skip to main content
10.1145/3573428.3573766acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

Research on Service Function Chain Deployment Algorithm Based on Proximal Policy Optimization

Published: 15 March 2023 Publication History

Abstract

In the future, business scenarios will become diversified, but it is difficult for the existing network architecture to provide strong support for them. Network function virtualization (NFV) technology decouples network functions from dedicated hardware devices and provides customized services for users in the form of service function chain (SFC). At present, the deployment of SFC has been proved to be a NP-hard problem. Most of the solutions are integer linear programming algorithms, but the process of such algorithms is complex. When the network topology scale becomes larger, the calculation process is very time-consuming, and the results sometimes fall into local optimal solutions, which makes it difficult to achieve the desired effect. In this case, reinforcement learning (RL) algorithms show great advantages, learning strategies through interaction with the environment to maximize rewards or achieve specific goals. Therefore, this paper proposes a SFC deployment algorithm based on proximal policy optimization (PPO) reinforcement learning, which aims at maximizing access rate and minimizing resource consumption. The simulation results show that the proposed algorithm has good convergence and stability, which is more conducive to the actual deployment of the SFC.

References

[1]
Peng D, Yao G T. Research and application of 5g network slicing technology [J]. Information Technology & Informatization, 2021, (01): 202-205.
[2]
Yao H P, Chen X, Li M, Zhang P Y, Wang L Y. A novel reinforcement learning algorithm for virtual network embedding[J]. Neurocomputing, 2018, 284 (APR.5): 1-9.
[3]
Tang L, Zhou Y, Tan X, Wei Y N, Chen Q B. Virtual Network Function Migration Algorithm Based on Reinforcement Learning for 5G Network Slicing[J]. Journal of Electronics & Information Technology, 2020, 42 (03): 669-677.
[4]
O. Alhussein and W. Zhuang, "Dynamic Topology Design of NFV-Enabled Services Using Deep Reinforcement Learning," in IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 2, pp. 1228-1238, June, 2022.
[5]
Zhang X B, Huang Q, Yang W C, Huang R, Wang L W, Li F L. Analysis on the Advances and Challenges of 5G End-to-End Network Slice [J]. Mobile Communications, 2022, 46 (02): 43-48
[6]
Dong X. Research on Dynamic Resource Optimization Algorithm of End-to-End Network Slicing [D]. Xidian University, 2019.
[7]
Zhao B W. Research on Resource Allocation Algorithms for Network Slicing[D]. Xidian University, 2020.
[8]
Li T H. Research on 5G Network End-to-End Slicing Algorithms [D]. Nanjing University of Posts and Telecommunications, 2021.
[9]
Tong Z. Study on Communication and Computation Resource Allocation for 5G End-to-End Network Slicing[D]. Beijing University of Posts and Telecommunications, 2021.
[10]
Schulman J, Wolski F, Dhariwal P, Radford A, Klimov O. Proximal Policy Optimization Algorithms [J]. arXiv Preprint, arXiv: 1707.06347, 2017.
[11]
Yao J. Research on Reinforcement Learning-based Service Function Chain Elasticity and Trusted Deployment Mechanism [D]. Nanjing University of Posts and Telecommunications, 2021.
[12]
He Y. Dynamic Configuration Mechanism of Service Function Chain in NFV based Mobile Networks [D]. University of Electronic Science and Technology of China, 2019.
[13]
Li D, Lan J L, Wang P, Hu Y X. Service function chain deployment algorithm based on optimal weighted graph matching [J]. Journal on Communications. 2019, 40 (03): 10-18.
[14]
Cai Y, You J G, Ding J M. Proximal policy optimization and adversarial learning based dialong generation [J]. Computer Engineering & Science, 2020, 42 (09): 1680-1689.

Index Terms

  1. Research on Service Function Chain Deployment Algorithm Based on Proximal Policy Optimization

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    EITCE '22: Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering
    October 2022
    1999 pages
    ISBN:9781450397148
    DOI:10.1145/3573428
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 March 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Deployment algorithm
    2. Network function virtualization (NFV)
    3. Proximal policy optimization (PPO)
    4. Service function chain (SFC)
    5. reinforcement learning (RL)

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    EITCE 2022

    Acceptance Rates

    Overall Acceptance Rate 508 of 972 submissions, 52%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 35
      Total Downloads
    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 24 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media