skip to main content
research-article

Horizontal Auto-Scaling for Multi-Access Edge Computing Using Safe Reinforcement Learning

Authors Info & Claims
Published:18 October 2021Publication History
Skip Abstract Section

Abstract

Multi-Access Edge Computing (MEC) has emerged as a promising new paradigm allowing low latency access to services deployed on edge servers to avert network latencies often encountered in accessing cloud services. A key component of the MEC environment is an auto-scaling policy which is used to decide the overall management and scaling of container instances corresponding to individual services deployed on MEC servers to cater to traffic fluctuations. In this work, we propose a Safe Reinforcement Learning (RL)-based auto-scaling policy agent that can efficiently adapt to traffic variations to ensure adherence to service specific latency requirements. We model the MEC environment using a Markov Decision Process (MDP). We demonstrate how latency requirements can be formally expressed in Linear Temporal Logic (LTL). The LTL specification acts as a guide to the policy agent to automatically learn auto-scaling decisions that maximize the probability of satisfying the LTL formula. We introduce a quantitative reward mechanism based on the LTL formula to tailor service specific latency requirements. We prove that our reward mechanism ensures convergence of standard Safe-RL approaches. We present experimental results in practical scenarios on a test-bed setup with real-world benchmark applications to show the effectiveness of our approach in comparison to other state-of-the-art methods in literature. Furthermore, we perform extensive simulated experiments to demonstrate the effectiveness of our approach in large scale scenarios.

REFERENCES

  1. [1] 2020. Existing Commercial Wireless Telecommunication Services Facilities in San Francisco: DataSF: City and County of San Francisco. (May 2020). https://data.sfgov.org/Geographic-Locations-and-Boundaries/Existing-Commercial-Wireless-Telecommunication-Ser/aa26-h926.Google ScholarGoogle Scholar
  2. [2] Alshiekh Mohammed, Bloem Roderick, Ehlers Rüdiger, Könighofer Bettina, Niekum Scott, and Topcu Ufuk. 2018. Safe reinforcement learning via shielding. In Proceedings of the AAAI Conference on Artificial Intelligence. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Apostolopoulos Pavlos Athanasios, Tsiropoulou Eirini Eleni, and Papavassiliou Symeon. 2020. Risk-aware data offloading in multi-server multi-access edge computing environment. IEEE/ACM Transactions on Networking 28, 3 (2020), 14051418.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Asheralieva Alia and Niyato Dusit. 2019. Hierarchical game-theoretic and reinforcement learning framework for computational offloading in UAV-enabled mobile edge computing networks with multiple service providers. IEEE Internet of Things Journal 6, 5 (2019), 87538769.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Baier Christel and Katoen Joost-Pieter. 2008. Principles of Model Checking. The MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Bertsekas D. and Tsitsiklis J.. 2008. Introduction to probability, ser. Athena Scientific Optimization and Computation Series. Athena Scientific.Google ScholarGoogle Scholar
  7. [7] Bochkovskiy Alexey, Wang Chien-Yao, and Liao Hong-Yuan Mark. 2020. YOLOv4: Optimal Speed and Accuracy of Object Detection. (2020). arXiv:cs.CV/2004.10934. Retrieved from https://arxiv.org/abs/2004.10934.Google ScholarGoogle Scholar
  8. [8] Bozkurt Alper Kamil, Wang Yu, Zavlanos Michael M., and Pajic Miroslav. 2020. Control synthesis from linear temporal logic specifications using model-free reinforcement learning. In Proceedings of the 2020 IEEE International Conference on Robotics and Automation. IEEE, 1034910355.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Chen W., Wang D., and Li K.. 2019. Multi-user multi-task computation offloading in green mobile edge cloud computing. IEEE Transactions on Services Computing 12, 5 (2019), 726738.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Chen Xu, Jiao Lei, Li Wenzhong, and Fu Xiaoming. 2015. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking 24, 5 (2015), 27952808. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Cui Guangming, He Qiang, Chen Feifei, Jin Hai, and Yang Yun. 2020. Trading off between user coverage and network robustness for edge server placement. IEEE Transactions on Cloud Computing (2020).Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Dehury Chinmaya Kumar and Srirama Satish Narayana. 2020. An efficient service dispersal mechanism for fog and cloud computing using deep reinforcement learning. In Proceedings of the 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing. IEEE, 589598.Google ScholarGoogle Scholar
  13. [13] Dinh Thinh Quang, La Quang Duy, Quek Tony QS, and Shin Hyundong. 2018. Learning for computation offloading in mobile edge computing. IEEE Transactions on Communications 66, 12 (2018), 63536367.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Docker. 2020. Docker Hub Retrieved from https://hub.docker.com/.Google ScholarGoogle Scholar
  15. [15] Evangelidis Alexandros, Parker David, and Bahsoon Rami. 2018. Performance modelling and verification of cloud-based auto-scaling policies. Future Generation Computer Systems 87 (2018), 629638.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Farhadi Vajiheh, Mehmeti Fidan, He Ting, Porta Tom La, Khamfroush Hana, Wang Shiqiang, and Chan Kevin S.. 2019. Service placement and request scheduling for data-intensive applications in edge clouds. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 12791287.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Fernando Niroshinie, Loke Seng W., and Rahayu Wenny. 2013. Mobile cloud computing: A survey. Future Generation Computer Systems 29, 1 (2013), 84106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Gan Yu, Zhang Yanqi, Cheng Dailun, Shetty Ankitha, Rathi Priyal, Katarki Nayan, Bruno Ariana, Hu Justin, Ritchken Brian, Jackson Brendon, et al. 2019. An open-source benchmark suite for microservices and their hardware-software implications for cloud and edge systems. In Proceedings of the 24th International Conference on Architectural Support for Programming Languages and Operating Systems. 318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Gan Yu, Zhang Yanqi, Hu Kelvin, Cheng Dailun, He Yuan, Pancholi Meghna, and Delimitrou Christina. 2019. Leveraging deep learning to improve performance predictability in cloud microservices with seer. ACM SIGOPS Operating Systems Review 53, 1 (2019), 3439. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Gan Yu, Zhang Yanqi, Hu Kelvin, Cheng Dailun, He Yuan, Pancholi Meghna, and Delimitrou Christina. 2019. Seer: Leveraging big data to navigate the complexity of performance debugging in cloud microservices. In Proceedings of the T24th International Conference on Architectural Support for Programming Languages and Operating Systems. 1933. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Hasanbeig Mohammadhosein, Abate Alessandro, and Kroening Daniel. 2020. Cautious reinforcement learning with logical constraints. In Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS. 483491. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] He Hao, Hu Jiang, and Silva Dilma Da. 2017. Enhancing datacenter resource management through temporal logic constraints. In Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium. IEEE, 133142.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] He Qiang, Cui Guangming, Zhang Xuyun, Chen Feifei, Deng Shuiguang, Jin Hai, Li Yanhui, and Yang Yun. 2019. A game-theoretical approach for user allocation in edge computing environment. IEEE Transactions on Parallel and Distributed Systems 31, 3 (2019), 515529.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Hu Junyan, Li Kenli, Liu Chubo, and Li Keqin. 2020. Game-based task offloading of multiple mobile devices with QoS in mobile edge computing systems of limited computation capacity. ACM Transactions on Embedded Computing Systems 19, 4, Article 29 (July 2020), 21 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Huang Liang, Bi Suzhi, and Zhang Ying-Jun Angela. 2019. Deep reinforcement learning for online computation offloading in wireless powered mobile-edge computing networks. IEEE Transactions on Mobile Computing 19, 11 (2019), 25812593.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Huang Xin-Lin, Ma Xiaomin, and Hu Fei. 2018. Machine learning and intelligent communications. Mobile Networks and Applications 23, 1 (2018), 6870. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Lai Phu, He Qiang, Abdelrazek Mohamed, Chen Feifei, Hosking John, Grundy John, and Yang Yun. 2018. Optimal edge user allocation in edge computing with variable sized vector bin packing. In Proceedings of the International Conference on Service-Oriented Computing. Springer, 230245.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Lai Phu, He Qiang, Grundy John, Chen Feifei, Abdelrazek Mohamed, Hosking John G., and Yang Yun. 2020. Cost-effective app user allocation in an edge computing environment. IEEE Transactions on Cloud Computing (2020).Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Li Keqin. 2021. Heuristic computation offloading algorithms for mobile users in fog computing. ACM Transactions on Embedded Computing Systems 20, 2 (2021), 128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Li Zijun, Chen Quan, Xue Shuai, Ma Tao, Yang Yong, Song Zhuo, and Guo Minyi. 2020. Amoeba: QoS-awareness and reduced resource usage of microservices with serverless computing. In Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium. IEEE, 399408.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Mahmoudi Nima, Lin Changyuan, Khazaei Hamzeh, and Litoiu Marin. 2019. Optimizing serverless computing: Introducing an adaptive function placement algorithm. In Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering. 203213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Naskos Athanasios, Stachtiari Emmanouela, Gounaris Anastasios, Katsaros Panagiotis, Tsoumakos Dimitrios, Konstantinou Ioannis, and Sioutas Spyros. 2015. Dependable horizontal scaling based on probabilistic model checking. In Proceedings of the 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE, 3140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Neto José Leal D., Yu Se-Young, Macedo Daniel F., Nogueira José Marcos S., Langar Rami, and Secci Stefano. 2018. ULOOF: A user level online offloading framework for mobile edge computing. IEEE Transactions on Mobile Computing 17, 11 (2018), 26602674.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Ouyang Tao, Li Rui, Chen Xu, Zhou Zhi, and Tang Xin. 2019. Adaptive user-managed service placement for mobile edge computing: An online learning approach. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 14681476.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Pasteris Stephen, Wang Shiqiang, Herbster Mark, and He Ting. 2019. Service placement with provable guarantees in heterogeneous edge computing systems. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 514522.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Peng Qinglan, Xia Yunni, Feng Zeng, Lee Jia, Wu Chunrong, Luo Xin, Zheng Wanbo, Pang Shanchen, Liu Hui, Qin Yidan, et al. 2019. Mobility-aware and migration-enabled online edge user allocation in mobile edge computing. In Proceedings of the 2019 IEEE International Conference on Web Services. IEEE, 9198.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Poularakis K., Llorca J., Tulino A. M., Taylor I., and Tassiulas L.. 2020. Service placement and request routing in MEC networks with storage, computation, and communication constraints. IEEE/ACM Transactions on Networking 28, 3 (2020), 10471060.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Rossi Fabiana, Nardelli Matteo, and Cardellini Valeria. 2019. Horizontal and vertical scaling of container-based applications using reinforcement learning. In Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing. IEEE, 329338.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Sadigh Dorsa, Kim Eric S., Coogan Samuel, Sastry S. Shankar, and Seshia Sanjit A.. 2014. A learning based approach to control synthesis of markov decision processes for linear temporal logic specifications. In Proceedings of the 53rd IEEE Conference on Decision and Control. IEEE, 10911096.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Shi Weisong, Cao Jie, Zhang Quan, Li Youhuizi, and Xu Lanyu. 2016. Edge computing: Vision and challenges. IEEE Internet of Things 3, 5 (2016), 637646.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Sutton Richard S. and Barto Andrew G.. 2018. Reinforcement Learning: An Introduction. The MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Wang Luping, Weng Qizhen, Wang Wei, Chen Chen, and Li Bo. 2020. Metis: Learning to schedule long-running applications in shared container clusters at scale. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Wang Shiqiang, Urgaonkar Rahul, Zafer Murtaza, He Ting, Chan Kevin, and Leung Kin K.. 2019. Dynamic service migration in mobile edge computing based on markov decision process. IEEE/ACM Transactions on Networking 27, 3 (2019), 12721288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Wu Yulei. 2020. Cloud-edge orchestration for the internet-of-things: Architecture and ai-powered data processing. IEEE Internet of Things Journal 8, 16 (2020), 1279212805.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Xia Xiaoyu, Chen Feifei, Grundy John, Abdelrazek Mohamed, Jin Hai, and He Qiang. 2021. Constrained app data caching over edge server graphs in edge computing environment. IEEE Transactions on Services Computing (2021).Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Xia Xiaoyu, Chen Feifei, He Qiang, Grundy John, Abdelrazek Mohamed, and Jin Hai. 2020. Online collaborative data caching in edge computing. IEEE Transactions on Parallel and Distributed Systems 32, 2 (2020), 281294.Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Xu Jie, Chen Lixing, and Ren Shaolei. 2017. Online learning for offloading and autoscaling in energy harvesting mobile edge computing. IEEE Transactions on Cognitive Communications and Networking 3, 3 (2017), 361373.Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Xu Jie, Chen Lixing, and Zhou Pan. 2018. Joint service caching and task offloading for mobile edge computing in dense networks. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 207215.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Xu Siya, Liu Qingchuan, Gong Bei, Qi Feng, Guo Shaoyong, Qiu Xuesong, and Yang Chao. 2020. RJCC: Reinforcement-learning-based joint communicational-and-computational resource allocation mechanism for smart city IoT. IEEE Internet of Things Journal 7, 9 (2020), 80598076.Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Yang Shi. 2020. A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks. Computer Communications 160 (2020), 759768.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] You Changsheng, Huang Kaibin, Chae Hyukjin, and Kim Byoung-Hoon. 2016. Energy-efficient resource allocation for mobile-edge computation offloading. IEEE Transactions on Wireless Communications 16, 3 (2016), 13971411.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Horizontal Auto-Scaling for Multi-Access Edge Computing Using Safe Reinforcement Learning

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Embedded Computing Systems
          ACM Transactions on Embedded Computing Systems  Volume 20, Issue 6
          November 2021
          256 pages
          ISSN:1539-9087
          EISSN:1558-3465
          DOI:10.1145/3485150
          • Editor:
          • Tulika Mitra
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 October 2021
          • Accepted: 1 July 2021
          • Revised: 1 May 2021
          • Received: 1 December 2020
          Published in tecs Volume 20, Issue 6

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format