A Constrained Reinforcement Learning Based Approach for Network Slicing

With the proliferation of mobile networks, we face strong diversification of services, demanding the current network to embed more flexibility. To satisfy this daring need, network slicing is embraced as a promising solution for resource utilization, in 5G and future networks. In network slicing, dynamic resource orchestration and network slice management are critical for resource efficiency. However, it is highly complicated such that the traditional approaches can not effectively perform resource orchestration due to the lack of accurate models and hidden problem structures. To address this challenge, we propose a constrained reinforcement learning based approach for network slicing. We formulate the resource allocation problem as a Constrained Markov Decision Process (CMDP) and solve it using constrained reinforcement learning algorithms. Specifically, we use the adaptive interior-point policy optimization and policy safety layer methods to deal with cumulative and instantaneous constraints. Our evaluations show that our method is effective in resource allocation with service demand guarantees and significantly outperforms baselines.

[1]  Zhitang Chen,et al.  A Collaborative Learning Based Approach for Parameter Configuration of Cellular Networks , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[2]  Alec Radford,et al.  Proximal Policy Optimization Algorithms , 2017, ArXiv.

[3]  Vincenzo Sciancalepore,et al.  On Guaranteeing End-to-End Network Slice Latency Constraints in 5G Networks , 2018, 2018 15th International Symposium on Wireless Communication Systems (ISWCS).

[4]  Hao Chen,et al.  Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks , 2018, GameSec.

[5]  Pradeep Varakantham,et al.  Resource Constrained Deep Reinforcement Learning , 2018, ICAPS.

[6]  Sergey Levine,et al.  Trust Region Policy Optimization , 2015, ICML.

[7]  Xianfu Chen,et al.  Deep Reinforcement Learning for Resource Management in Network Slicing , 2018, IEEE Access.

[8]  Marco Gramaglia,et al.  Optimising 5G infrastructure markets: The business of network slicing , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[9]  Yuval Tassa,et al.  Safe Exploration in Continuous Action Spaces , 2018, ArXiv.

[10]  Yongshuai Liu,et al.  IPO: Interior-point Policy Optimization under Constraints , 2019, AAAI.

[11]  Li Lu,et al.  Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics , 2015, IEEE Transactions on Computational Social Systems.

[12]  Mehdi Bennis,et al.  Optimized Computation Offloading Performance in Virtual Edge Computing Systems Via Deep Reinforcement Learning , 2018, IEEE Internet of Things Journal.

[13]  Konstantinos Poularakis,et al.  MACS: Deep Reinforcement Learning based SDN Controller Synchronization Policy Design , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).