An Isolation-Aware Online Virtual Network Embedding via Deep Reinforcement Learning (2211.14158v3)
Abstract: Virtualization technologies are the foundation of modern ICT infrastructure, enabling service providers to create dedicated virtual networks (VNs) that can support a wide range of smart city applications. These VNs continuously generate massive amounts of data, necessitating stringent reliability and security requirements. In virtualized network environments, however, multiple VNs may coexist on the same physical infrastructure and, if not properly isolated, may interfere with or provide unauthorized access to one another. The former causes performance degradation, while the latter compromises the security of VNs. Service assurance for infrastructure providers becomes significantly more complicated when a specific VN violates the isolation requirement. In an effort to address the isolation issue, this paper proposes isolation during virtual network embedding (VNE), the procedure of allocating VNs onto physical infrastructure. We define a simple abstracted concept of isolation levels to capture the variations in isolation requirements and then formulate isolation-aware VNE as an optimization problem with resource and isolation constraints. A deep reinforcement learning (DRL)-based VNE algorithm ISO-DRL_VNE, is proposed that considers resource and isolation constraints and is compared to the existing three state-of-the-art algorithms: NodeRank, Global Resource Capacity (GRC), and Mote-Carlo Tree Search (MCTS). Evaluation results show that the ISO-DRL_VNE algorithm outperforms others in acceptance ratio, long-term average revenue, and long-term average revenue-to-cost ratio by 6%, 13%, and 15%.
- D. Bega et al., “Optimising 5G infrastructure markets: The business of network slicing,” in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017, pp. 1–9.
- J. Sun et al., “A survey on the placement of virtual network functions,” Journal of Network and Computer Applications, vol. 202, p. 103361, 2022.
- D. G. Andersen, “Theoretical approaches to node assignment,” in TANA. Carnegie Mellon University, 2002.
- H. Cao et al., “A survey of embedding algorithm for virtual network embedding,” China Communications, vol. 16, no. 12, pp. 1–33, 2019.
- M. Chowdhury et al., “ViNEYard: Virtual network embedding algorithms with coordinated node and link mapping,” IEEE/ACM Transactions on Networking, vol. 20, no. 1, pp. 206–219, 2012.
- Y. Sang et al., “Provably efficient algorithms for joint placement and allocation of virtual network functions,” in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017, pp. 1–9.
- X. Cheng et al., “Virtual network embedding through topology-aware node ranking,” SIGCOMM Comput. Commun. Rev., vol. 41, no. 2, p. 38–47, apr 2011.
- L. Gong et al., “Toward profit-seeking virtual network embedding algorithm via global resource capacity,” in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, 2014, pp. 1–9.
- S. Liu et al., “Towards security-aware virtual network embedding,” Computer Networks, vol. 91, pp. 151–163, 2015.
- S. Haeri et al., “Virtual network embedding via Monte Carlo tree search,” IEEE Transactions on Cybernetics, vol. 48, no. 2, pp. 510–521, 2018.
- R. Solozabal et al., “Virtual network function placement optimization with deep reinforcement learning,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 2, pp. 292–303, 2020.
- A. J. Gonzalez et al., “The isolation concept in the 5G network slicing,” in 2020 European Conference on Networks and Communications (EuCNC), 2020, pp. 12–16.
- “3GPP TR 23.799 – Study on architecture for next generation system,” Dec 2016.
- A. A. Barakabitze et al., “5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges,” Computer Networks, vol. 167, p. 106984, 2020.
- Z. Kotulski et al., “Towards constructive approach to end-to-end slice isolation in 5G networks - eurasip journal on information security,” Mar 2018.
- J. Guo et al., “AI notes: Initializing neural networks,” 2019.