CN111147307A - Service function chain reliable deployment method based on deep reinforcement learning - Google Patents

Service function chain reliable deployment method based on deep reinforcement learning Download PDF

Info

Publication number
CN111147307A
CN111147307A CN201911397560.4A CN201911397560A CN111147307A CN 111147307 A CN111147307 A CN 111147307A CN 201911397560 A CN201911397560 A CN 201911397560A CN 111147307 A CN111147307 A CN 111147307A
Authority
CN
China
Prior art keywords
reliability
vnf
link
node
deployment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911397560.4A
Other languages
Chinese (zh)
Other versions
CN111147307B (en
Inventor
唐伦
曹睿
贺兰钦
管令进
胡彦娟
陈前斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Shipping Exchange Co ltd
Shenzhen Wanzhida Technology Transfer Center Co ltd
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201911397560.4A priority Critical patent/CN111147307B/en
Publication of CN111147307A publication Critical patent/CN111147307A/en
Application granted granted Critical
Publication of CN111147307B publication Critical patent/CN111147307B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/22Arrangements for detecting or preventing errors in the information received using redundant apparatus to increase reliability

Abstract

The invention relates to a service function chain reliable deployment method based on deep reinforcement learning, and belongs to the technical field of communication. The method comprises the following steps: s1: obtaining a reliability value based on a reliability measurement mode of the equipment use degree and the surrounding safety coefficient; s2: preliminarily determining the reliability requirement of each virtual network function through the functional characteristics and the topological characteristics; s3: obtaining a deployable length of the link reliability requirement which meets the virtual link reliability requirement; s4: based on each reliability requirement, using deep reinforcement learning to find an optimal mapping scheme suitable for a virtual network environment and a basic level environment; s5: in the mapping process, if the VNF reliability cannot be met, a node backup method based on the importance is used, the link deployment result does not meet the link reliability, and a link backup method based on the link backup importance is used. The method can effectively deal with the basic layer faults on the basis of ensuring the reliability requirement, reduces the number of invalid SFCs, and ensures the load balance to ensure that the whole virtual network is more stable and reliable.

Description

Service function chain reliable deployment method based on deep reinforcement learning
Technical Field
The invention belongs to the technical field of communication, and relates to a service function chain reliable deployment method based on deep reinforcement learning.
Background
With the rise of technologies such as cloud computing and big data, people increasingly use the internet to perform activities such as work, shopping and video in daily life. These technologies bring convenience to people and also have more requirements on the performance and architecture of the network. Conventional network architectures lack flexibility and require the deployment of a range of dedicated hardware devices to provide services. The network functions thus form a rigid and rigid network function chain, which has the disadvantage of being fixed in the network topology and the location of the service providing elements, and modifying the network function chain means modifying the network topology or changing the connections of the middleboxes. When providing new services, huge investment costs and operation costs are faced with deploying and upgrading physical infrastructure. Network function virtualization is used as an industrial network system structure, a new network design idea is provided for future network design by utilizing a virtualization technology, the main idea is that a software implementation part of a network function is decoupled from underlying hardware and migrated to a virtual platform, and the software is operated on general hardware equipment such as a server, a memory and a switch which accord with an industrial standard to implement the functions of traditional network special hardware equipment. Therefore, flexible network function deployment is provided, and rapid service provision is realized. At present, the overall framework of the virtualized network is relatively clear, but the construction mechanism of the virtualized network, especially the reliability problem, still prevents the large-scale implementation and deployment of the engineering of the virtualized network, and needs to be deeply researched and explored.
Reliability is a measure of the ability of a network to cope with a failure. With the continuous expansion and complexity of networks, the networks face more and more threats, and in order to ensure the stability and security of services provided to users and avoid irreparable loss to users, after natural and man-made failures occur, the networks need to utilize preventive techniques or reparative techniques to alleviate damage to network services, so that the networks still have the capability of providing certain services.
Currently, in the existing technology for reliability, there are the following disadvantages:
firstly, the connotation of network reliability is gradually expanded from the traditional communication reliability based on a network topology structure to the capacity reliability considering the network flow, and is extended to the performance reliability considering the user requirements based on services and the like. The existing reliability description models are no longer accurate. Secondly, the existing schemes based on reliability mapping simply meet the overall reliability requirement, ignore the different losses caused by the failure of different virtual network functions, and how to give each virtual network function the corresponding reliability, so that the loss caused by the failure is reduced under the condition of reducing the failure rate of the SFC. In addition, the solution of the current literature is mostly based on a heuristic method, and the complexity is reduced while the solution is easy to fall into a local optimal solution.
Therefore, how to determine a corresponding reliability model according to the current network characteristics, how to effectively determine the loss situation caused by the failure of each virtual network function (SFC), and how to give a high-loss VNF a high reliability requirement, and how to intelligently and efficiently obtain a corresponding deployment scheme are worthy of study.
Disclosure of Invention
In view of this, the present invention provides a method for reliably deploying a service function chain based on deep reinforcement learning, so as to reduce failure probability and loss on the premise that a deployment result meets an overall reliability requirement.
In order to achieve the purpose, the invention provides the following technical scheme:
a service function chain reliable deployment method based on deep reinforcement learning comprises the following steps:
s1: obtaining a reliability value based on a reliability measurement mode of the equipment use degree and the surrounding safety coefficient;
s2: preliminarily determining the reliability requirement of each virtual network function through the functional characteristics and the topological characteristics;
s3: obtaining a deployable length of the link reliability requirement which meets the virtual link reliability requirement;
s4: based on each reliability requirement, using deep reinforcement learning to find an optimal mapping scheme suitable for a virtual network environment and a basic level environment;
s5: in the mapping process, if the VNF reliability cannot be met, a node backup method based on the importance is used, the link deployment result does not meet the link reliability, and a link backup method based on the link backup importance is used.
Further, in step S1, the reliability is determined based on the device usage degree, which estimates the wear of the device caused by the self-operation through the weibull distribution, and the surrounding safety factor, which is determined by counting the number of times of failure of the device and the distance from the failed device, and specifically includes:
s11: the equipment use degree is evaluated by Weibull distribution, the longer the equipment is used, the more serious the loss is, the greater the failure probability is, the equipment use degree is indirectly described by the failure probability, and the cumulative distribution function is
Figure BDA0002346717820000021
Figure BDA0002346717820000022
The larger the reliability is, the longer the device is used, the greater the failure probability is, so the reliability of the physical node from the viewpoint of the use degree is defined as:
Figure BDA0002346717820000023
Figure BDA0002346717820000026
means over time
Figure BDA0002346717820000024
η and m are Weibull scale parameter and shape parameter, and statistical score can be used according to log file of local server, system configuration dataAnd solving by an analysis method to obtain the product.
For the same reason, physical link li,jLink utilization UL (l)i,j) The same expression is also used;
s12: generally, the environment of some devices is relatively severe or attacked, the number of times of faults occurring is large, and meanwhile, if the last fault occurs just nearby, it indicates to a certain extent that the environment of the node currently may have a large potential safety hazard. Therefore, the physical node perimeter safety factor is defined as follows:
Figure BDA0002346717820000025
wherein q is a physical node niNumber of failures in a period of time, pos ni]Represents niDistance hop count to last failed physical node; the physical node does not have faults or has fewer faults, which shows that the reliability coefficient of the surrounding environment of the physical node is higher.
Similarly, the physical link reliability coefficient is:
Figure BDA0002346717820000031
wherein pos [ li,j]Leaving this time for last failed linki,jThe number of physical nodes in the link failure at intervals; the final reliability is the product of two coefficients, namely: RN (n)i)=UR(ni)·ER(ni)、RL(li,j)=UR(li,j)·ER(li,j)。
Further, in step S2, the present invention places SFC reliability requirements on
Figure BDA0002346717820000032
The refinement is to the reliability requirements of multiple components, and by satisfying these requirements, a reliable mapping of service function chains is achieved. Because virtual nodes and virtual links in a virtual network are different in nature, reliability requirements need to be met firstly
Figure BDA0002346717820000033
Dividing the reliability into two parts, namely the reliability requirement of the virtual node and the reliability requirement of the virtual link
Figure BDA0002346717820000034
And virtual link reliability requirements
Figure BDA0002346717820000035
Are all defined as
Figure BDA0002346717820000036
And determining the importance score of each virtual network function according to the topology information and the function information of the service function chain, namely, the VNF sharing degree, the recovery resource cost, the VNF function importance and the VNF state.
Further, the reliability requirement of the virtual network function is determined as follows:
because each VNF in the SFC has different topological characteristics and functional characteristics, so that the failure impact, the recovery difficulty, and the recovery time are different, the importance of each VNF in failure needs to be determined through these characteristics, and then the reliability requirement matching with the importance is obtained, and a reference feature for determining the reliability requirement is provided:
1) VNF sharing degree: the function multiplexing enables a single VNF to be shared by a plurality of SFCs at the same time, and in the step, the parameter shared by the VNF by the plurality of SFCs is defined as the VNF sharing degree, and compared with the VNF dedicated to one SFC, the VNF fault shared among the plurality of SFCs affects all related services;
2) and recovery cost: each VNF consumes a corresponding resource and requires an amount of resources
Figure BDA0002346717820000037
Different, the difficulty of recovery after failure is different, the higher the resource demand is, the fewer physical nodes meeting the resource demand are, the lower the recovery probability is, and more reliability needs to be provided to the VNF; while improving the recovery probabilityAnd the overall cost consumption of long-term operation is reduced.
3) VNF functional importance: for InP, VNF functions themselves have respective importance, for example, content is lost due to failure of content caching function, and if content is not backed up, it is difficult to recover, which results in immeasurable loss. And the firewall function failure is easy to remap and recover, so that the caused instant service interruption has no great influence. Because the attribute is difficult to describe by objective data, the importance of each VNF is determined according to human experience, and relatively important functions are endowed with higher reliability;
4) VNF state: each type of VNF needs to store respective network state information including data flow information and address mapping, where the state includes a relevant state and an irrelevant state, the relevant state is only relevant to the VNF itself, and the irrelevant state is modified along with the arrival and processing of the data flow, and a failure recovery process of the VNF is more complex than the relevant state, and requires a longer recovery time and more recovery cost consumption, so that the VNF needs to have higher reliability when including the irrelevant state;
the importance degree of the VNF is determined through the 4 attributes, and therefore the corresponding reliability requirement is determined; first, it should be determined
Figure BDA0002346717820000041
Because of the different attribute types, normalize the attribute values:
the sharing degree of the VNF is expressed by the number psi of the shared SFCs, and in order to avoid the overlarge probability of common cause faults caused by the overlarge sharing, the maximum sharing degree of the VNF is designed to be only 4, so that the result is normalized
Figure BDA0002346717820000042
Is psi/4;
the recovery cost is the resource demand, and is obtained by taking the maximum value of the resource demand in the SFC as the reference
Figure BDA0002346717820000043
Figure BDA0002346717820000044
The VNF function importance degree is manually graded to obtain an importance grade, and the importance degree grade is XIRecorded in the scoring table, normalizing the results
Figure BDA0002346717820000045
Comprises the following steps:
Figure BDA0002346717820000046
the state of the VNF includes an irrelevant state
Figure BDA0002346717820000047
Figure BDA0002346717820000047
1, no non-correlated state is 0.5;
according to each normalized attribute value, finally
Figure BDA0002346717820000048
The sum of the attribute values of (a) represents the degree of importance in the SFC, resulting in a normalized reliability coefficient ωI
Figure BDA0002346717820000049
At this time can obtain
Figure BDA00023467178200000410
Reliability requirement of
Figure BDA00023467178200000411
It is sufficient to find a physical node that meets VNF requirements at deployment time.
Further, in step S3, the virtual link reliability requirement has been determined, and now the link reliability requirement needs to be satisfied by the corresponding link mapping scheme. Meanwhile, function multiplexing is considered, so in order to jointly optimize function deployment and bandwidth requirements, an optimal balance point needs to be found between function multiplexing and path length, and a link reliable mapping model based on function multiplexing is adopted to decompose the deployment problem of a service function chain into two problems: 1) setting maximum value u 'of transmission hop number'k(ii) a 2) In u'kFind complex in rangeThe most highly used active path;
for the problem 1), the function multiplexing and the link reliability requirement are considered jointly, the reliable deployment of the virtual link is different from the virtual node, and as the hop count of the link is not fixed, the more the hop count of the deployed link is, the lower the reliability of the mapped link is, so that the link length u can be controlledkTo meet the reliability requirements of the link, one can obtain:
Figure BDA00023467178200000412
wherein]+Denotes rounding up, rlAverage reliability for base layer links:
Figure BDA0002346717820000051
l represents the number of base links, and the link length should be smaller than u when finally deployedk(ii) a With reference to the base layer network distribution, it must also be satisfied:
a. in order to ensure that the service path can communicate with the source node and the destination node, the deployment path is not less than the shortest path between the receiving and transmitting nodes;
b. whether it is a reuse or a new deployment, it is guaranteed that all VNFs can be deployed on the path.
Further, u iskThe method is from reliability, a base layer network topology is not considered, and situations that a and b cannot be met exist in actual deployment, so that the request can only be rejected even if resources are sufficient; the main reason for this is insufficient path length, and to avoid this, the maximum hop count u is appropriately extendedkAnd if the link reliability of the deployment result is insufficient, the link reliability can be satisfied through backup, so that:
Figure BDA0002346717820000052
SF is a spreading factor, and after spreading, SF u is usedkDeployment can greatly increase the likelihood of node deployment success.
Further, in step S4, a mapping scheme is implemented through deep reinforcement learning based on VNF reliability and deployable link length, the deep reinforcement learning applies the strong sensing capability of the deep learning to the decision process of the reinforcement learning, interacts with the environment through a continuous trial and error manner, and senses the unknown condition of the environment through a neural network, thereby obtaining the most accurate reward evaluation value. And find the best strategy by maximizing the cumulative prize. The method needs to determine 3 element sets, state sets, action sets and rewards, and the definition of corresponding data is as follows:
state space: st={Bleft,Cleft,bmap,cmap},BleftAnd CleftRespectively representing the rest node resource set and the link resource set; the value can reflect the underlying topological property; in actual conditions, the network topology of the server is changed due to the fault caused by the influence of random factors in the environment, and the failed nodes and links are set to be 0; when the repair is complete, the mapping may continue on the node/link; namely, the real-time performance of interaction with the environment is strengthened and learned, and the topological change is sensed and responded; bmap,cmapMapping state sets of the mapped nodes and links in the SFC to represent virtual network states corresponding to corresponding base layer environment states, wherein the node states comprise deployment results and reusability of the mapped nodes, and the link states are deployed links;
an action space: a ist={an,al,aκ},anFor node mapping actions, alFor link mapping actions, akAllocating corresponding resources for the resource allocation action according to the requirements; wherein, when executing node mapping action, it will search the VNF carried by the mapped base level node, if finding that the carried physical node carries the VNF, it will directly multiplex the VNF, at the same time, it will not execute node resource allocation action, and recalculate each omegaIOtherwise, the VNF is instantiated to consume the computing resource;
the action set is screened, the probability of selecting effective action is increased, and the training result is to select effective actionThe strategy of obtaining the maximum accumulated reward is correctly reflected, so that the neural network only needs to reflect the deployment strategy meeting the requirement, and is not important for learning of the ineffective action state pair, so that the performance loss is not caused, and the learning time can be effectively reduced; the node link sets satisfying the requirements are respectively expressed as
Figure BDA0002346717820000061
And
Figure BDA0002346717820000062
rewarding:
Figure BDA0002346717820000063
the reward ensures that the VNF mapping action minimizes the reliability waste on the basis of ensuring the reliability requirement; the resource consumption of the segment mapping is minimized while considering the load balance; of course, if an invalid action is selected, such as reliability not being satisfied, the action award is set to-100.
Deep reinforcement learning obtains corresponding reward, namely the next state, by continuously executing actions, and collects a plurality of st,at,rt,st+1]The vectors are put into an experience playback pool, then random extraction is carried out in the experience playback pool to reduce the correlation of training data, the convolution neural network is trained, a state action pair is reflected through the strong perception of the neural network to serve as a potential value state value function in the future, and when training is sufficient and fitting is complete, the optimal strategy can be obtained.
Further, in step S5, in response to the situation that the reliability in the deployment process is insufficient, a node backup scheme based on the importance of the virtual network function and a link backup scheme based on the importance of the link backup are adopted, which specifically includes:
in the action selection process, when a node meeting the reliability is not selected, a node backup scheme is used, the scheme determines a backup mode based on the VNF importance obtained when deployment is completed, for the more important VNF, namely, the VNF higher than the average importance is subjected to special backup, namely, a VNF deployed is instantiated to be deployed again to be deployed at a nearby physical node as a backup, and if a source node fails, the VNF of the backup node is directly used; the method can effectively deal with multi-node faults on the basis of ensuring the reliability. The shared backup can be carried out relatively unimportant, namely a plurality of backup nodes share the resource of the same backup node, so that the resource consumption can be effectively reduced while the reliability is ensured;
executing a link backup scheme when the deployment result does not meet the reliability of the virtual link, wherein the scheme considers that the resource consumption is reduced and the reliability increment is improved
Figure BDA0002346717820000064
Where BW is the link backup resource consumption,
Figure BDA0002346717820000065
meanwhile, the backup is carried out on the first reliable virtual link as much as possible, and the following steps are obtained:
Figure BDA0002346717820000066
according to
Figure BDA0002346717820000067
Can select a higher reliability boost, consume as little resources as possible, and can reduce the probability of a lower reliability link failure, based on
Figure BDA0002346717820000071
And sequencing the iterative backups.
The invention has the beneficial effects that: the reliable deployment method provided by the invention can effectively deal with the basic layer faults on the basis of ensuring the reliability requirement, reduces the number of invalid SFCs, and ensures the load balance to ensure that the whole virtual network is more stable and reliable.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the means of the instrumentalities and combinations particularly pointed out hereinafter.
Drawings
For the purposes of promoting a better understanding of the objects, aspects and advantages of the invention, reference will now be made to the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 is a block diagram of an application environment in the present invention;
FIG. 2 is a schematic diagram of function multiplexing;
fig. 3 is a schematic diagram of a service function chain mapping scheme based on deep reinforcement learning according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described in detail and clearly with reference to the accompanying drawings.
Fig. 1 is a framework diagram of an application environment in the present invention, see fig. 1, which is a basic model for providing end-to-end services in a network virtualization environment, and the framework is a network virtualization architecture composed of NFV-based orchestration and control framework. An end-to-end service function chain starts from a terminal device, and VNFs are sequentially deployed on the terminal device through an access network and a core network to implement corresponding service requirements. The virtual sub-network of service function chains is built and managed by the Service Provider (SP). The infrastructure provider (InP) is responsible for building, operating and maintaining the basic physical facilities, and provides reliable resources through a standardized interface according to SP resource application. When a user makes a request, the SP will generate an end-to-end network service chain consisting of several virtual network functions, such as SFC1 in slice 1 and SFC2 in slice 2, which requires determining the required functions, number and order between them.
Fig. 2 is a schematic diagram of function multiplexing. The function multiplexing means that if the VNF to be deployed is found to be carried on the server in the mapping process, the VNF can be shared with the deployed SFC, and the process does not consume node computing resources. The number of VNFs multiplexed in the SFC is called multiplexing degree, and the multiplexing degree can be improved during mapping so as to reduce the consumption of node resources. But already deployed function sitesStationing requires more link resources to be consumed than instantiating a new VNF. For example, in FIG. 2, a request for service is required
Figure BDA0002346717820000072
Virtual network function v inIDeployment is carried out, and two deployment schemes are provided, wherein the first scheme is deployment to niTwo physical links are needed, and corresponding node resource instantiation v needs to be consumed at the same timeI(ii) a The second is deployed to njIn the above, 4 physical links are consumed, but the server njHas carried vIAnd the node resources can be directly reused and are not consumed any more. It can be seen that the two schemes focus on optimizing link deployment and node deployment, respectively. Therefore, in order to jointly optimize the function deployment and the bandwidth requirement, an optimal balance point needs to be found between the function multiplexing and the path length.
FIG. 3 is a schematic diagram of the deep reinforcement learning framework of the present invention, the Global service editor (GS-O) when a virtual network request arrives
First, a search for a base layer network environment and a virtual layer environment is started, and the search process is as the search loop of fig. 3. The corresponding states are obtained by searching in the base layer/virtual layer environment, and the executable actions are obtained by an epsilon greedy strategy or by randomly selecting actions in the base layer environment, or by a value neural network.
In the process of randomly selecting the action, the VNF requirement may be high, and if there is no physical node satisfying the reliability requirement in the mapping range, the reliability may be satisfied through backup under the condition of sufficient resources and many nodes. At this time, the importance of the VNF is determined, and the node backup scheme is executed to obtain an action group. In addition, when the maximum Q value action selected by the neural network cannot meet the reliability, the same backup operation is carried out by adding the next largest action.
Determining to execute the deployment action a of the tth VNF according to the selection resulttGet the corresponding deployment reward rtAnd changing the state of the basic level environment resource to st+1To obtain a vector [ s ]t,at,rt,st+1]And stored in the experience pool. Then from st+1Begin to continue exploringAnd seeking to deploy the t +1 th VNF. Until the VNF is fully deployed. A deployment cycle is performed. Then perform a next deployment cycle to seek from the beginning. Vectors are iteratively collected in this process.
After the experience pool stores enough vectors, a set of vectors can be randomly drawn in the experience pool. stAnd atObtaining the Q estimated value Q(s) of the corresponding action by the main neural network at the momentt,at| θ), θ represents a parameter of the master neural network. r ist、st+1To obtain a target Q value:
Figure BDA0002346717820000081
at this time, the difference between the main network Q value and the target Q value is made as a loss function:
Figure BDA0002346717820000082
the loss function updates θ using the SGD. The training of the target network is derived from the training results of the primary network. To reduce the time complexity, the parameter θ of the master network is copied to the target network every T times the master network is trained. The learning loop in fig. 3 is continuously executed in a loop. After a group of vectors is trained, the environment is continuously searched, the vectors in the experience pool are updated, and iteration is continuously carried out. Until the loss function converges to a sufficiently small range. At this point the Q-estimation neural network has already tended to converge. Whereby the deployment loop of the figure can be implemented.
Finding out that the link reliability is not satisfied after the SFC deployment is finished on the deployment loop, executing a link backup module to the link backup module
Figure BDA0002346717820000083
And sequencing, and iterating backup from front to back until the reliability requirement is met. And then obtaining a final deployment scheme.
The whole method is summarized and obtained as follows:
step 1: initializing an experience playback pool, randomly initializing parameters of a main network theta, and copying the parameters to a target network theta-And based on virtual network powerReliability pre-distribution result w of virtual network function obtained by reliability determination model and virtual link reliable mapping model based on function multiplexingIAnd deployable length u'k。episode=0
Step 2: initialization state S1={Bleft,Cleft,bmap,cmapAnd t is 0
And step 3: determining a set of selectable actions
Figure BDA0002346717820000091
Randomly generating a number τ of 0 to 1 if τ<E, go to step 4, otherwise go to step 6.
And 4, step 4: if it is not
Figure BDA0002346717820000092
Non-null where action a is randomly selectedtOtherwise, go to step 5.
And 5: if it is not
Figure BDA0002346717820000093
Not null, when ω isIExecuting shared backup when the ratio is less than 1/D, newly building nodes near the deployed backup nodes, if no deployed backup node exists or omegaIAnd executing special backup if the reliability is higher than 1/D, and selecting the node with the highest reliability as a deployment node and the other node as a backup node until the reliability requirement of the VNF is met.
Step 6: estimation based on a main neural network
Figure BDA0002346717820000094
And selecting an action.
And 7: performing action atTo obtain a reward rtAnd the next state st+1Will vector(s)t,at,rt,st+1) And putting the experience playback pool. And if the experience pool is full, the step 8 is carried out. If not, step 2 is entered if all VNFs have been deployed. Otherwise, if t is t +1<And D, entering the step 3.
And 8: and randomly taking out a small batch sample vector set from the experience playback pool.
Step (ii) of9: taking a vector, inputting the vector into the main network, and obtaining a loss function by the target network
Figure BDA0002346717820000095
Step 10: and updating the parameters through random gradient descent, and copying the main network parameters to the target network after updating for T times of theta. If the vector is not trained, go to step 9, otherwise, the epsilon is equal to epsilon +1, if the epsilon is equal to E, go to step 11, otherwise, go to step 2
Step 11: obtaining the optimal strategy of each VNF through the main network, if the strategy is Q(s)t,at) If < -100 then the request is denied.
Step 12: if the reliability requirements of the virtual links are not satisfied, calculating the reliability requirements of each virtual link
Figure BDA0002346717820000096
The link backup is iterated from high to low until the virtual link reliability requirements are met.
Finally, the above embodiments are only intended to illustrate the technical solutions of the present invention and not to limit the present invention, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all of them should be covered by the claims of the present invention.

Claims (8)

1. A service function chain reliable deployment method based on deep reinforcement learning is characterized in that: the method comprises the following steps:
s1: obtaining a reliability value based on a reliability measurement mode of the equipment use degree and the surrounding safety coefficient;
s2: preliminarily determining the reliability requirement of each virtual network function through the functional characteristics and the topological characteristics;
s3: obtaining a deployable length of the link reliability requirement which meets the virtual link reliability requirement;
s4: based on each reliability requirement, using deep reinforcement learning to find an optimal mapping scheme suitable for a virtual network environment and a basic level environment;
s5: in the mapping process, if the VNF reliability cannot be met, a node backup method based on the importance is used, the link deployment result does not meet the link reliability, and a link backup method based on the link backup importance is used.
2. The deep reinforcement learning-based reliable service function chain deployment method according to claim 1, characterized in that: in step S1, the reliability is determined based on the device usage degree, which estimates the wear of the device due to self-operation by weibull distribution, and the peripheral safety factor, which is determined by counting the number of times of failure of the device and the distance from the failed device, and specifically includes:
s11: the equipment use degree is evaluated by Weibull distribution, the longer the equipment is used, the more serious the loss is, the greater the failure probability is, the equipment use degree is indirectly described by the failure probability, and the cumulative distribution function is
Figure FDA0002346717810000011
The larger the reliability is, the longer the device is used, the greater the failure probability is, so the reliability of the physical node from the viewpoint of the use degree is defined as:
Figure FDA0002346717810000012
Figure FDA0002346717810000013
means over time
Figure FDA0002346717810000016
The probability of failure caused by equipment loss is obtained by solving by using a statistical analysis method according to log files of a local server and system configuration data, wherein η and m are Weibull scale parameters and shape parameters;
for the same reason, physical link li,jDegree of link usage ofUL(li,j) The same expression is also used;
s12: the safety factor around the physical node is defined as follows:
Figure FDA0002346717810000014
wherein q is a physical node niNumber of failures in a period of time, pos ni]Represents niDistance hop count to last failed physical node;
similarly, the physical link reliability coefficient is:
Figure FDA0002346717810000015
wherein pos [ li,j]Leaving this time for last failed linki,jThe number of physical nodes in the link failure at intervals; the final reliability is the product of two coefficients, namely: RN (n)i)=UR(ni)·ER(ni)、RL(li,j)=UR(li,j)·ER(li,j)。
3. The deep reinforcement learning-based reliable service function chain deployment method according to claim 1, characterized in that: in step S2, the reliability is requested
Figure FDA0002346717810000021
Dividing the reliability into two parts, namely the reliability requirement of the virtual node and the reliability requirement of the virtual link
Figure FDA0002346717810000022
And virtual link reliability requirements
Figure FDA0002346717810000023
Are all defined as
Figure FDA0002346717810000024
And determining the importance score of each virtual network function according to the topology information and the function information of the service function chain, namely, the VNF sharing degree, the recovery resource cost, the VNF function importance and the VNF state.
4. The deep reinforcement learning-based reliable service function chain deployment method according to claim 3, characterized in that: the reliability requirement of the virtual network function is determined as follows:
because each VNF in the SFC has different topological characteristics and functional characteristics, so that the failure impact, the recovery difficulty, and the recovery time are different, the importance of each VNF in failure needs to be determined through these characteristics, and then the reliability requirement matching with the importance is obtained, and a reference feature for determining the reliability requirement is provided:
1) VNF sharing degree: the function multiplexing enables a single VNF to be shared by a plurality of SFCs at the same time, and in the step, the parameter shared by the VNF by the plurality of SFCs is defined as the VNF sharing degree, and compared with the VNF dedicated to one SFC, the VNF fault shared among the plurality of SFCs affects all related services;
2) and recovery cost: each VNF consumes a corresponding resource and requires an amount of resources
Figure FDA0002346717810000025
Different, the difficulty of recovery after failure is different, the higher the resource demand is, the fewer physical nodes meeting the resource demand are, the lower the recovery probability is, and more reliability needs to be provided to the VNF;
3) VNF functional importance: for InP, VNF functions have respective importance degrees, and because the attribute is difficult to describe by objective data, the importance degree is determined for each VNF according to human experience, and relatively important functions are endowed with higher reliability;
4) VNF state: each type of VNF needs to store respective network state information including data flow information and address mapping, where the state includes a relevant state and an irrelevant state, the relevant state is only relevant to the VNF itself, and the irrelevant state is modified along with the arrival and processing of the data flow, and a failure recovery process of the VNF is more complex than the relevant state, and requires a longer recovery time and more recovery cost consumption, so that the VNF needs to have higher reliability when including the irrelevant state;
the importance degree of the VNF is determined through the 4 attributes, and therefore the corresponding reliability requirement is determined; first, it should be determined
Figure FDA0002346717810000026
Because of the different attribute types, normalize the attribute values:
the sharing degree of the VNF is expressed by the number psi of the shared SFCs, and in order to avoid the overlarge probability of common cause faults caused by the overlarge sharing, the maximum sharing degree of the VNF is designed to be only 4, so that the result is normalized
Figure FDA0002346717810000027
Is psi/4;
the recovery cost is the resource demand, and is obtained by taking the maximum value of the resource demand in the SFC as the reference
Figure FDA0002346717810000031
Figure FDA0002346717810000032
The VNF function importance degree is manually graded to obtain an importance grade, and the importance degree grade is XIRecorded in the scoring table, normalizing the results
Figure FDA0002346717810000033
Comprises the following steps:
Figure FDA0002346717810000034
the state of the VNF includes an irrelevant state
Figure FDA0002346717810000035
Is 1, has no uncorrelated stateState 0.5;
according to each normalized attribute value, finally
Figure FDA0002346717810000036
The sum of the attribute values of (a) represents the degree of importance in the SFC, resulting in a normalized reliability coefficient ωI
Figure FDA0002346717810000037
At this time can obtain
Figure FDA0002346717810000038
Reliability requirement of
Figure FDA0002346717810000039
It is sufficient to find a physical node that meets VNF requirements at deployment time.
5. The deep reinforcement learning-based reliable service function chain deployment method according to claim 1, characterized in that: in step S3, in order to jointly optimize function deployment and bandwidth demand, an optimal balance point needs to be found between function multiplexing and path length, and a link reliable mapping model based on function multiplexing is adopted to decompose the deployment problem of the service function chain into two problems: 1) setting maximum value u 'of transmission hop number'k(ii) a 2) In u'kFinding an effective path with the highest multiplexing degree in the range;
for problem 1), the functional multiplexing is considered jointly with the link reliability requirement by controlling the link length ukTo meet the reliability requirements of the link, one can obtain:
Figure FDA00023467178100000310
wherein]+Denotes rounding up, rlAverage reliability for base layer links:
Figure FDA00023467178100000311
l represents the number of base links, and the link length should be smaller than u when finally deployedk(ii) a With reference to the base layer network distribution, it must also be satisfied:
a. in order to ensure that the service path can communicate with the source node and the destination node, the deployment path is not less than the shortest path between the receiving and transmitting nodes;
b. whether it is a reuse or a new deployment, it is guaranteed that all VNFs can be deployed on the path.
6. The deep reinforcement learning-based reliable service function chain deployment method according to claim 5, wherein: said u iskThe method is from reliability, a base layer network topology is not considered, and situations that a and b cannot be met exist in actual deployment, so that the request can only be rejected even if resources are sufficient; the main reason for this is insufficient path length, and to avoid this, the maximum hop count u is appropriately extendedkAnd if the link reliability of the deployment result is insufficient, the link reliability can be satisfied through backup, so that:
Figure FDA0002346717810000041
SF is a spreading factor, and after spreading, SF u is usedkDeployment can greatly increase the likelihood of node deployment success.
7. The deep reinforcement learning-based reliable service function chain deployment method according to claim 1, characterized in that: in step S4, a mapping scheme is implemented by deep reinforcement learning based on VNF reliability and deployable link length, the method needs to determine 3 element sets, state sets, action sets, rewards, and the corresponding data are defined as follows:
state space: st={Bleft,Cleft,bmap,cmap},BleftAnd CleftRespectively representing the remaining node resource set and link resourceGathering; the value can reflect the underlying topological property; in actual conditions, the network topology of the server is changed due to the fault caused by the influence of random factors in the environment, and the failed nodes and links are set to be 0; when the repair is complete, the mapping may continue on the node/link; namely, the real-time performance of interaction with the environment is strengthened and learned, and the topological change is sensed and responded; bmap,cmapMapping state sets of the mapped nodes and links in the SFC to represent virtual network states corresponding to corresponding base layer environment states, wherein the node states comprise deployment results and reusability of the mapped nodes, and the link states are deployed links;
an action space: a ist={an,al,aκ},anFor node mapping actions, alFor link mapping actions, akAllocating corresponding resources for the resource allocation action according to the requirements; wherein, when executing node mapping action, it will search the VNF carried by the mapped base level node, if finding that the carried physical node carries the VNF, it will directly multiplex the VNF, at the same time, it will not execute node resource allocation action, and recalculate each omegaIOtherwise, the VNF is instantiated to consume the computing resource;
the action set is screened, meanwhile, the probability of selecting effective actions is increased, and the training result is to correctly reflect the strategy of obtaining the maximum accumulated reward, so that the neural network only needs to reflect the deployment strategy meeting the requirement, and is not important for learning of the non-effective action state pair, so that the performance loss is not caused, and the learning time can be effectively reduced; the node link sets satisfying the requirements are respectively expressed as
Figure FDA0002346717810000042
And
Figure FDA0002346717810000043
rewarding:
Figure FDA0002346717810000044
the reward ensures that the VNF mapping action minimizes the reliability waste on the basis of ensuring the reliability requirement; the resource consumption of the segment mapping is minimized while considering the load balance;
deep reinforcement learning obtains corresponding reward, namely the next state, by continuously executing actions, and collects a plurality of st,at,rt,st+1]The vectors are put into an experience playback pool, then random extraction is carried out in the experience playback pool to reduce the correlation of training data, the convolution neural network is trained, a state action pair is reflected through the strong perception of the neural network to serve as a potential value state value function in the future, and when training is sufficient and fitting is complete, the optimal strategy can be obtained.
8. The deep reinforcement learning-based reliable service function chain deployment method according to claim 1, characterized in that: in step S5, in response to the situation of insufficient reliability during the deployment process, a node backup scheme based on the importance of the virtual network function and a link backup scheme based on the importance of the link backup are adopted, which specifically include:
in the action selection process, when a node meeting the reliability is not selected, a node backup scheme is used, the scheme determines a backup mode based on the VNF importance obtained when deployment is completed, for the more important VNF, namely, the VNF higher than the average importance is subjected to special backup, namely, a VNF deployed is instantiated to be deployed again to be deployed at a nearby physical node as a backup, and if a source node fails, the VNF of the backup node is directly used; the shared backup can be carried out relatively unimportant, namely a plurality of backup nodes share the resource of the same backup node, so that the resource consumption can be effectively reduced while the reliability is ensured;
executing a link backup scheme when the deployment result does not meet the reliability of the virtual link, wherein the scheme considers that the resource consumption is reduced and the reliability increment is improved
Figure FDA0002346717810000051
Wherein BW is a linkThe backup resources are consumed and the backup resources are,
Figure FDA0002346717810000052
meanwhile, the backup is carried out on the first reliable virtual link as much as possible, and the following steps are obtained:
Figure FDA0002346717810000053
according to
Figure FDA0002346717810000054
Can select a higher reliability boost, consume as little resources as possible, and can reduce the probability of a lower reliability link failure, based on
Figure FDA0002346717810000055
And sequencing the iterative backups.
CN201911397560.4A 2019-12-30 2019-12-30 Service function chain reliable deployment method based on deep reinforcement learning Active CN111147307B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911397560.4A CN111147307B (en) 2019-12-30 2019-12-30 Service function chain reliable deployment method based on deep reinforcement learning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911397560.4A CN111147307B (en) 2019-12-30 2019-12-30 Service function chain reliable deployment method based on deep reinforcement learning

Publications (2)

Publication Number Publication Date
CN111147307A true CN111147307A (en) 2020-05-12
CN111147307B CN111147307B (en) 2022-04-29

Family

ID=70522000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911397560.4A Active CN111147307B (en) 2019-12-30 2019-12-30 Service function chain reliable deployment method based on deep reinforcement learning

Country Status (1)

Country Link
CN (1) CN111147307B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800291A (en) * 2020-05-27 2020-10-20 北京邮电大学 Service function chain deployment method and device
CN111935777A (en) * 2020-06-03 2020-11-13 东南大学 5G mobile load balancing method based on deep reinforcement learning
CN112087384A (en) * 2020-08-03 2020-12-15 国网甘肃省电力公司信息通信公司 SDN environment-based data transmission method and system
CN112087329A (en) * 2020-08-27 2020-12-15 重庆大学 Network service function chain deployment method
CN112132198A (en) * 2020-09-16 2020-12-25 建信金融科技有限责任公司 Data processing method, device and system and server
CN112491741A (en) * 2020-10-19 2021-03-12 国网上海市电力公司 Virtual network resource allocation method and device and electronic equipment
CN112543119A (en) * 2020-11-27 2021-03-23 西安交通大学 Service function chain reliability deployment method based on deep reinforcement learning
CN112631717A (en) * 2020-12-21 2021-04-09 重庆大学 Network service function chain dynamic deployment system and method based on asynchronous reinforcement learning
CN112860384A (en) * 2021-03-15 2021-05-28 南京邮电大学 VNF multiplexing and migrating method oriented to multi-dimensional resource load balancing
CN112968794A (en) * 2021-01-28 2021-06-15 广州杰赛科技股份有限公司 Network function chain deployment method, device, terminal device and storage medium
CN113015196A (en) * 2021-02-23 2021-06-22 重庆邮电大学 Network slice fault healing method based on state perception
CN113133038A (en) * 2021-04-16 2021-07-16 广东电网有限责任公司清远供电局 Power Internet of things link backup method, device, equipment and storage medium
CN113193999A (en) * 2021-04-29 2021-07-30 东北大学 Virtual network mapping method based on depth certainty strategy gradient
CN113490231A (en) * 2021-06-29 2021-10-08 北京邮电大学 Network slice availability guarantee method and device
CN113641462A (en) * 2021-10-14 2021-11-12 西南民族大学 Virtual network hierarchical distributed deployment method and system based on reinforcement learning
CN114172820A (en) * 2021-11-26 2022-03-11 广东技术师范大学 Cross-domain SFC dynamic deployment method, device, computer equipment and storage medium
CN114374608A (en) * 2020-10-15 2022-04-19 中国移动通信集团浙江有限公司 Slice instance backup task scheduling method and device and electronic equipment
CN114944985A (en) * 2022-05-11 2022-08-26 重庆大学 Reliability-oriented service function chain backup method in resource heterogeneous environment
CN115037628A (en) * 2022-05-23 2022-09-09 郑州轻工业大学 Self-adaptive service function chain mapping method based on deep reinforcement learning
CN115361295A (en) * 2022-08-24 2022-11-18 广东电网有限责任公司 Resource backup method, device, equipment and medium based on TOPSIS
WO2022267350A1 (en) * 2021-06-22 2022-12-29 重庆邮电大学 Software defined optical network controller deployment method based on multi-path survivability protection

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016071736A1 (en) * 2014-11-04 2016-05-12 Telefonaktiebolaget L M Ericsson (Publ) Network function virtualization service chaining
US20170279672A1 (en) * 2016-03-28 2017-09-28 Dell Products L.P. System and method for policy-based smart placement for network function virtualization
CN107666412A (en) * 2017-11-20 2018-02-06 电子科技大学 The virtual network function dispositions method of service function chain
CN108260169A (en) * 2018-01-26 2018-07-06 重庆邮电大学 A kind of service function chain dynamic deployment method ensured based on QoS
CN108965014A (en) * 2018-07-25 2018-12-07 北京智芯微电子科技有限公司 The service chaining backup method and system of QoS perception
CN109067579A (en) * 2018-08-01 2018-12-21 重庆邮电大学 Towards the 5G network slice topology design of bottom layer node failure and reliable mapping method
CN110190987A (en) * 2019-05-08 2019-08-30 南京邮电大学 Based on backup income and the virtual network function reliability dispositions method remapped

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016071736A1 (en) * 2014-11-04 2016-05-12 Telefonaktiebolaget L M Ericsson (Publ) Network function virtualization service chaining
US20170279672A1 (en) * 2016-03-28 2017-09-28 Dell Products L.P. System and method for policy-based smart placement for network function virtualization
CN107666412A (en) * 2017-11-20 2018-02-06 电子科技大学 The virtual network function dispositions method of service function chain
CN108260169A (en) * 2018-01-26 2018-07-06 重庆邮电大学 A kind of service function chain dynamic deployment method ensured based on QoS
CN108965014A (en) * 2018-07-25 2018-12-07 北京智芯微电子科技有限公司 The service chaining backup method and system of QoS perception
CN109067579A (en) * 2018-08-01 2018-12-21 重庆邮电大学 Towards the 5G network slice topology design of bottom layer node failure and reliable mapping method
CN110190987A (en) * 2019-05-08 2019-08-30 南京邮电大学 Based on backup income and the virtual network function reliability dispositions method remapped

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
AYOUBI S,ZHANG YANHONG: "A relicable embedding framework for elastic virtualized services in the cloud", 《IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT》 *
JICHAO XIE,PENG YI: "A Service Function Chain Deployment Scheme Based on Heterogeneous Backup", 《2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY》 *
王自豪: "网络功能虚拟化可靠性设计研究", 《中国优秀硕士学位论文数据库》 *

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800291A (en) * 2020-05-27 2020-10-20 北京邮电大学 Service function chain deployment method and device
CN111935777A (en) * 2020-06-03 2020-11-13 东南大学 5G mobile load balancing method based on deep reinforcement learning
CN112087384A (en) * 2020-08-03 2020-12-15 国网甘肃省电力公司信息通信公司 SDN environment-based data transmission method and system
CN112087329A (en) * 2020-08-27 2020-12-15 重庆大学 Network service function chain deployment method
CN112087329B (en) * 2020-08-27 2022-06-07 重庆大学 Network service function chain deployment method
CN112132198B (en) * 2020-09-16 2021-06-04 建信金融科技有限责任公司 Data processing method, device and system and server
CN112132198A (en) * 2020-09-16 2020-12-25 建信金融科技有限责任公司 Data processing method, device and system and server
CN114374608B (en) * 2020-10-15 2023-08-15 中国移动通信集团浙江有限公司 Slice instance backup task scheduling method and device and electronic equipment
CN114374608A (en) * 2020-10-15 2022-04-19 中国移动通信集团浙江有限公司 Slice instance backup task scheduling method and device and electronic equipment
CN112491741A (en) * 2020-10-19 2021-03-12 国网上海市电力公司 Virtual network resource allocation method and device and electronic equipment
CN112491741B (en) * 2020-10-19 2022-09-23 国网上海市电力公司 Virtual network resource allocation method and device and electronic equipment
CN112543119A (en) * 2020-11-27 2021-03-23 西安交通大学 Service function chain reliability deployment method based on deep reinforcement learning
CN112543119B (en) * 2020-11-27 2022-02-18 西安交通大学 Service function chain reliability deployment method based on deep reinforcement learning
CN112631717A (en) * 2020-12-21 2021-04-09 重庆大学 Network service function chain dynamic deployment system and method based on asynchronous reinforcement learning
CN112631717B (en) * 2020-12-21 2023-09-05 重庆大学 Asynchronous reinforcement learning-based network service function chain dynamic deployment system and method
CN112968794B (en) * 2021-01-28 2023-01-17 广州杰赛科技股份有限公司 Network function chain deployment method, device, terminal device and storage medium
CN112968794A (en) * 2021-01-28 2021-06-15 广州杰赛科技股份有限公司 Network function chain deployment method, device, terminal device and storage medium
CN113015196B (en) * 2021-02-23 2022-05-06 重庆邮电大学 Network slice fault healing method based on state perception
CN113015196A (en) * 2021-02-23 2021-06-22 重庆邮电大学 Network slice fault healing method based on state perception
CN112860384A (en) * 2021-03-15 2021-05-28 南京邮电大学 VNF multiplexing and migrating method oriented to multi-dimensional resource load balancing
CN113133038A (en) * 2021-04-16 2021-07-16 广东电网有限责任公司清远供电局 Power Internet of things link backup method, device, equipment and storage medium
CN113133038B (en) * 2021-04-16 2023-01-24 广东电网有限责任公司清远供电局 Power Internet of things link backup method, device, equipment and storage medium
CN113193999B (en) * 2021-04-29 2023-12-26 东北大学 Virtual network mapping method based on depth deterministic strategy gradient
CN113193999A (en) * 2021-04-29 2021-07-30 东北大学 Virtual network mapping method based on depth certainty strategy gradient
WO2022267350A1 (en) * 2021-06-22 2022-12-29 重庆邮电大学 Software defined optical network controller deployment method based on multi-path survivability protection
CN113490231A (en) * 2021-06-29 2021-10-08 北京邮电大学 Network slice availability guarantee method and device
CN113490231B (en) * 2021-06-29 2024-04-23 北京邮电大学 Usability guarantee method and device for network slice
CN113641462B (en) * 2021-10-14 2021-12-21 西南民族大学 Virtual network hierarchical distributed deployment method and system based on reinforcement learning
CN113641462A (en) * 2021-10-14 2021-11-12 西南民族大学 Virtual network hierarchical distributed deployment method and system based on reinforcement learning
CN114172820A (en) * 2021-11-26 2022-03-11 广东技术师范大学 Cross-domain SFC dynamic deployment method, device, computer equipment and storage medium
CN114172820B (en) * 2021-11-26 2024-03-05 广东技术师范大学 Cross-domain SFC dynamic deployment method, device, computer equipment and storage medium
CN114944985A (en) * 2022-05-11 2022-08-26 重庆大学 Reliability-oriented service function chain backup method in resource heterogeneous environment
CN114944985B (en) * 2022-05-11 2023-11-24 重庆大学 Reliability-oriented service function chain backup method in resource heterogeneous environment
CN115037628A (en) * 2022-05-23 2022-09-09 郑州轻工业大学 Self-adaptive service function chain mapping method based on deep reinforcement learning
CN115037628B (en) * 2022-05-23 2023-08-22 郑州轻工业大学 Self-adaptive service function chain mapping method based on deep reinforcement learning
CN115361295A (en) * 2022-08-24 2022-11-18 广东电网有限责任公司 Resource backup method, device, equipment and medium based on TOPSIS
CN115361295B (en) * 2022-08-24 2023-07-07 广东电网有限责任公司 TOPSIS-based resource backup method, device, equipment and medium

Also Published As

Publication number Publication date
CN111147307B (en) 2022-04-29

Similar Documents

Publication Publication Date Title
CN111147307B (en) Service function chain reliable deployment method based on deep reinforcement learning
CN108829494B (en) Container cloud platform intelligent resource optimization method based on load prediction
Soualah et al. Energy efficient algorithm for VNF placement and chaining
US9852230B2 (en) Asynchronous message passing for large graph clustering
CN110460465B (en) Service function chain deployment method facing mobile edge calculation
CN110428046B (en) Method and device for acquiring neural network structure and storage medium
US20150074023A1 (en) Unsupervised behavior learning system and method for predicting performance anomalies in distributed computing infrastructures
CN108684046B (en) Random learning-based access network service function chain deployment method
CN109347681A (en) Self refresh function in distributed system
CN108965014A (en) The service chaining backup method and system of QoS perception
CN113794748B (en) Performance-aware service function chain intelligent deployment method and device
CN113708972A (en) Service function chain deployment method and device, electronic equipment and storage medium
CN109104464A (en) A kind of distributed data update method towards collaboration storage under edge calculations environment
US20110173616A1 (en) Determination and management of virtual networks
CN111090631B (en) Information sharing method and device under distributed environment and electronic equipment
CN113342510B (en) Water and power basin emergency command cloud-side computing resource cooperative processing method
CN108616394A (en) A kind of backup of virtual network function and dispositions method
CN113988464A (en) Network link attribute relation prediction method and equipment based on graph neural network
CN112084035B (en) Task scheduling method and system based on ant colony algorithm
Bouzidi et al. Dynamic clustering of software defined network switches and controller placement using deep reinforcement learning
CN112769594A (en) Intra-network service function deployment method based on multi-agent reinforcement learning
CN116669111A (en) Mobile edge computing task unloading method based on blockchain
Xu et al. Living with artificial intelligence: A paradigm shift toward future network traffic control
Kibalya et al. A multi-stage graph based algorithm for survivable service function chain orchestration with backup resource sharing
CN113193999B (en) Virtual network mapping method based on depth deterministic strategy gradient

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231130

Address after: Room 8017, No. 266 Changle Road, Yinzhou District, Ningbo City, Zhejiang Province, 315000 (Ningbo International Shipping Service Center)

Patentee after: Ningbo Shipping Exchange Co.,Ltd.

Address before: 1003, Building A, Zhiyun Industrial Park, No. 13 Huaxing Road, Henglang Community, Dalang Street, Longhua District, Shenzhen City, Guangdong Province, 518000

Patentee before: Shenzhen Wanzhida Technology Transfer Center Co.,Ltd.

Effective date of registration: 20231130

Address after: 1003, Building A, Zhiyun Industrial Park, No. 13 Huaxing Road, Henglang Community, Dalang Street, Longhua District, Shenzhen City, Guangdong Province, 518000

Patentee after: Shenzhen Wanzhida Technology Transfer Center Co.,Ltd.

Address before: 400065 Chongqing Nan'an District huangjuezhen pass Chongwen Road No. 2

Patentee before: CHONGQING University OF POSTS AND TELECOMMUNICATIONS

TR01 Transfer of patent right