Toward Using Reinforcement Learning for Trigger Selection in Network Slice Mobility

被引:27
作者
Addad, Rami Akrem [1 ]
Cadette Dutra, Diego Leonel [2 ]
Taleb, Tarik [1 ,3 ,4 ]
Flinck, Hannu [5 ]
机构
[1] Aalto Univ, Elect Engn Sch, Commun & Networking Dept, Espoo 02150, Finland
[2] Univ Fed Rio de Janeiro, UFRJ, Syst Engn & Comp Sci Program PESC, BR-21945970 Rio De Janeiro, Brazil
[3] Univ Oulu, Ctr Wireless Commun CWC, Oulu 90570, Finland
[4] Sejong Univ, Comp & Informat Secur Dept, Seoul 05006, South Korea
[5] Nokia Bell Labs, Espoo 02610, Finland
基金
芬兰科学院;
关键词
5G mobile communication; Heuristic algorithms; Cloud computing; Reinforcement learning; Network function virtualization; Computer architecture; Service level agreements; 5G; network slicing; multi-access edge computing; network softwarisation; deep reinforcement learning; agent-based resource orchestration; 5G; CLOUD;
D O I
10.1109/JSAC.2021.3078501
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent 5G trials have demonstrated the usefulness of the Network Slicing concept that delivers customizable services to new and under-serviced industry sectors. However, user mobility's impact on the optimal resource allocation within and between slices deserves more attention. Slices and their dedicated resources should be offered where the services are to be consumed to minimize network latency and associated overheads and costs. Different mobility patterns lead to different resource re-allocation triggers, leading eventually to slice mobility when enough resources are to be migrated. The selection of the proper triggers for resource re-allocation and related slice mobility patterns is challenging due to triggers' multiplicity and overlapping nature. In this paper, we investigate the applicability of two Deep Reinforcement Learning based algorithms for allowing a fine-grained selection of mobility triggers that may instantiate slice and resource mobility actions. While the first proposed algorithm relies on a value-based learning method, the second one exploits a hybrid approach to optimize the action selection process. We present an enhanced ETSI Network Function Virtualization edge computing architecture that incorporates the studied mechanisms to implement service and slice migration. We evaluate the proposed methods' efficiency in a simulated environment and compare their performance in terms of training stability, learning time, and scalability. Finally, we identify and quantify the applicability aspects of the respective approaches.
引用
收藏
页码:2241 / 2253
页数:13
相关论文
共 67 条
[31]   In-Datacenter Performance Analysis of a Tensor Processing Unit [J].
Jouppi, Norman P. ;
Young, Cliff ;
Patil, Nishant ;
Patterson, David ;
Agrawal, Gaurav ;
Bajwa, Raminder ;
Bates, Sarah ;
Bhatia, Suresh ;
Boden, Nan ;
Borchers, Al ;
Boyle, Rick ;
Cantin, Pierre-luc ;
Chao, Clifford ;
Clark, Chris ;
Coriell, Jeremy ;
Daley, Mike ;
Dau, Matt ;
Dean, Jeffrey ;
Gelb, Ben ;
Ghaemmaghami, Tara Vazir ;
Gottipati, Rajendra ;
Gulland, William ;
Hagmann, Robert ;
Ho, C. Richard ;
Hogberg, Doug ;
Hu, John ;
Hundt, Robert ;
Hurt, Dan ;
Ibarz, Julian ;
Jaffey, Aaron ;
Jaworski, Alek ;
Kaplan, Alexander ;
Khaitan, Harshit ;
Killebrew, Daniel ;
Koch, Andy ;
Kumar, Naveen ;
Lacy, Steve ;
Laudon, James ;
Law, James ;
Le, Diemthu ;
Leary, Chris ;
Liu, Zhuyuan ;
Lucke, Kyle ;
Lundin, Alan ;
MacKean, Gordon ;
Maggiore, Adriana ;
Mahony, Maire ;
Miller, Kieran ;
Nagarajan, Rahul ;
Narayanaswami, Ravi .
44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017), 2017, :1-12
[32]   Reinforcement learning: A survey [J].
Kaelbling, LP ;
Littman, ML ;
Moore, AW .
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 1996, 4 :237-285
[33]  
Kingma DP, 2014, ADV NEUR IN, V27
[34]   On actor-critic algorithms [J].
Konda, VR ;
Tsitsiklis, JN .
SIAM JOURNAL ON CONTROL AND OPTIMIZATION, 2003, 42 (04) :1143-1166
[35]  
Latva-aho M., 2020, KEY DRIVERS RES CHAL
[36]   Applications of Deep Reinforcement Learning in Communications and Networking: A Survey [J].
Luong, Nguyen Cong ;
Hoang, Dinh Thai ;
Gong, Shimin ;
Niyato, Dusit ;
Wang, Ping ;
Liang, Ying-Chang ;
Kim, Dong In .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3133-3174
[37]  
Maas AL, 2013, ICML, P30
[38]   An Intelligent and Adaptive Threshold-Based Schema for Energy and Performance Efficient Dynamic VM Consolidation [J].
Masoumzadeh, Seyed Saeid ;
Hlavacs, Helmut .
ENERGY EFFICIENCY IN LARGE SCALE DISTRIBUTED SYSTEMS, EE-LSDS 2013, 2013, 8046 :85-97
[39]  
Miyazawa Takaya, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P428, DOI 10.23919/INM.2017.7987308
[40]  
Mnih V., 2016, PROC INT C MACH LEAR, P1928