Spatio–Temporal Edge Service Placement: A Bandit Learning Approach

Shared edge computing platforms deployed at the radio access network are expected to significantly improve the quality-of-service delivered by application service providers (ASPs) in a flexible and economic way. However, placing edge service in every possible edge site by an ASP is practically infeasible due to the ASP’s prohibitive budget requirement. In this paper, we investigate the edge service placement problem of an ASP under a limited budget, where the ASP dynamically rents computing/storage resources in edge sites to host its applications in close proximity to end users. Since the benefit of placing edge service in a specific site is usually unknown to the ASP a priori, optimal placement decisions must be made while learning this benefit. We pose this problem as a novel combinatorial contextual bandit learning problem. It is “combinatorial” because only a limited number of edge sites can be rented to provide the edge service given the ASP’s budget. It is “contextual” because we utilize user context information to enable finer-grained learning and decision-making. To solve this problem and optimize the edge computing performance, we propose SEEN, a Spatial-temporal Edge sErvice placemeNt algorithm. Furthermore, SEEN is extended to scenarios with overlapping service coverage by incorporating a disjunctively constrained knapsack problem. In both cases, we prove that our algorithm achieves a sublinear regret bound when it is compared with an Oracle algorithm that knows the exact benefit information. Simulations are carried out on a real-world dataset, whose results show that SEEN significantly outperforms benchmark solutions.

[1]  Valentina Cacchiani,et al.  A Branch-and-Bound Algorithm for the Knapsack Problem with Conflict Graph , 2017, INFORMS J. Comput..

[2]  Jie Xu,et al.  Collaborative Service Caching for Edge Computing in Dense Small Cell Networks , 2017, ArXiv.

[3]  Bhaskar Krishnamachari,et al.  Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations , 2010, IEEE/ACM Transactions on Networking.

[4]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[5]  Nirwan Ansari,et al.  Workload Allocation in Hierarchical Cloudlet Networks , 2018, IEEE Communications Letters.

[6]  Aleksandrs Slivkins,et al.  Contextual Bandits with Similarity Information , 2009, COLT.

[7]  R. Agrawal Sample mean based index policies by O(log n) regret for the multi-armed bandit problem , 1995, Advances in Applied Probability.

[8]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[9]  Wei Chu,et al.  A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.

[10]  Berker Agir,et al.  A machine-learning based approach to privacy-aware information-sharing in mobile social networks , 2016, Pervasive Mob. Comput..

[11]  Mhand Hifi,et al.  An algorithm for the disjunctively constrained knapsack problem , 2012 .

[12]  Takeo Yamada,et al.  Heuristic and Exact Algorithms for the Disjunctively Constrained Knapsack Problem , 2002 .

[13]  Peter J. Bentley,et al.  Investigating Country Differences in Mobile App User Behavior and Challenges for Software Engineering , 2015, IEEE Transactions on Software Engineering.

[14]  Xiaoyan Zhu,et al.  Contextual Combinatorial Bandit and its Application on Diversified Online Recommendation , 2014, SDM.

[15]  Anja Klein,et al.  Context-Aware Proactive Content Caching With Service Differentiation in Wireless Networks , 2016, IEEE Transactions on Wireless Communications.

[16]  Mihaela van der Schaar,et al.  Distributed Online Learning via Cooperative Contextual Bandits , 2013, IEEE Transactions on Signal Processing.

[17]  T. L. Lai Andherbertrobbins Asymptotically Efficient Adaptive Allocation Rules , 2022 .

[18]  Jie Xu,et al.  Joint Service Caching and Task Offloading for Mobile Edge Computing in Dense Networks , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[19]  R. Agrawal,et al.  Multi-armed bandit problems with multiple plays and switching cost , 1990 .

[20]  Tristan Henderson,et al.  Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.

[21]  Qi Zhang,et al.  Dynamic Service Placement in Geographically Distributed Clouds , 2013, IEEE J. Sel. Areas Commun..

[22]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[23]  Tarik Taleb,et al.  Mobile Edge Computing Potential in Making Cities Smarter , 2017, IEEE Communications Magazine.

[24]  Shuai Li,et al.  Contextual Combinatorial Cascading Bandits , 2016, ICML.

[25]  Anind K. Dey,et al.  Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .

[26]  David Bernstein,et al.  Containers and Cloud: From LXC to Docker to Kubernetes , 2014, IEEE Cloud Computing.

[27]  Randy H. Katz,et al.  Dynamic Replica Placement for Scalable Content Delivery , 2002, IPTPS.

[28]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[29]  Shaolei Ren,et al.  Online Learning for Offloading and Autoscaling in Energy Harvesting Mobile Edge Computing , 2017, IEEE Transactions on Cognitive Communications and Networking.

[30]  Dusit Niyato,et al.  A Dynamic Offloading Algorithm for Mobile Computing , 2012, IEEE Transactions on Wireless Communications.

[31]  Claus Pahl,et al.  Containerization and the PaaS Cloud , 2015, IEEE Cloud Computing.

[32]  Alexandros G. Dimakis,et al.  FemtoCaching: Wireless Content Delivery Through Distributed Caching Helpers , 2013, IEEE Transactions on Information Theory.

[33]  J. Walrand,et al.  Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple plays-Part II: Markovian rewards , 1987 .

[34]  Khaled Ben Letaief,et al.  Delay-optimal computation task scheduling for mobile-edge computing systems , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[35]  Vikram Krishnamurthy,et al.  A Distributed Coalition Game Approach to Femto-Cloud Formation , 2019, IEEE Transactions on Cloud Computing.

[36]  Wei Chen,et al.  Combinatorial Multi-Armed Bandit: General Framework and Applications , 2013, ICML.

[37]  Xiaowei Yang,et al.  CloudCmp: comparing public cloud providers , 2010, IMC '10.

[38]  Jie Xu,et al.  Socially trusted collaborative edge computing in ultra dense networks , 2017, SEC.