers (or service provider numbers in a domain): (a) the admission ratio; (b) the average served bandwidth per user; and (c) the gain from trade per user.
Figure 6. The comparison with the cases of different user numbers (or service provider numbers in a domain): (a) the admission ratio; (b) the average served bandwidth per user; and (c) the gain from trade per user.
Aerospace 10 00830 g006
Figure 7. The comparison with the cases of different provider/user ratios (M/N): (a) the admission ratio (N = 10); (b) the average served bandwidth per user (N = 10); (c) the gain from trade per user (N = 10); (d) the admission ratio (N = 100); (e) the average served bandwidth per user (N = 100); and (f) the gain from trade per user (N = 100).
Figure 7. The comparison with the cases of different provider/user ratios (M/N): (a) the admission ratio (N = 10); (b) the average served bandwidth per user (N = 10); (c) the gain from trade per user (N = 10); (d) the admission ratio (N = 100); (e) the average served bandwidth per user (N = 100); and (f) the gain from trade per user (N = 100).
Aerospace 10 00830 g007
Figure 8. The comparison with the cases of different domain numbers in the service chain route: (a) the admission ratio (N = 10); (b) the average served bandwidth per user (N = 10); (c) the gain from trade per user (N = 10); (d) the admission ratio (N = 100); (e) the average served bandwidth per user (N = 100); and (f) the gain from trade per user (N = 100).
Figure 8. The comparison with the cases of different domain numbers in the service chain route: (a) the admission ratio (N = 10); (b) the average served bandwidth per user (N = 10); (c) the gain from trade per user (N = 10); (d) the admission ratio (N = 100); (e) the average served bandwidth per user (N = 100); and (f) the gain from trade per user (N = 100).
Aerospace 10 00830 g008
Figure 9. The comparison with the cases of different domain numbers in the service chain route: (a) the user gain and the service provider profit (N = M = 10); and (b) the user gain and the service provider profit (N = M = 100).
Figure 9. The comparison with the cases of different domain numbers in the service chain route: (a) the user gain and the service provider profit (N = M = 10); and (b) the user gain and the service provider profit (N = M = 100).
Aerospace 10 00830 g009
Table 1. The acronyms and their corresponding full forms used in this study.
Table 1. The acronyms and their corresponding full forms used in this study.
SymbolDescription
eMBBEnhanced Mobile Broadband
GEOGeosynchronous Equatorial Orbit
IoTInternet of Things
LEOLow-Earth Orbit
MEOMedium-Earth Orbit
mMTCMassive Machine Type Communication
NFVNetwork Function Virtualization
NSNetwork Slicing
QoEQuality-of-Experience
SDNSoftware Defined Networking
SPService Provider
UAVUnmanned Aerial Vehicle
uRLLCUltra-Reliable Low-Latency Communication
Table 2. The summary of previous game theory-based access control mechanisms.
Table 2. The summary of previous game theory-based access control mechanisms.
StudyTerrestrial SPsSatellite SPsCooperation in SPsCompetition in SPsOptimization ObjectiveSolution
[43] Social welfare maximizationIterative double auction
[44] Social welfare maximizationIterative auction
[10] Transformed utility maximizationMany-to-one matching game
[45] Nash equilibriumKernel density estimation-based bidding strategy
Profit maximizationNash bargaining
[46] Service provider profit maximizationHierarchical auction
[47] StabilityHierarchical auction
This studyBudget balance, individually rationality, and obviously truthfulnessMulti-sided ascending-price auction
Table 3. The description of major mathematical symbols.
Table 3. The description of major mathematical symbols.
SymbolDescription
GThe participant type set
N The participant set
NThe size of a participant set
KThe domain number
MThe service provider number
r i ( r j )The resource request (amount) of user i (service provider j)
b i ( b j )The unit bid (ask) price of user i (service provider j)
p i ( p j )The paid (received) price of user i (service provider j)
v i ( v j )The unit value of user i (service provider j)
u i ( u j )The utility of user i (service provider j)
SThe procurement set
r ^ S The served bandwidth amount of S
S The trade scheme
R The recipe tree
VThe large value as the initial price
Δ The unit quantity as the price increase step
Table 4. The outcome of the optimal trade mechanism using the values and bandwidths from Figure 2b.
Table 4. The outcome of the optimal trade mechanism using the values and bandwidths from Figure 2b.
User (Value)Service Provider (Value)Served Bandwidth
User (17)RAN Provider (−1), WAN Provider (−1)1
User (17)Satellite Network Provider (−4)2
User (17)RAN Provider (−3), WAN Provider (−1)2
User (15)Satellite Network Provider (−5)2
User (14)Satellite Network Provider (−5)1
User (14)Satellite Network Provider (−8)1
User (13)RAN Provider (−5), WAN Provider (−4)1
Table 5. An example of the multi-sided ascending-price auction mechanism using the values and bandwidths from Figure 2b.
Table 5. An example of the multi-sided ascending-price auction mechanism using the values and bandwidths from Figure 2b.
Bandwidth SumG*Price-Increase Stops whenNew PricesPrice Sum
(Initialization) V , 2 V , V , V 3 V
12, 7, 6, 8{2, 4}WAN provider with value −6 exits V , V 6 , V , 6 2 V 6
12, 7, 6, 5{2, 3}RAN provider with value −5 exits V , 11 , 5 , 6 V 11
12, 7, 3, 5{1}User with value 9 exits 9 , 11 , 5 , 6 2
10, 7, 3, 5{2, 4}Satellite network provider with value −10 exits 9 , 10 , 5 , 5 1
10, 6, 3, 5{1}Price sum for a recipe crosses zero 10 , 10 , 5 , 5 0
Table 6. An example trade scheme of the ascending-price auction mechanism using the values and bandwidths from Figure 2b.
Table 6. An example trade scheme of the ascending-price auction mechanism using the values and bandwidths from Figure 2b.
User (Value)Provider (Value)Served Bandwidth
User (17)Satellite Network Provider (−4)2
User (17)Satellite Network Provider (−5)3
User (15)RAN Provider (−3), WAN Provider (−4)2
User (13)RAN Provider (−1), WAN Provider (−1)1
Table 7. Parameter settings.
Table 7. Parameter settings.
ParameterRange or Distribution
User number N{10, 20, 50, 100, 150}
Service provider number M in a domain{10, 20, 50, 100, 150}
Service provider/user ratio α = M / N {1.0, 0.8, 0.6, 0.4, 0.2}
Domain number K in the service chain route{1, 2, 3, 4}
Bandwidth requested by usersHistorical traffic values
Bid price of users U [ 1 , 100 ]
Bandwidth provided by service providers U [ 1 , 300 / α ]
Ask price of service providers in the service shortcut route U [ 1 , 100 ]
Ask price of service providers in the service chain route U [ 1 , 100 / K ]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiang, W.; Zhan, Y.; Xiao, X. Multi-Domain Network Slicing in Satellite–Terrestrial Integrated Networks: A Multi-Sided Ascending-Price Auction Approach. Aerospace 2023, 10, 830. https://doi.org/10.3390/aerospace10100830

AMA Style

Jiang W, Zhan Y, Xiao X. Multi-Domain Network Slicing in Satellite–Terrestrial Integrated Networks: A Multi-Sided Ascending-Price Auction Approach. Aerospace. 2023; 10(10):830. https://doi.org/10.3390/aerospace10100830

Chicago/Turabian Style

Jiang, Weiwei, Yafeng Zhan, and Xiaolong Xiao. 2023. "Multi-Domain Network Slicing in Satellite–Terrestrial Integrated Networks: A Multi-Sided Ascending-Price Auction Approach" Aerospace 10, no. 10: 830. https://doi.org/10.3390/aerospace10100830

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop