A Constrained Reinforcement Learning Based Approach for Network Slicing

被引:25
作者
Liu, Yongshuai [1 ]
Ding, Jiaxin [2 ]
Liu, Xin [1 ]
机构
[1] Univ Calif Davis, Comp Sci Dept, Davis, CA 95616 USA
[2] Shanghai Jiao Tong Univ, John Hopcroft Ctr Comp Sci, Shanghai, Peoples R China
来源
2020 IEEE 28TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP 2020) | 2020年
关键词
Resource Allocation; Network Slicing; 5G; Deep Reinforcement Learning;
D O I
10.1109/icnp49622.2020.9259378
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of mobile networks, we face strong diversification of services, demanding the current network to embed more flexibility. To satisfy this daring need, network slicing is embraced as a promising solution for resource utilization, in 5G and future networks. In network slicing, dynamic resource orchestration and network slice management are critical for resource efficiency. However, it is highly complicated such that the traditional approaches can not effectively perform resource orchestration due to the lack of accurate models and hidden problem structures. To address this challenge, we propose a constrained reinforcement learning based approach for network slicing. We formulate the resource allocation problem as a Constrained Markov Decision Process (CMDP) and solve it using constrained reinforcement learning algorithms. Specifically, we use the adaptive interior-point policy optimization and policy safety layer methods to deal with cumulative and instantaneous constraints. Our evaluations show that our method is effective in resource allocation with service demand guarantees and significantly outperforms baselines.
引用
收藏
页数:6
相关论文
共 13 条
[1]  
Bega D, 2017, IEEE INFOCOM SER
[2]  
Bhatia A., 2019, P INT C AUTOMATED PL, P610, DOI 10.1609/icaps.v29i1.3528
[3]  
Chen H, 2018, INT C DEC GAM THEOR
[4]  
Chen X., 2018, IEEE INTERNET THINGS
[5]  
Chuai J, 2019, IEEE INFOCOM SER, P1396, DOI [10.1109/infocom.2019.8737657, 10.1109/INFOCOM.2019.8737657]
[6]  
Dalal Gal, 2018, Safe exploration in continuous action spaces
[7]   Deep Reinforcement Learning for Resource Management in Network Slicing [J].
Li, Rongpeng ;
Zhao, Zhifeng ;
Sun, Qi ;
I, Chih-Lin ;
Yang, Chenyang ;
Chen, Xianfu ;
Zhao, Minjian ;
Zhang, Honggang .
IEEE ACCESS, 2018, 6 :74429-74441
[8]  
Liu X, 2020, 34 AAAI C ART INT
[9]   Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics [J].
Lu, Li ;
Liu, Yongshuai .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2015, 2 (03) :53-64
[10]  
Schulman J, 2015, PR MACH LEARN RES, V37, P1889