Online Service Function Chain Deployment for Live-Streaming in Virtualized Content Delivery Networks: A Deep Reinforcement Learning Approach
<p>The assumed Service Function Chain composition for every Live-Video Streaming session request. We assume that every incoming session needs for a streamer, a compressor a transcoder and a cache VNF modules. We assume container based virtualization of a vCDN.</p> "> Figure 2
<p>Dueling-architectured DDQN topology for our SFC Deployment agent: A two-stream deep neural network. One stream approximates the state-value function, and the other approximates the action advantage function. These values are combined to get the state-action value estimation in the output layer. The inputs are instead the action is taken and the current state.</p> "> Figure 3
<p>Basic evaluation metrics of <span class="html-italic">E2-D4QN</span>, <span class="html-italic">GP-LLC</span>, <span class="html-italic">NFVDeep</span> and three variants of the latter, presented in <a href="#sec2dot3dot4-futureinternet-13-00278" class="html-sec">Section 2.3.4</a>. (<b>a</b>) Scaled mean network throughput per episode. (<b>b</b>) Mean Acceptance Ratio per episode. (<b>c</b>) Mean rewards per episode. (<b>d</b>) Mean scaled total Data-Transportation Costs per episode (<b>e</b>) Mean scaled total hosting costs per episode. (<b>f</b>) Mean scaled optimization objective per episode.</p> ">
Abstract
:1. Introduction
1.1. Problem Definition
1.2. Related Works
1.3. Main Contribution
- VNF-instantiation times,
- Content-delivery and content-ingestion resource usage,
- Utilization-dependant processing times,
- Fine-grained cache-status tracking,
- Operational costs composed of data-transportation costs and hosting costs,
- Multi-cloud deployment characteristics,
- No a-priory knowledge of session duration.
2. Materials and Methods
2.1. Problem Modelisation
2.1.1. Network Elements and Parameters
- as the set of all nodes of the CDN network,
- is the set of VNF types considered in our model,
- , is the set of links between nodes in N, so that ,
- , is the set of resource types for every VNF container,
- The resource cost matrix , where is the per-unit resource cost of resource at node i,
- , is the link delay matrix so that variable represents the data propagation delay between the nodes i and j. We assume for . Notice that D is symmetric,
- , is the data-transportation costs matrix, where is the unitary data-transportation cost for the link that connects i and j. We assume for . Notice that O is symmetric,
- are the parameters indicating the instantiation times of each k-type VNF.
- is the set of incoming session requests set during time-step t. Every request r is characterized by , the scaled maximumbitrate, , the mean scaled payload, , the content provider requested, and , the user cluster from which r was originated,
- T is a fixed parameter indicating the maximum RTT threshold value for the incoming Live-Streaming requests.
- is the optimal processing times matrix, where is the processing-time contribution of the resource in any k-type VNF assuming optimal utilization conditions,
- is the time degradation matrix, where is the parameter representing the degradation base for the resource in any k-type VNF,
- are a set of variables indicating the resource capacity of VNF during t.
2.1.2. Optimization Statement
2.1.3. Decision Variables
2.1.4. Penalty Terms and Feasibility Constraints
- The binary variable equals 1 if the link between nodes i and j is used to reach , and 0 otherwise,
- The parameter represents the data-propagation delay between the nodes i and j. (We assume a unique path between every node i and j),
- The binary variable equals 1 if is assigned to , and 0 otherwise,
- The binary variable equals 1 if is instantiated at the beginning of t, and 0 otherwise,
- is a parameter indicating the instantiation time of any k-type VNF.
- is the processing time of r in .
- the parameter is the processing-time contribution of in any k-type VNF assuming optimal utilization conditions,
- is a parameter representing the degradation base for in any k-type VNF,
- the variable is the utilization in at the moment when is assigned.
- The variable indicates the resource demand in at the beginning of time-step t,
- The binary variable was already defined and it indicates if is assigned to ,
- is the resource demand faced by any k-type VNF when serving r, and we call it the client resource-demand,
- The binary variable is 1 if is currently ingesting content from content provider l, and 0 otherwise,
- The parameter models the resource demand faced by any k-type VNF when ingesting content from any content provider.
- are the total Hosting Costs at the end of time-step ,
- are the hosting costs related to the timed-out sessions at the beginning of time-step t,
- is the set of resources we model, i.e., Bandwidth, Memory, and CPU,
- is the per-unit resource cost of resource at node i.
- are the total DT costs at the end of the time-step,
- are the total DT costs regarding the timed-out sessions at the beginning of time-step t,
- is the session DT cost for r computed with (12). Recall that indicates if r was accepted or not based on its resultant RTT.
2.1.5. Optimization Objective
- Our first goal is to maximize the network throughput as defined in (10), and we express such objective as ,
- Our second goal is to minimize the hosting costs as defined in (11), and we express such objective as ,
- Out third goal is to minimize the DT cost as defined in (13), and such objective can be expressed as .
2.2. Proposed Solution: Deep Reinforcement Learning
2.2.1. Embedding SFC Deployment Problem into a Markov Decision Process
- is called the request vector, and contains information about the VNF request under assignment. In particular, codifies the requested CP, , the client cluster from which the request was originated, , the request’s session workload, , and the number of pending VNFs to complete the deployment of the current SFC, . Notice that and that goes each time from 4 to 0 as our agent performs the assignations actions regarding r. Note that the first three components of are invariable for the whole set of VNF requests regarding the SFC of r. Notice also that, using a one-hot encoding for , and , the dimension of is ,
- is a binary vector where equals 1 if is ingesting the CP requested by r and 0 otherwise,
- , where is the utilization value of the resource that is currently the most utilized resource in .
2.2.2. Action-Reward Schema
- The parameters , , and are weights for the reward contributions relating to the QoS, the DT costs, and the Hosting Costs, respectively,
- is the reward contribution that is related to the QoS optimization objective,
- is a binary variable that equals 1 if action a corresponds to the last assignation step of the last session request arrived in the current simulation time-step t, and 0 otherwise.
2.2.3. DRL Algorithm
Algorithm 1 E2-D4QN. |
1: Initialize 2: Initialize , , and randomly 3: Initialize , , and with the values of , , and , respectively 4: for episode do 5: while τ ≤ Ne do 6: if τ = Ne then 7: τend ← True 8: else 9: τend ← False 10: end if 11: Observe state sτ from simulator. 12: Update ϵ using (28). 13: Sample a random assignation at action with probability ϵ or ← Q(, a; Θ) with probability 1 − ϵ. 14: Obtain the reward rτ using (18), and the next state sτ+1 from the environment. 15: Store transition tuple (, , , , τend) in . 16: Sample a batch of transition tuples from . 17: for all (sj, aj, rj, sj+1, τend) ∈ do 18: if τend) = True then 19: yj rj 20: else 21: yj r + ϒ(sj+1, Q(sj+1, a; θ), ) 22: end if 23: Compute the temporal difference error (θ) using (24). 24: Compute the loss gradient ∇(θ). 25: Θ ← Θ ← lr · ∇ (θ) 26: Update Θ− ← Θ only every U steps. 27: end for 28: end while 29: end for |
2.3. Experiment Specifications
2.3.1. Network Topology
2.3.2. Simulation Parameters
2.3.3. Simulation Environment
2.3.4. Compared State-of-Art Algorithms
3. Results
3.1. Mean Scaled Network Throughput per Episode
3.2. Mean Acceptance Ratio per Episode
3.3. Mean Rewards per Episode
3.4. Total Scaled Data-Transportation Costs per Episode
3.5. Total Scaled Hosting Costs per Episode
3.6. Optimization Objective
4. Discussion
4.1. Environment Complexity Adaptation
4.2. State Value, Advantage Value and Action Value Learning
4.3. Dense Reward Assignation Policies
4.4. Enhanced Exploration
- The request vector codifies useful information about the requests that help our agent extract the incoming traffic patterns.
- The ingestion vector helps our agent to optimize ingestion-related resource demand by avoiding session assignments to VNF instances that do not ingest the content requested at the moment of assignation.
- The maximum utilization vector gives our agent resource utilization awareness, making it able to converge to assignation policies that optimize processing times and preserve QoS.
4.5. Work Limitations and Future Research Directions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
ANN | Aritifical Neural Network |
CDN | Content Delivery Network |
CP | Content Provider |
DT | Data-Transportation |
GP-LLC | Greedy Policy of Lowest Latency and Lowest Cost algoritm |
ILP | Integer Linear Programming |
ISP | Internet Service Provider |
QoE | Quality of Experience |
QoS | Quality of Service |
MANO | Management and orchestration framework |
MC | Markov Chain |
MDP | Markov Decision Process |
MVNO | Mobile Virtual Network Operator |
NFV | Network Function Virtualization |
NFVI | Network Function Virtualization Infrastructure |
OTT | Overt-The-Top Content |
RTT | Round-Trip-Time |
SDN | Software Defined Networking |
SFC | Service Function Chain |
vCDN | virtualized-Content Delivery Network |
VNF | Virtual Network Function |
VNO | Virtual Network Orchestrator |
Appendix A. Further Modelisation Details
Appendix A.1. Resource Provisioning Algorithm
Appendix A.2. Inner Delay-Penalty Function
Appendix A.3. Simulation Parameters
Parameter | Description | Value |
---|---|---|
CPU Unit Resource Costs (URC) | ||
(for each cloud provider) | ||
Memory URC | ||
Bandwidth URC | ||
Maximum resource provision parameter | 20 | |
(assumed equal for all the resource types) | ||
Minimum resource provision parameter | 5 | |
(assumed equal for all the resource types) | ||
Payload workload exponent | ||
Bit-rate workload exponent | ||
Optimal CPU Processing Time | ||
(baseline of over-usage degradation) | ||
Optimal memory PT | ||
Optimal bandwidth PT | ||
CPU exponential degradation base | 100 | |
Memory deg. b. | 100 | |
Bandwidth deg. b. | 100 | |
cache VNF Instantiation Time | 10,000 | |
Penalization in ms (ITP) | ||
streamer VNF ITP | 8000 | |
compressor VNF ITP | 7000 | |
transcoder VNF ITP | 11,000 | |
Time-steps per greedy | 20 | |
resource adaptation | ||
Desired resulting utilization | ||
after adaptation | ||
Optimal resourse utilization | ||
(assumed equal for every resource type) |
Appendix A.4. Training Hyper-Parameters
Hyper-Parameter | Value |
---|---|
Discount factor ( ) | |
Learning rate | |
Time-steps per episode | 80 |
Initial -greedy action probability | |
Final -greedy action probability | |
-greedy decay steps | |
Replay memory size | |
Optimization batch size | 64 |
Target-network update frequency | 5000 |
Appendix B. GP-LLC Algorithm Specification
Algorithm A1 GP-LLC VNF Assignation procedure. |
1: for ∈ r do 2: Get the non-overloaded hosting nodes set 3: Get the still-scalable hosting nodes set 4: Get the set of hosting nodes that currently have a ingesting on 5: if > 0 then 6: if > 0 then 7: use the LLC criterion to chose from 8: else 9: use the LLC criterion to chose from 10: end if 11: else 12: if > 0 then 13: use the LLC criterion to chose from 14: else 15: choose a random node from 16: end if 17: end if 18: end for |
References
- Cisco, V. Cisco Visual Networking Index: Forecast and Methodology 2016–2021. Complet. Vis. Netw. Index (VNI) Forecast. 2017, 12, 749–759. [Google Scholar]
- Budhkar, S.; Tamarapalli, V. An overlay management strategy to improve QoS in CDN-P2P live streaming systems. Peer-to-Peer Netw. Appl. 2020, 13, 190–206. [Google Scholar] [CrossRef]
- Demirci, S.; Sagiroglu, S. Optimal placement of virtual network functions in software defined networks: A survey. J. Netw. Comput. Appl. 2019, 147, 102424. [Google Scholar] [CrossRef]
- Li, J.; Lu, Z.; Tong, Y.; Wu, J.; Huang, S.; Qiu, M.; Du, W. A general AI-defined attention network for predicting CDN performance. Future Gener. Comput. Syst. 2019, 100, 759–769. [Google Scholar] [CrossRef]
- Yi, B.; Wang, X.; Li, K.; Das, S.k.; Huang, M. A comprehensive survey of Network Function Virtualization. Comput. Netw. 2018, 133, 212–262. [Google Scholar] [CrossRef]
- Matias, J.; Garay, J.; Toledo, N.; Unzilla, J.; Jacob, E. Toward an SDN-enabled NFV architecture. IEEE Commun. Mag. 2015, 53, 187–193. [Google Scholar] [CrossRef]
- Taleb, T.; Mada, B.; Corici, M.I.; Nakao, A.; Flinck, H. PERMIT: Network slicing for personalized 5G mobile telecommunications. IEEE Commun. Mag. 2017, 55, 88–93. [Google Scholar] [CrossRef] [Green Version]
- Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Commun. Surv. Tutor. 2020, 22, 196–248. [Google Scholar] [CrossRef] [Green Version]
- Jahromi, N.T. Towards the Softwarization of Content Delivery Networks for Component and Service Provisioning. Ph.D. Thesis, Concordia University, Montreal, QC, Canada, 2018. [Google Scholar]
- ETSI. ETSI White Paper No. 24, MEC Deployments in 4G and Evolution towards 5G, 02-2018. Available online: https://www.etsi.org/images/files/etsiwhitepapers/etsi_wp24_mec_deployment_in_4g_5g_final.pdf (accessed on 26 October 2021).
- Hernandez-Valencia, E.; Izzo, S.; Polonsky, B. How will NFV/SDN transform service provider opex? IEEE Netw. 2015, 29, 60–67. [Google Scholar] [CrossRef]
- Cziva, R.; Pezaros, D.P. Container Network Functions: Bringing NFV to the Network Edge. IEEE Commun. Mag. 2017, 55, 24–31. [Google Scholar] [CrossRef] [Green Version]
- Herbaut, N.; Negru, D.; Chen, Y.; Frangoudis, P.A.; Ksentini, A. Content Delivery Networks as a Virtual Network Function: A Win-Win ISP-CDN Collaboration. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016. [Google Scholar]
- Xiao, Y.; Zhang, Q.; Liu, F.; Wang, J.; Zhao, M.; Zhang, Z.; Zhang, J. NFVdeep: Adaptive online service function chain deployment with deep reinforcement learning. In Proceedings of the International Symposium on Quality of Service; Number Article 21 in IWQoS ’19; Association for Computing Machinery: New York, NY, USA, 2019; pp. 1–10. [Google Scholar]
- Lukovszki, T.; Schmid, S. Online Admission Control and Embedding of Service Chains. In Structural Information and Communication Complexity; Springer International Publishing: Berlin/Heidelberg, Germany, 2015; pp. 104–118. [Google Scholar]
- Huang, W.; Zhu, H.; Qian, Z. AutoVNF: An Automatic Resource Sharing Schema for VNF Requests. J. Internet Serv. Inf. Secur. 2017, 7, 34–47. [Google Scholar]
- Wowza Media Systems: 4 Tips for Sizing Streaming Server Hardware. 2017. Available online: https://www.wowza.com/blog/4-tips-for-sizing-streaming-server-hardware (accessed on 30 September 2021).
- Etsi, G. 001, Network Functions Virtualization (NFV): Use Cases, October 2013. Available online: https://www.etsi.org/deliver/etsi_gs/nfv/001_099/001/01.01.01_60/gs_nfv001v010101p.pdf (accessed on 26 October 2021).
- Herbaut, N. Collaborative Content Distribution over a VNF-as-a-Service Platform. Ph.D. Thesis, Université de Bordeaux, Bordeaux, France, 2017. [Google Scholar]
- Benkacem, I.; Taleb, T.; Bagaa, M.; Flinck, H. Optimal VNFs Placement in CDN Slicing Over Multi-Cloud Environment. IEEE J. Sel. Areas Commun. 2018, 36, 616–627. [Google Scholar] [CrossRef]
- Gil Herrera, J.; Botero, J.F. Resource Allocation in NFV: A Comprehensive Survey. IEEE Trans. Netw. Serv. Manag. 2016, 13, 518–532. [Google Scholar] [CrossRef]
- Fei, X.; Liu, F.; Xu, H.; Jin, H. Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 486–494. [Google Scholar]
- Zhang, R.X.; Ma, M.; Huang, T.; Pang, H.; Yao, X.; Wu, C.; Liu, J.; Sun, L. Livesmart: A QoS-Guaranteed Cost-Minimum Framework of Viewer Scheduling for Crowdsourced Live Streaming. In Proceedings of the 27th ACM International Conference on Multimedia; MM ’19; Association for Computing Machinery: New York, NY, USA, 2019; pp. 420–428. [Google Scholar]
- Gupta, L.; Jain, R.; Erbad, A.; Bhamare, D. The P-ART framework for placement of virtual network services in a multi-cloud environment. Comput. Commun. 2019, 139, 103–122. [Google Scholar] [CrossRef]
- Tomassilli, A.; Giroire, F.; Huin, N.; Pérennes, S. Provably Efficient Algorithms for Placement of Service Function Chains with Ordering Constraints. In Proceedings of the IEEE INFOCOM 2018–IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 774–782. [Google Scholar]
- Ibn-Khedher, H.; Abd-Elrahman, E.; Kamal, A.E.; Afifi, H. OPAC: An optimal placement algorithm for virtual CDN. Comput. Netw. 2017, 120, 12–27. [Google Scholar] [CrossRef]
- Ibn-Khedher, H.; Hadji, M.; Abd-Elrahman, E.; Afifi, H.; Kamal, A.E. Scalable and Cost Efficient Algorithms for Virtual CDN Migration. In Proceedings of the 2016 IEEE 41st Conference on Local Computer Networks (LCN), Dubai, United Arab Emirates, 7–10 November 2016; pp. 112–120. [Google Scholar]
- Yala, L.; Frangoudis, P.A.; Lucarelli, G.; Ksentini, A. Cost and Availability Aware Resource Allocation and Virtual Function Placement for CDNaaS Provision. IEEE Trans. Netw. Serv. Manag. 2018, 15, 1334–1348. [Google Scholar] [CrossRef]
- Filelis-Papadopoulos, C.K.; Endo, P.T.; Bendechache, M.; Svorobej, S.; Giannoutakis, K.M.; Gravvanis, G.A.; Tzovaras, D.; Byrne, J.; Lynn, T. Towards simulation and optimization of cache placement on large virtual content distribution networks. J. Comput. Sci. 2020, 39, 101052. [Google Scholar] [CrossRef]
- Dieye, M.; Ahvar, S.; Sahoo, J.; Ahvar, E.; Glitho, R.; Elbiaze, H.; Crespi, N. CPVNF: Cost-Efficient Proactive VNF Placement and Chaining for Value-Added Services in Content Delivery Networks. IEEE Trans. Netw. Serv. Manag. 2018, 15, 774–786. [Google Scholar] [CrossRef] [Green Version]
- Jahromi, N.T.; Kianpisheh, S.; Glitho, R.H. Online VNF Placement and Chaining for Value-added Services in Content Delivery Networks. In Proceedings of the 2018 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), Washington, DC, USA, 25–27 June 2018; pp. 19–24. [Google Scholar]
- Jia, Y.; Wu, C.; Li, Z.; Le, F.; Liu, A. Online Scaling of NFV Service Chains Across Geo-Distributed Datacenters. IEEE/ACM Trans. Netw. 2018, 26, 699–710. [Google Scholar] [CrossRef] [Green Version]
- Das, B.C.; Takahashi, S.; Oki, E.; Muramatsu, M. Approach to problem of minimizing network power consumption based on robust optimization. Int. J. Commun. Syst. 2019, 32, e3891. [Google Scholar] [CrossRef]
- Xie, Y.; Wang, B.; Wang, S.; Luo, L. Virtualized Network Function Provisioning in Stochastic Cloud Environment. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
- Marotta, A.; Kassler, A. A Power Efficient and Robust Virtual Network Functions Placement Problem. In Proceedings of the 2016 28th International Teletraffic Congress (ITC 28), Würzburg, Germany, 12–16 September 2016. [Google Scholar]
- Marotta, A.; Zola, E.; D’Andreagiovanni, F.; Kassler, A. A fast robust optimization-based heuristic for the deployment of green virtual network functions. J. Netw. Comput. Appl. 2017, 95, 42–53. [Google Scholar] [CrossRef]
- Ito, M.; He, F.; Oki, E. Robust Optimization Model for Probabilistic Protection under Uncertain Virtual Machine Capacity in Cloud. In Proceedings of the 2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020, Milan, Italy, 25–27 March 2020. [Google Scholar]
- Mijumbi, R.; Gorricho, J.; Serrat, J.; Claeys, M.; De Turck, F.; Latré, S. Design and evaluation of learning algorithms for dynamic resource management in virtual networks. In Proceedings of the 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 5–9 May 2014; pp. 1–9. [Google Scholar]
- Lillicrap, T.P.; Hunt, J.J.; Pritzel, A.; Heess, N.; Erez, T.; Tassa, Y.; Silver, D.; Wierstra, D. Continuous control with deep reinforcement learning. arXiv 2015, arXiv:cs.LG/1509.02971. [Google Scholar]
- Dulac-Arnold, G.; Evans, R.; van Hasselt, H.; Sunehag, P.; Lillicrap, T.; Hunt, J.; Mann, T.; Weber, T.; Degris, T.; Coppin, B. Deep Reinforcement Learning in Large Discrete Action Spaces. arXiv 2015, arXiv:cs.AI/1512.07679. [Google Scholar]
- Wang, Z.; Schaul, T.; Hessel, M.; Hasselt, H.; Lanctot, M.; Freitas, N. Dueling Network Architectures for Deep Reinforcement Learning. In Proceedings of Machine Learning Research; PMLR: New York, NY, USA, 2016; Volume 48, pp. 1995–2003. [Google Scholar]
- Reis, J.; Rocha, M.; Phan, T.K.; Griffin, D.; Le, F.; Rio, M. Deep Neural Networks for Network Routing. In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, 14–19 July 2019; pp. 1–8. [Google Scholar]
- Quang, P.T.A.; Hadjadj-Aoul, Y.; Outtagarts, A. A Deep Reinforcement Learning Approach for VNF Forwarding Graph Embedding. IEEE Trans. Netw. Serv. Manag. 2019, 16, 1318–1331. [Google Scholar] [CrossRef] [Green Version]
- Anh Quang, P.T.; Hadjadj-Aoul, Y.; Outtagarts, A. Evolutionary Actor-Multi-Critic Model for VNF-FG Embedding. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–6. [Google Scholar]
- Yan, Z.; Ge, J.; Wu, Y.; Li, L.; Li, T. Automatic Virtual Network Embedding: A Deep Reinforcement Learning Approach With Graph Convolutional Networks. IEEE J. Sel. Areas Commun. 2020, 38, 1040–1057. [Google Scholar] [CrossRef]
- Khezri, H.R.; Moghadam, P.A.; Farshbafan, M.K.; Shah-Mansouri, V.; Kebriaei, H.; Niyato, D. Deep Reinforcement Learning for Dynamic Reliability Aware NFV-Based Service Provisioning. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Mao, W.; Wang, L.; Zhao, J.; Xu, Y. Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach. In Proceedings of the 2020 IFIP Networking Conference (Networking), Paris, France, 22–26 June 2020; pp. 163–171. [Google Scholar]
- Pei, J.; Hong, P.; Pan, M.; Liu, J.; Zhou, J. Optimal VNF Placement via Deep Reinforcement Learning in SDN/NFV-Enabled Networks. IEEE J. Sel. Areas Commun. 2020, 38, 263–278. [Google Scholar] [CrossRef]
- Santos, G.L.; Kelner, J.; Sadok, D.; Endo, P.T. Using Reinforcement Learning to Allocate and Manage SFC in Cellular Networks. In Proceedings of the 2020 16th International Conference on Network and Service Management (CNSM), Izmir, Turkey, 2–6 November 2020; pp. 1–5. [Google Scholar]
- Beck, M.T.; Botero, J.F. Coordinated Allocation of Service Function Chains. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
- Pei, J.; Hong, P.; Xue, K.; Li, D. Resource Aware Routing for Service Function Chains in SDN and NFV-Enabled Network. IEEE Trans. Serv. Comput. 2018, 14, 985–997. [Google Scholar] [CrossRef]
- Pei, J.; Hong, P.; Xue, K.; Li, D. Efficiently Embedding Service Function Chains with Dynamic Virtual Network Function Placement in Geo-Distributed Cloud System. IEEE Trans. Parallel Distrib. Syst. 2019, 30, 2179–2192. [Google Scholar] [CrossRef]
- Mnih, V.; Kavukcuoglu, K.; Silver, D.; Graves, A.; Antonoglou, I.; Wierstra, D.; Riedmiller, M. Playing Atari with Deep Reinforcement Learning. arXiv 2013, arXiv:cs.LG/1312.5602. [Google Scholar]
- Mnih, V.; Kavukcuoglu, K.; Silver, D.; Rusu, A.A.; Veness, J.; Bellemare, M.G.; Graves, A.; Riedmiller, M.; Fidjeland, A.K.; Ostrovski, G.; et al. Human-level control through deep reinforcement learning. Nature 2015, 518, 529–533. [Google Scholar] [CrossRef]
- van Hasselt, H.; Guez, A.; Silver, D. Deep Reinforcement Learning with Double Q-learning. arXiv 2015, arXiv:cs.LG/1509.06461. [Google Scholar]
- Hasselt, H. Double Q-learning. Adv. Neural Inf. Process. Syst. 2010, 23, 2613–2621. [Google Scholar]
- Sun, C.; Bi, J.; Zheng, Z.; Hu, H. SLA-NFV: An SLA-aware High Performance Framework for Network Function Virtualization. In Proceedings of the 2016 ACM SIGCOMM Conference; SIGCOMM ’16; Association for Computing Machinery: New York, NY, USA, 2016; pp. 581–582. [Google Scholar]
Notation | Meaning |
---|---|
The set of content-provider nodes | |
The set of VNF hosting nodes | |
The set of user clusters | |
K | The set of VNF types (cache, compressor, transcoder, and streamer) |
t | A fixed time-step in our simulation |
The set of incoming SFC requests during time-step t | |
T | The max tolerable RTT for SFC any Live-Streaming request |
The maximum scaled bitrate of r | |
The mean scaled session payload of r | |
The k-type VNF requested by r | |
The channel or content provider requested by r | |
The session workload of r | |
The unit cost of resource in hosting node i | |
The data propagation delay between nodes i and j | |
The k-type VNF container instance in node i | |
1 if is instantiated at the beginning of t | |
1 if is assigned to node i, 0 otherwise | |
1 if the link between i and j is used to reach , 0 otherwise | |
1 if is currently ingesting channel l, 0 otherwise | |
The resource provision in during t | |
The client resource demand of r in any k-type VNF instance | |
The resource demand for content ingestion in any k-type VNF instance | |
The current resource usage of | |
The current resource utilization of | |
The processing time contribution of resource in for | |
The normalization exponent for mean payload | |
in the session workload formula | |
The normalization exponent for maximum bitrate | |
in the session workload formula | |
The unitary data-transportation cost for the link between nodes i and j | |
1 if the SFC assigned to r respects the maximum tolerable RTT, 0 otherwise | |
The processing-time contribution of in any k-type VNF | |
assuming optimal utilization conditions |
Parameter | Value |
---|---|
Action-advantage hidden layers | 2 |
State-value hidden layers | 2 |
hidden layers dimension | 128 |
Input layer dimension | |
Output layer dimension | |
Activation function between hidden layers | ReLU |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cevallos Moreno, J.F.; Sattler, R.; Caulier Cisterna, R.P.; Ricciardi Celsi, L.; Sánchez Rodríguez, A.; Mecella, M. Online Service Function Chain Deployment for Live-Streaming in Virtualized Content Delivery Networks: A Deep Reinforcement Learning Approach. Future Internet 2021, 13, 278. https://doi.org/10.3390/fi13110278
Cevallos Moreno JF, Sattler R, Caulier Cisterna RP, Ricciardi Celsi L, Sánchez Rodríguez A, Mecella M. Online Service Function Chain Deployment for Live-Streaming in Virtualized Content Delivery Networks: A Deep Reinforcement Learning Approach. Future Internet. 2021; 13(11):278. https://doi.org/10.3390/fi13110278
Chicago/Turabian StyleCevallos Moreno, Jesús Fernando, Rebecca Sattler, Raúl P. Caulier Cisterna, Lorenzo Ricciardi Celsi, Aminael Sánchez Rodríguez, and Massimo Mecella. 2021. "Online Service Function Chain Deployment for Live-Streaming in Virtualized Content Delivery Networks: A Deep Reinforcement Learning Approach" Future Internet 13, no. 11: 278. https://doi.org/10.3390/fi13110278
APA StyleCevallos Moreno, J. F., Sattler, R., Caulier Cisterna, R. P., Ricciardi Celsi, L., Sánchez Rodríguez, A., & Mecella, M. (2021). Online Service Function Chain Deployment for Live-Streaming in Virtualized Content Delivery Networks: A Deep Reinforcement Learning Approach. Future Internet, 13(11), 278. https://doi.org/10.3390/fi13110278