Slice-aware Service Chaining Zoltán Zsóka, Khalil Mebarkia Department of Networked Systems and Services, Budapest University of Technology and Economics {zsoka, mebarkia}@hit.bme.hu Abstract—Among many other key features, the 5G technology introduced the concept of Network Slicing. It supports that different services or even different operators use the same network resources in a dedicated or shared way. On the other hand, QoS for the traffic is mostly provided on the network resources by weighted or strict scheduling. In this paper, we introduce heuristic service chaining solutions that consider shared slicing and apply a kind of preservation of network resources for other slices to hold the QoS expectations. Our numerical results show the advantages of them from the aspects of loads and overloads of links. Index Terms—Network Slicing, Service Function Chaining (SFC), NFV, VNF, 5G Networks I. I NTRODUCTION Emerging technologies such as software defined networks (SDN) and network function virtualization (NFV) along with the concept of Network Slicing in Service Function Chaining (SFC) are playing an enabler key for the 5G mobile networks. The connectivity of massive devices characterizes this technology, enabling and supporting a wide range of novel applications such as Autonomous Driving, Augmented Reality, and Internet of Things (IoT). In recent years, Software Defined Networking (SDN) and Network Function Virtualization (NFV) has been playing a key role in the 5G network architecture, also offering new and different ways to design, implement and manage the network and its services. Moreover, they both can significantly enhance network performance in order to enable flexibility, including Virtual Network Virtualized (VNF), Service Chaining (SFC), separated control plane and Network Slicing, etc. NFV is considered the primary entity that provides an architecture to share resources between Virtual Network Virtualized (VNF) and the core network. Meanwhile, Internet Service Providers (ISPs) maintain network connectivity and offer additional services and network functions (NFs), like Network Address Translation (NAT), Firewalls (FWs), and Domain Name Service (DNS). These functions are deployed at various locations, Data Centers (DCs), network nodes, or customers’ premises. Moreover, these emerging technologies SDN and NFV promote the opportunity to design and implement scalable, elastic, and programmability of networks. The Service Chain (SC), also known as Service Function Chain (SFC), aims to compose an ordered set of VNFs by selecting and connecting these functions based on network applications’ requirements and dependencies. At the same 978-1-7281-7705-2/21/$31.00 ©2021 IEEE time, orchestration includes the management of the devices that host the VNFs. Network Slicing is defined as an approach to network operations that builds and manages a network to provide programmability and enables the ISPs to maximize the network resource usage and service flexibility. It supports different services and may be applied for resource management. Using this concept, the network infrastructure operator can dedicate resources to a specific slice of the network according to the network operator’s request, e.g., assigning a firewall to a particular virtual network instead of using a shared firewall [1], [2]. The concept of the 5G mobile networks includes slicing [3], i.e., the organization of network and computation resources into soft- or hard-separated sets according to particular offered services that might require different series of VNFs, and the network infrastructure and VNF resources might be or not be shared among them. SFC and orchestration for the traffic of a service have to be performing inside the assigned resource slice. Hence, network slicing along with NFV allows the ISPs on the one hand to provide dedicated virtual networks with functionalities specific to the services over a common network infrastructure in the 5G Core (5GC) [4]. Moreover, slicing cannot be limited only on managing and processing resources, but SFC has to consider the transporting resources in the network, which can also improve the service quality. It implies the need for high flexibility in the configuration of network devices. An enabling technology such as SDN, but due to switching performance issues it is not supported in a large part of the transport and mobile backhaul networks [5]. On the other hand, ISPs are introducing and using network slicing to allow multiple virtual networks to be created on top of a common shared virtualized infrastructure. Besides, they gain customization according to the specific needs of applications, services, devices, customers, or operators. Many service providers and research institutes operate a single network infrastructure to support an ever-increasing number of services, thus the ability to fit transport customized to application needs is critically important. This includes creating network slices with different characteristics, which can coexist on top of the shared network infrastructure [6]. Therefore, network slicing must be built up to ensure the low latency and guaranteed bandwidth for different services, which is expected to play a critical role in 5G networks. In this paper, we consider shared slicing approach and use them to apply some type of preservation of network resources for other slices to meet the QoS expectations. We show the importance of network slicing for building up to ensure the low latency and guaranteed bandwidth for different services, which are considered to play a critical role in 5G network. This paper applies a multi-slice scenario that considers the topology and current load information of the IP layer below. We propose heuristic SFC solutions for dynamic calculation of service chains by considering the load of slices. We analyze the proposed solutions and show their benefits and drawbacks by numerical results of a case study. In Sect. II, we present the related works, including our antecedent works on the model concept considered in SFC problems. Sect. III we introduce the motivations on using sliceawareness in service chaining, while the proposed solutions are presented in Sect. IV. After the description of the heuristics, we also analyze the behavior of the algorithms on small examples. The performance is evaluated based on numerical results from a larger sample network in Sect. V. We conclude and provide the future work of this paper in Sect.VI II. R ELATED W ORKS Different approaches have been proposed by industries, research institutes, and mobile operators to standardize SFC. In [7], the European Telecommunications Standards Institute (ETSI) defines a network service as a chain of VNFs and emphasizes the demand for a new set of orchestration and management functions. Papers [8], [9] address NFV as a promising architecture proposed to increase the scalability and the functionality of the network by leveraging virtualization technologies. It is how telecommunication networks and services are designed and operated when traditional Network Functions (NFs) are transformed into VNFs. Functions as Firewall (FW), Load Balancer (LB), or Network Address Translation (NAT) run over a distributed, cloud-based infrastructure referred to as Network Function Virtualization Infrastructure (NFVI). ETSI defines SDN usage in an NFV as an architectural framework and proposes a framework with three main components: VNFs and two subsystems termed respectively Management and Orchestration (MANO) and NFVI where VNFs are deployed. While in the RFC 7665 [10], IETF defines the service function chain as an ordered set of abstract service functions and ordering constraints. IETF also describes an SDN based SFC architecture. In this, an SFC classifier in the data plane performs a classification of end-to-end traffic to determine which VNF should be chained to process the traffic based on its requirements. Some recent papers address similar problems while considering multiple slices in the network. Slice can be defined as a set of network and VNF resources, which can support one or more services, each with a prescribed series of VNFs that the service traffic shall pass. The supported services can be told to be in the slice. The authors of [11] formulate the problem of statically embedding service chains into slices while considering also network link capacities Various scientific works have been addressed in context for the placement and chaining of VNFs, in which the SFC solutions mostly work assuming the network topology and the demands, with VNF capabilities and VNF requirements, respectively. For instance, many solutions have been proposed for optimal placement and chaining of VNFs. Most of these solutions focus on selecting the right nodes for deploying a VNF for a specific traffic demand. The authors in [12] proposed a placement algorithm, which takes into consideration hardware accelerator resources in addition to compute resources. They aim to optimize the use of resources in NFVI, while placement algorithms must consider the presence of accelerators in NFVI nodes. They described an Integer Linear Programming (ILP) for the accelerator-aware VNF placement problem. In [13], the authors studied the VNF placement problem in SDN/NFVenabled networks. They formulated the problem as a Binary Integer Programming (BIP) in which they aim to minimize a weighted cost, including the VNF placement cost. The authors proposed a Double Deep Q Network-based VNF Placement Algorithm (DDQN-VNFPA) using deep reinforcement learning. The proposed solution consists of running trained Double Deep Q Network models to output the optimization strategies of VNF placement according to network resource states. Network Slicing is one of the most crucial parts of 5G core networks. Its definition has never been unique, clear, and precise. It is varying from different perspectives of the various service providers. For instance, Next Generation Mobile Networks (NGMN) [14] defines a network slice as a set of network services that consists of 3 layers, Service Instance Layer, Network Slice Instance Layer, and Resource layer. The network slice runs on top of physical resources where both network services and resources conform to a logical network to deliver specific requirements. The authors of [15] formulate the problem of statically embedding service chains into slices while also considering network link capacities. In [16] another MILP formulation is given for the problem of optimizing slices over multiple domains and accepting multiple services in each slice. The authors also present a heuristic that can guarantee the QoS requirements for the services by allocating the needed resources for the slices. Moreover, the authors in [17] focus on the end-to-end network slice life cycle management of network slices on different sites using a single management and orchestration entity with a coherent proof of concept. They propose algorithms for efficiently activating, deactivating, and decommissioning the network slices, using real time status information of network slices from Network Slice Management Function (NSMF). The results show that by adopting better strategy in these algorithms in controlling various phases of slice life cycle, the response time can be reduced for a user request by 50%. The authors in [18] present models for sliced networks to investigate the cost reduction promises of using the NFV and network slicing technologies. The models aim to allocate network costs to deploy slices to show the network efficiency using network slicing. The authors in this paper consider a network slice to support one specific service, while a slice consists of a chained VNFs. However, in this work we do not consider only a slice for a specific service, it can be shared with other services as well to preserve network resources for other slices to hold the QoS expectations. In our previous work [19], we focus on 5G QoS issues like the end-to-end delay and loss, which might come from the backhaul segment. We propose a multilayer network model for the analysis of the effects of migrating the network to 5G, while considering different distribution and placement of VNFs in the IP network. In [20], the service chaining problem is considered in a twolayer model, which consists of a Functional Layer (FL) and a Network Layer (NL). We logically separate the topology of VNF-capable nodes and functional links allowed among them, and the topology of network nodes and links. We address the problem of considering the current load state of both the functional links and the network below it. We discuss how to determine the SC according to the required bandwidth and VNF order while avoiding overloads on the network links. As a result, we propose heuristic and ILP solutions to formulate these challenges. These solutions are based on the dynamic calculation of SC by considering the current network load to avoid the use of heavily loaded links. The heuristic algorithm OdAASP (Overload Avoiding Augmented Shortest Path) determines the shortest path between source and destination with the awareness of considering overload avoidance. As a comparative solution, we use the algorithm SFC-CSP (SFCConstrained Shortest Path) that finds the shortest path and satisfies a given SFC constraint and is proposed in [21]. These solutions are improved and studied in [22] by proposing different bandwidth-aware heuristic solutions for dynamic creation of ordered service chains in networks with a predefined set of allowed VNF-VNF connections. In context of implementing NFV-SFC, we present in [23] a multilayer network model that allows SFC with the support of multi-tenant slices. The aim is to execute SFC solutions proposed in [20] that help to avoid network link overloads and QoS violations using virtual routers over Amazon Web Services (AWS) and a variety of technologies such as Segment Routing (SR) for implementing Service Chains. III. M OTIVATION ON SLICE AWARENESS IN SFC In slicing, we often use separation of resources supported by a strict allocation mechanism. In this case, a part of VNF hosting nodes and functional or even network links are dedicated to each slice. The dedicated slicing may lead to unexploited resources. It easy to see that exploitation is higher when slices can share network resources. However, in the case of shared slicing, operators might consider congestion of different service traffics, leading to unexpected QoS issues if the load gets higher. To illustrate this issue, let us analyze a multi-slice scenario with a simple network considering a one-to-one mapping of Functional Layer links on the Network Layer links. The topology is shown in Fig.1. The slices accord to different 5G services with different required VNF series and QoS requirements. Due to the latter, we consider weights wi assigned to each slice Si . These weights are used in the packet scheduling applied for the traffic on the network links. They should determine the planned usage weights of these resources, i.e., the link loads coming from the different slices. E v1 A K B M v2 v2 L C N D v1 F Fig. 1. Toplogy with service chains We consider the VNF v1 available on the nodes K and N , and v2 on the nodes L and M . Let us suppose slices S1 and S2 with weights w1 =w2 =0.5, and with needs of VNFs v1 and v2 , respectively. The capacity of each link is 1Mbps. The bandwidth of requests (r1 , r2 and r5 ) from slice S1 is 0.25 Mbps, and requests (r3 and r4 ) from slice S2 is 0.3 Mbps. The requests arrive in the indexes’ order, and we use a simple SFC resulting in the chains shown in the third column of Table III. Requests r1 (A − C) r2 (B − D) r3 (E − F ) r4 (E − F ) r5 (A − C) Slice S1 S1 S2 S2 S1 SC A-K-L-C B-M -N -D E-K-L-N -F E-K-L-N -F A-K-L-C Load on link K-L (Mbps) 0.25 0.25 0.55 0.85 1.1 The chains of requests from slice S1 and S2 are shown in Fig.1 with solid blue and dotted red lines, respectively. Regarding the fourth column of Table III we observe the overload of link K-L after the chaining of r5 . Taking this situation under a flow level analysis, we find that the traffic of slice S1 will get 0.5 Mbps according to the scheduling weights, i.e., it will not suffer losses. Whereas in the case of the traffic of slice S2 we get a packet loss of more than 0.18. Since some links in the network are lightly loaded, the overload can be avoided by using a kind of load balancing, i.e., applying alternative SCs for some requests. The classic way for it is to choose a different SC for request r5 that does not contain the link K-L, e.g., A-K-M -N -L-C. However, note that this way, the traffic of S1 had to use a longer chain and put more load on further links because the traffic of slice S2 was too greedy. Another way to avoid this situation is to do a kind of resource preservation for the traffic that might arrive later and use the resource. To implement this, we could choose an alternate SC for request r4 and leaving enough bandwidth free for request r5 . Even if at the arrival of r4 the use of the original (red dotted) SC would not yet cause an overload on K-L, we take the SC E-K-M -N -F shown with a dashed-brown line in Fig.III. Therefore, link K-L will not get overloaded, and the load of the slices on it is also more similar to the planned rates reflected in the weights w1 and w2 . IV. S LICE L IMITATION A LGORITHMS We defined an allocation based service chaining solution set with the aim to avoid the issue presented above. We apply a mechanism that limits the traffic load of the slice on the used links. It should reduce the big difference between the relative load loadrel (S, l) coming from slice S on link l, and the weight wQoS (S, l) set for QoS-based serving of the packets of slice S on link l. In Table I, we summarize all the key notations used throughout the article. TABLE I S UMMARY OF NOTATIONS AND SYMBOLS . Notation S l lF lN loadrel (S, l) wQoS (S, l) SL(S, l) SL(S, lF ) b(r) B(lF ) c(lF ) B(lN ) Representation of the symbol or symbol Slice Link Functional Link Network Link Relative load coming from S on l Packets’ weight of S on l Slice Limit given for link l of slice S Slice Limit given for link lF of slice S Bandwidth of request r Capacity of link lF Cost of each link lF Capacity of link lN Beyond this original aim, we find that in the case of using appropriate limits, the limitation mechanism can also help avoid link overloads. The numerical results in this paper concentrate on this second advantage. The main idea in the load limitation based service chaining is the use of high costs for those links, where loadrel (S, l) would override the slice limit SL(S, l) given for link l if the current request of slice S would use link l. We introduce two algorithms, which differ in the layer of links, where the limitation is considered. A. Slice Limitation on the Functional Layer (SLF) As first, we take into account only the link loads in the Functional Layer. The algorithm SLF uses a set of limit values SL(S, lF ) between [0, 1], for each slice S and functional link lF . SL(S, lF ) values can be different for different links lF , although it is more convenient to use the same value. The sum of the slice limit values for every slice can be even higher than 1 on link lF . The algorithm is based on the lowest cost chain solution SFC-SP [21]. That finds the lowest cost chain from the source S s to the destination d of the service request rsd considering S the series of VNFs prescribed for rsd . In SLF, first of all c(lF ) gets modified to a rather high value like 106 times greater than its original cost, if: X S b(rsd )+ b(r) > SL(S, lF ) × B(lF ) (1) r∈S In our two-layer network model, this capacity is calculated as the bottleneck capacity on the network link path to that lF is mapped. After modifying costs, the lowest cost chaining finds a chain excluding the links where the slice traffic would be over the limit. Note that the Slice Limitation concept could be applied with any other service chaining algorithm. It is worth to mention that the performance of Slice Limitation based algorithms can depend on how the limit values are determined. We assume to have the right constellation by choosing values reflecting the QoS weights and the priorities of the slices. Another essential property of the algorithm is that the load and limit of only one slice are taken into account during the cost modification step. B. Slice Limitation on the Network Layer (SLN) The algorithm SLN works very similarly to SLF, but the relative load limitation is taken into account on the network links of NL. Since more than one functional link can be mapped on a network link, their load cannot be considered independent. The QoS-based prioritization is done on the Network Layer’s resources; thus, from SLN we can expect service chaining that is more adjusted to packet serving. The load limitation with SLN is based on the values SL(S, lN ) set for each slice S and network link lN . These values have the same properties as the SL(S, lF ) values in SLF. The algorithm SLN starts with the modification of the cost c(lF ) of each functional link lF , where the mapping of lF contains at least one network link lN with X S b(rsd )+ b(r) > SL(S, lN ) × B(lN ) (2) r∈S The functional links that violate the limitation get a high cost leading to the use of network links, which are not so much loaded by the network slice S. Similarly to SLF, the cost modification is followed by the selection of the lowest cost service chain. Note that both SLF and SLN can lead to the use of more resources for holding the limitations. C. Analysis of the algorithms To clarify the differences between the algorithms SLF and SLN, let us analyze a simple scenario where they lead to different service chains. Consider the functional topology in Fig. 2, in which the VNFs v1 and v2 are placed in node d2 , and only v1 in node d3 . The other nodes remain without any VNF. The functional links are mapped to the network topology in Fig. 3. Simply the lowest cost path is used, and the cost of the functional link is determined as the total cost of this path, as they are shown on the right side of the figures. Each network links, and thus, each functional links as well, have 1Mbps capacity. We assume to accept two traffic requests r1 and r2 from the source s to destination d1 and d2 , both from slice S1 and with 0.3 Mbps required bandwidth. Request r3 is from slice S2 and requires 0.5 Mbps bandwidth between source s and destination d3. Slice S1 requests need to pass through VNF v1 , and slice S2 requests need to pass through VNF v2 . Let us consider the algorithm SLF and SLN to use the following limitations for each functional and network links, respectively. ( SL(S1 , lN ) = 0.4 (3) SL(S1 , lN ) = 0.4 This means the exclusion of having both S1 requests on the same functional link when using SLF, and the same holds for network links when using SLN. For slice S2 we use the limitations: ( SL(S2 , lN ) = 0.6 (4) SL(S2 , lN ) = 0.6 s a b s 2 d2 v1 , v2 4 d3 d2 v1 , v2 3 d3 d1 v1 d3 1 d1 SLF SLN The difference between SLF and SLN can be seen in both the Functional and Networking Layers. Request r2 takes a different service chain to avoid the violation of traffic limitation on the network link between nodes s and a. V. P ERFORMANCE E VALUATION In this section, we evaluate the proposed solutions using a mid-size case study. We analyze two network characteristics to compare the solutions: • Average relative load on used network links, • Number of overloaded links in the network, • Average relative load on used network links per slice, 2 1 d3 d1 SLN A. Topology The network under the scope is the hypothetical backbone network of Algeria, which is used in [20] and [22]. Fig.4 presents the topology of the IP layer, which contains 10 Core Routers (black-filled nodes) and 17 Edge Routers (grey-filled nodes) each at different sites. v2 v1 , v2 v3 v3 v1 Fig. 4. IP layer topology and VNF placement One type of IP connection was used; 10Gbps Connections are attached to Core Routers and Edge Routers. In addition, 27 eNodeBs are distributed on the 27 sites, and three different VNFs are placed by random placement resulting in the following Core nodes: • • • Fig. 2. Functional Layer paths d2 Fig. 3. Network Layer paths • v1 d1 SLF 2 3 1 3 b 1 2 a d2 b 1 1 The calculated service chains use the paths in the functional and network layer as shown in Fig. 2 and Fig. 3 respectively. We get the dashed-line paths and the dotted line paths when using SLF and SLN algorithms, respectively. s s b • v1 v1 v3 v2 v3 and v2 are placed in the capital Algiers, is placed in Boussada city, is placed in Constantine city, is placed in Tenes city, is placed in Oran city. There are three simplex traffic demand types to be routed, Interactive Video, Best Effort, and New Services. Each traffic demand requires to pass through the following VNFs(v3 , v2 , v1 ). The demands of New Services type start from one eNodeB in Algiers to all eNodeBs. For the other types, the traffic demand starts and ends in eNodeBs. We aim to study a scenario where the bandwidth of the type of new services (NS) grows linearly from 0 Mbps up to 1500 Mbps. These traffic demands arrive in a randomized order. The numbers of demands and the required bandwidth and slice limitation rate are summarized for each traffic type in Table. II. TABLE II T RAFFIC TYPES CHARACTERISTICS Bandwidth 3, 98 Mbps 0 − 1500 Mbps Number 702 27 Slice Limitation 0.4 0.6 B. Numerical Results In the section, we analyze two topologies due to significant differences observed during the analysis of IP links. Therefore, we made a separated analysis for core and edge links, as the topology of both link types is different, and the VNFs are placed only in core nodes. Note that the links with zero load are not considered in the calculation of the average since links without load do not have any effect on the QoS. Besides the proposed solutions, we use other SCs implemented algorithms as a comparative study presented in [20]. On the one hand, the algorithm CSP consists of finding the shortest path that satisfies a given SFC constraint. While the algorithm OdAASP finds another shortest path to a destination by taking into account the overload avoidance on the links. 1) Analysis of Edge links: The Fig.5 and Fig.6 show the relative load and number of overloaded edge links. SLN SLF CSP OdAASP 0.20 SLN SLF CSP OdAASP 2.5 2.0 1.5 1.0 0.5 0.0 0 200 400 600 800 1000 1200 1400 Bandwidth of New Services (Mbps) Fig. 6. Number of overloaded Edge IP links. In the high-load range (over 950Mbps), on the one hand, we observe decreasing in case of SLN because the solution finds a chain excluding the links where the slice traffic would be over the limit. On the other hand, SLF is showing up to 3 overloaded edge links while SLN does not show any overloaded during the whole experiment as the selected paths may be longer (Fig.6). In addition, OdAASP increases until 1300 Mbps where we see a slight decrease in loads that comes from starting to use further functional links quite early during the chaining of all the demands. 2) Analysis of Core links: The Fig.7 and Fig.8 present the relative load and number of overloaded core links. For low-load range (below 500 Mbps) as the first observation, all algorithms are almost performing the same. Obviously SLF, SLN and OdAASP perform better than CSP that shows slightly high load as a consequence few overloaded links start to appear in Fig.8. 0.15 0.10 0.05 0.00 0 200 400 600 800 1000 1200 1400 Bandwidth of New Services (Mbps) Fig. 5. Average relative load of Edge IP links. For low-load range (below 450 Mbps), the algorithms SLF and OdAASP are performing the same, while SLN is showing a slight difference in average loads due to choosing the other paths that may be longer but lighter loaded. We observe no overloaded IP links within this particular load range in Fig.6. In the mid-load range (450 − 900 Mbps), we observe that edge links is getting more traffic as many paths are being selected by SLN as a result of some edge links are getting overloaded. Moreover, the edge links are still getting load in SLF and OdAASP. On the other hand, we observe that OdAASP is showing a single overloaded connection. Relative Loads| Core Links Relative Loads | Edge Links 0.25 # of overloaded Edge links Type Best Effort New Serv. 3.0 SLN SLF CSP OdAASP 0.8 0.6 0.4 0.2 0.0 0 200 400 600 800 1000 1200 1400 Bandwidth of New Services (Mbps) Fig. 7. Average relative load of Core IP links. 10 # of overloaded Core links might be used more by one and less used by the other slices. Furthermore, we will evaluate QoS properties such as the packet delay and loss of those scenarios. SLN SLF CSP OdAASP 8 R EFERENCES 6 4 2 0 0 200 400 600 800 1000 1200 1400 Bandwidth of New Services (Mbps) Fig. 8. Number of overloaded Core IP links. In the low-load range (500−900 Mbps), the average relative loads of SLN and SLF show little differences. The interesting property here is that the values show some bouncing and do not monotonously grow with the network load as in CSP and OdAASP where we observe many links get overloaded. It comes from the slice limitation methods that, after finding low-loaded links in the corresponding slice, use them until they get overloaded. The network resources get exhausted in the high-load range (over 900 Mbps). Thus all the algorithms cannot avoid overloads. However, slice limitation algorithms perform better than CSP and OdAASP again in terms of finding a chain excluding the links where the slice traffic would be over the limit. Thus, we can summarize that the traffic flows are using the core part of the network rather. All the SCs pass through the functional connections, which connect the traffic ending points to the nearest VNF capable nodes and then pass through other functional connections using core links. VI. C ONCLUSION In this paper we have proposed heuristic service chaining solutions that consider shared slicing and apply a kind of preservation of network resources for other slices to hold the QoS expectations. We have consider shared slicing approach and used them to apply some type of preservation of network resources for other slices to meet the QoS expectations. We have shown the importance of network slicing for building up to ensure the low latency and guaranteed bandwidth for different services, which are considered to play a critical role in 5G network. Finally, we have analyzed the proposed solutions and show their benefits by the numerical results of a case study. The comparative results have shown that the proposed solutions perform better when the network load is moderate. As further work, we will be focusing on more complex scenarios by improving the proposed solutions by considering different allocation mechanisms on each IP link as some links [1] A. Kaloxylos, “A survey and an analysis of network slicing in 5g networks,” IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 60–65, 2018. [2] H. Zhang, N. Liu, X. Chu, K. Long, A. Aghvami, and V. C. M. Leung, “Network slicing based 5g and future mobile networks: Mobility, resource management, and challenges,” IEEE Communications Magazine, vol. 55, no. 8, pp. 138–145, 2017. [3] D. Sattar and A. Matrawy, “Optimal slice allocation in 5g core networks,” IEEE Networking Letters, vol. 1, pp. 48–51, June 2019. [4] L. Ma, X. Wen, L. Wang, Z. Lu, and R. Knopp, “An sdn/nfv based framework for management and deployment of service based 5g core network,” China Communications, vol. 15, no. 10, pp. 86–98, 2018. [5] A. A. Barakabitze, A. Ahmad, R. Mijumbi, and A. Hines, “5g network slicing using sdn and nfv: A survey of taxonomy, architectures and future challenges,” Computer Networks, vol. 167, p. 106984, 2020. [6] Z. Ali, P. Camarillo, C.Filsfils, and D. Voyer, “Building blocks for slicing in segment routing network,” July 2, 2018. [7] ETSI, “Network functions virtualisation (nfv)management and orchestration.” [8] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, “Network function virtualization: Challenges and opportunities for innovations,” IEEE Communications Magazine, vol. 53, pp. 90–97, Feb 2015. [9] R. Mijumbi, J. Serrat, J. Gorricho, N. Bouten, F. De Turck, and R. Boutaba, “Network function virtualization: State-of-the-art and research challenges,” IEEE Communications Surveys Tutorials, vol. 18, pp. 236–262, Firstquarter 2016. [10] J. Halpern and C. Pignataro, “Service function chaining (sfc) architecture,” Internet Requests for Comments, RFC Editor, RFC 7665, 2020. [11] T. Truong-Huu, P. Murali mohan, and M. Gurusamy, “Service chain embedding for diversified 5g slices with virtual network function sharing,” IEEE Communications Letters, vol. 23, pp. 826–829, 02 2019. [12] G. P. Sharma, W. Tavernier, D. Colle, and M. Pickavet, “Vnf-aap: Accelerator-aware virtual network function placement,” in 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 1–4, 2019. [13] J. Pei, P. Hong, M. Pan, J. Liu, and J. Zhou, “Optimal vnf placement via deep reinforcement learning in sdn/nfv-enabled networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 2, pp. 263–278, 2020. [14] “N. alliance. 2016 ngmn 5g p1 requirements and architecture work stream end-to-end architecture description of network slicing concept.” [15] T. Truong-Huu, P. Murali Mohan, and M. Gurusamy, “Service chain embedding for diversified 5g slices with virtual network function sharing,” IEEE Communications Letters, vol. 23, pp. 826–829, May 2019. [16] R. Addad, M. Bagaa, T. Taleb, D. L. Cadette Dutra, and H. Flinck, “Optimization model for cross-domain network slices in 5g networks,” IEEE Transactions on Mobile Computing, pp. 1–1, 2019. [17] S. Vittal, M. K. Singh, and A. Antony Franklin, “Adaptive network slicing with multi-site deployment in 5g core networks,” in 2020 6th IEEE Conference on Network Softwarization (NetSoft), pp. 227–231, 2020. [18] A. Chiha, M. V. D. Wee, D. Colle, and S. Verbrugge, “Network slicing cost allocation model,” Journal of Network and Systems Management, vol. 28, no. 3, p. 627–659, 2020. [19] K. Mebarkia and Z. Zsóka, “Qos modeling and analysis in 5g backhaul networks,” in 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1–6, Sep. 2018. [20] K. Mebarkia and Z. Zsóka, “Service traffic engineering: Avoiding link overloads in service chains,” Journal of Communications and Networks, vol. 21, pp. 69–80, Feb 2019. [21] G. Sallam, G. R. Gupta, B. Li, and B. Ji, “Shortest path and maximum flow problems under service function chaining constraints,” 2018. [22] Z. Zsóka and K. Mebarkia, “Layered solutions for dynamic service chaining,” in 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pp. 292–296, Feb 2019. [23] K. Mebarkia and Z. Zsóka, “Analysis of network’s qos in service chains,” in 2020 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp. 1–9, 2020.