skip to main content
10.1145/3580305.3599358acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Free Access

GAL-VNE: Solving the VNE Problem with Global Reinforcement Learning and Local One-Shot Neural Prediction

Published:04 August 2023Publication History

ABSTRACT

The NP-hard combinatorial Virtual Network Embedding (VNE) Problem refers to finding the node and edge mapping between a virtual net (request) and the physical net (resource). Learning-based methods are recently devised beyond traditional heuristic solvers. However, the efficiency and scalability hinder its applicability as reinforcement learning (RL) is often adopted in an auto-regressive node-by-node mapping manner to handle complex mapping constraints, for each coming request for mapping. Moreover, existing learning-based works often independently consider each online request, limiting the long-term online service performance. In this paper, we present a synergistic Global-And-Local learning approach for the VNE problem (GAL-VNE). At the global level across requests, RL is employed to capture the cross-request relation for better global resource accommodation to improve overall performance. At the local level within each request, we aim to replace the sequential decision-making procedure which relies much on the network size, with a more efficient one-shot solution generation scheme. The main challenge for such a one-shot model is how to encode the constraints under an end-to-end learning and inference paradigm. Accordingly, within the "rank-then-search" paradigm, we propose to first pretrain a graph neural network (GNN)-based node ranker with imitation supervision from an off-the-shelf solver (moderately expensive yet high quality), which is meanwhile regularized by a neighboring smooth prior. Then RL is used to finetune the GNN ranker whose supervision directly refers to the final (undifferentiable) business objectives concerning revenue and cost, etc. Experiments on benchmarks show that our method outperforms classic and learning-based methods in both efficacy and efficiency.

Skip Supplemental Material Section

Supplemental Material

rtfp127-2min-promo.mp4

mp4

38.7 MB

References

  1. Thomas Anderson, Larry Peterson, Scott Shenker, and Jonathan Turner. 2005. Overcoming the Internet impasse through virtualization. Computer, Vol. 38, 4 (2005), 34--41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Irwan Bello, Hieu Pham, Quoc V Le, Mohammad Norouzi, and Samy Bengio. 2016. Neural combinatorial optimization with reinforcement learning. arXiv preprint arXiv:1611.09940 (2016).Google ScholarGoogle Scholar
  3. Yoshua Bengio, Andrea Lodi, and Antoine Prouvost. 2021. Machine learning for combinatorial optimization: a methodological tour d'horizon. European Journal of Operational Research, Vol. 290, 2 (2021), 405--421.Google ScholarGoogle ScholarCross RefCross Ref
  4. Garrett Birkhoff. 1946. Tres observaciones sobre el algebra lineal. Univ. Nac. Tucuman, Ser. A, Vol. 5 (1946), 147--154.Google ScholarGoogle Scholar
  5. Andreas Blenk, Patrick Kalmbach, Johannes Zerwas, Michael Jarschel, Stefan Schmid, and Wolfgang Kellerer. 2018. NeuroViNE: A neural preprocessor for your virtual network embedding algorithm. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 405--413.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Juan Felipe Botero, Xavier Hesselbach, Michael Duelli, Daniel Schlosser, Andreas Fischer, and Hermann De Meer. 2012. Energy efficient virtual network embedding. IEEE Communications Letters, Vol. 16, 5 (2012), 756--759.Google ScholarGoogle ScholarCross RefCross Ref
  7. Xavier Bresson and Thomas Laurent. 2021. The transformer network for the traveling salesman problem. arXiv preprint arXiv:2103.03012 (2021).Google ScholarGoogle Scholar
  8. Chen Cai and Yusu Wang. 2020. A note on over-smoothing for graph neural networks. arXiv preprint arXiv:2006.13318 (2020).Google ScholarGoogle Scholar
  9. Haotong Cao, Shengchen Wu, Yue Hu, Yun Liu, and Longxiang Yang. 2019. A survey of embedding algorithm for virtual network embedding. China Communications, Vol. 16, 12 (2019), 1--33.Google ScholarGoogle ScholarCross RefCross Ref
  10. R. Chen, X. Lv, Y. Li, J. Ye, J. Hao, and J. Yan. 2022. The Policy-gradient Placement and Generative Routing Neural Networks for Chip Design. In Neural Information Processing Systems (NeurIPS).Google ScholarGoogle Scholar
  11. Xiang Cheng, Sen Su, Zhongbao Zhang, Hanchi Wang, Fangchun Yang, Yan Luo, and Jie Wang. 2011. Virtual network embedding through topology-aware node ranking. ACM SIGCOMM Computer Communication Review, Vol. 41, 2 (2011), 38--47.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Mosharaf Chowdhury, Muntasir Raihan Rahman, and Raouf Boutaba. 2011. Vineyard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Transactions on networking, Vol. 20, 1 (2011), 206--219.Google ScholarGoogle Scholar
  13. Marco Cuturi, Olivier Teboul, and Jean-Philippe Vert. 2019. Differentiable ranking and sorting using optimal transport. Neural Information Processing Systems (NeurIPS), Vol. 32 (2019).Google ScholarGoogle Scholar
  14. Lu Duan, Haoyuan Hu, Yu Qian, Yu Gong, Xiaodong Zhang, Yinghui Xu, and Jiangwen Wei. 2018. A multi-task selected learning approach for solving 3d flexible bin packing problem. arXiv preprint arXiv:1804.06896 (2018).Google ScholarGoogle Scholar
  15. Ilhem Fajjari, Nadjib Aitsaadi, Guy Pujolle, and Hubert Zimmermann. 2011. VNE-AC: Virtual network embedding algorithm based on ant colony metaheuristic. In ICC.Google ScholarGoogle Scholar
  16. Nick Feamster, Lixin Gao, and Jennifer Rexford. 2007. How to lease the Internet in your spare time. ACM SIGCOMM Computer Communication Review, Vol. 37, 1 (2007), 61--64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Matthias Fey and Jan E. Lenssen. 2019. Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds.Google ScholarGoogle Scholar
  18. Long Gong, Yonggang Wen, Zuqing Zhu, and Tony Lee. 2014. Toward profit-seeking virtual network embedding algorithm via global resource capacity. In INFOCOM. 1--9.Google ScholarGoogle Scholar
  19. Farzad Habibi, Mahdi Dolati, Ahmad Khonsari, and Majid Ghaderi. 2020. Accelerating virtual network embedding with graph neural networks. In 2020 16th International Conference on Network and Service Management (CNSM). IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  20. Soroush Haeri and Ljiljana Trajković. 2016. VNE-Sim: a virtual network embedding simulator. In Proceedings of the 9th EAI International Conference on Simulation Tools and Techniques. 112--117.Google ScholarGoogle Scholar
  21. Soroush Haeri and Ljiljana Trajković. 2017. Virtual network embedding via Monte Carlo tree search. IEEE transactions on cybernetics, Vol. 48, 2 (2017), 510--521.Google ScholarGoogle Scholar
  22. Aric Hagberg, Pieter Swart, and Daniel S Chult. 2008. Exploring network structure, dynamics, and function using NetworkX. Technical Report. Los Alamos National Lab.(LANL), Los Alamos, NM (United States).Google ScholarGoogle Scholar
  23. William L Hamilton, Rex Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. In Neural Information Processing Systems (NIPS). 1025--1035.Google ScholarGoogle Scholar
  24. Chuan He, Cong Wang, Yi-Xin Zhong, and Rui-Fan Li. 2008. A survey on learning to rank. In 2008 International Conference on Machine Learning and Cybernetics, Vol. 3. Ieee, 1734--1739.Google ScholarGoogle Scholar
  25. Ines Houidi, Wajdi Louati, Walid Ben Ameur, and Djamal Zeghlache. 2011. Virtual network provisioning across multiple substrate networks. Computer Networks, Vol. 55, 4 (2011), 1011--1023.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Haoyuan Hu, Xiaodong Zhang, Xiaowei Yan, Longfei Wang, and Yinghui Xu. 2017. Solving a new 3d bin packing problem with deep reinforcement learning method. arXiv preprint arXiv:1708.05930 (2017).Google ScholarGoogle Scholar
  27. Eric Jang, Shixiang Gu, and Ben Poole. 2017. Categorical Reparametrization with Gumble-Softmax. In International Conference on Learning Representations (ICLR 2017). OpenReview. net.Google ScholarGoogle Scholar
  28. Elias Khalil, Hanjun Dai, Yuyu Zhang, Bistra Dilkina, and Le Song. 2017. Learning combinatorial optimization algorithms over graphs. In Neural Information Processing Systems (NeurIPS). 6351--6361.Google ScholarGoogle Scholar
  29. Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. In International Conference on Learning Representations (ICLR).Google ScholarGoogle Scholar
  30. Wouter Kool, Herke van Hoof, and Max Welling. 2019. Attention, Learn to Solve Routing Problems!. In International Conference on Learning Representations (ICLR).Google ScholarGoogle Scholar
  31. Meng Li and MeiLian Lu. 2021. A Virtual Network Embedding Algorithm Based On Double-Layer Reinforcement Learning. Comput. J., Vol. 64, 6 (2021), 973--989.Google ScholarGoogle ScholarCross RefCross Ref
  32. Yang Li, Xinyan Chen, Wenxuan Guo, Xijun Li, Wanqian Luo, Junhua Huang, Hui-Ling Zhen, Mingxuan Yuan, and Junchi Yan. 2023. HardSATGEN: Understanding the Difficulty of Hard SAT Formula Generation and A Strong Structure-Hardness-Aware Baseline. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD).Google ScholarGoogle Scholar
  33. Jens Lischka and Holger Karl. 2009. A virtual network mapping algorithm based on subgraph isomorphism detection. In Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures. 81--88.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. C. Liu, Z. Jiang, R. Wang, L. Huang, P. Lu, and J. Yan. 2023. Revocable Deep Reinforcement Learning with Affinity Regularization for Outlier-Robust Graph Matching. In International Conference on Learning Representations (ICLR).Google ScholarGoogle Scholar
  35. Han Lu, Zenan Li, Runzhong Wang, Qibing Ren, Xijun Li, Mingxuan Yuan, Jia Zeng, Xiaokang Yang, and Junchi Yan. 2023. ROCO: A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs. In International Conference on Learning Representations (ICLR).Google ScholarGoogle Scholar
  36. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. 2019. Pytorch: An imperative style, high-performance deep learning library. Neural Information Processing Systems (NeurIPS), Vol. 32 (2019).Google ScholarGoogle Scholar
  37. Laurent Perron and Vincent Furnon. 2022-11-25. OR-Tools. Google. https://developers.google.com/optimization/Google ScholarGoogle Scholar
  38. Steffen Rendle. 2010. Factorization machines. In Proceedings of the International Conference on Data Mining (ICDM). IEEE, 995--1000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Michal Rolínek, Paul Swoboda, Dominik Zietlow, Anselm Paulus, Vít Musil, and Georg Martius. 2020. Deep Graph Matching via Blackbox Differentiation of Combinatorial Solvers. In ECCV. Springer, 407--424.Google ScholarGoogle Scholar
  40. Matthias Rost and Stefan Schmid. 2020. On the hardness and inapproximability of virtual network embeddings. IEEE/ACM Transactions on Networking, Vol. 28, 2 (2020), 791--803.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017).Google ScholarGoogle Scholar
  42. Richard Sinkhorn. 1964. A relationship between arbitrary positive matrices and doubly stochastic matrices. The annals of mathematical statistics, Vol. 35, 2 (1964), 876--879.Google ScholarGoogle Scholar
  43. Sen Su, Zhongbao Zhang, Alex X Liu, Xiang Cheng, Yiwen Wang, and Xinchao Zhao. 2014. Energy-aware virtual network embedding. IEEE/ACM Transactions on Networking, Vol. 22, 5 (2014), 1607--1620.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Jonathan S Turner and David E Taylor. 2005. Diversifying the internet. In GLOBECOM'05. IEEE Global Telecommunications Conference, 2005., Vol. 2. IEEE, 6-pp.Google ScholarGoogle ScholarCross RefCross Ref
  45. Ihsan Ullah, Hyun-Kyo Lim, and Youn-Hee Han. 2021. Ego Network-based Virtual Network Embedding Scheme for Revenue Maximization. In ICAIIC. 155--160.Google ScholarGoogle Scholar
  46. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Neural Information Processing Systems (NIPS).Google ScholarGoogle Scholar
  47. Oriol Vinyals, Meire Fortunato, and Navdeep Jaitly. 2015. Pointer networks. Neural Information Processing Systems (NIPS), Vol. 28 (2015).Google ScholarGoogle Scholar
  48. R. Wang, L. Shen, Y. Chen, X. Yang, D. Tao, and J. Yan. 2023. Towards One-shot Neural Combinatorial Optimization Solvers: Theoretical and Empirical Notes on the Cardinality-Constrained Case. In International Conference on Learning Representations (ICLR).Google ScholarGoogle Scholar
  49. Runzhong Wang, Junchi Yan, and Xiaokang Yang. 2020. Combinatorial learning of robust deep graph matching: an embedding based approach. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) (2020).Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Runzhong Wang, Junchi Yan, and Xiaokang Yang. 2021b. Neural Graph Matching Network: Learning Lawler's Quadratic Assignment Problem with Extension to Hypergraph and Multiple-graph Matching. IEEE transactions on pattern analysis and machine intelligence (TPAMI) (2021).Google ScholarGoogle Scholar
  51. Tianfu Wang, Qilin Fan, Xiuhua Li, Xu Zhang, Qingyu Xiong, Shu Fu, and Min Gao. 2021a. Drl-sfcp: Adaptive service function chains placement with deep reinforcement learning. In ICC 2021-IEEE International Conference on Communications. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  52. Yansheng Wang, Yongxin Tong, Cheng Long, Pan Xu, Ke Xu, and Weifeng Lv. 2019. Adaptive dynamic bipartite graph matching: A reinforcement learning approach. In 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 1478--1489.Google ScholarGoogle ScholarCross RefCross Ref
  53. Bernard M Waxman. 1988. Routing of multipoint connections. IEEE journal on selected areas in communications, Vol. 6, 9 (1988), 1617--1622.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. J. Yan, S. Yang, and E. Hancock. 2020b. Learning Graph Matching and Related Combinatorial Optimization Problems. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI).Google ScholarGoogle Scholar
  55. Zhongxia Yan, Jingguo Ge, Yulei Wu, Liangxiong Li, and Tong Li. 2020a. Automatic virtual network embedding: A deep reinforcement learning approach with graph convolutional networks. IEEE Journal on Selected Areas in Communications, Vol. 38, 6 (2020), 1040--1057.Google ScholarGoogle ScholarCross RefCross Ref
  56. Haipeng Yao, Xu Chen, Maozhen Li, Peiying Zhang, and Luyao Wang. 2018. A novel reinforcement learning algorithm for virtual network embedding. Neurocomputing, Vol. 284 (2018), 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  57. Haipeng Yao, Sihan Ma, Jingjing Wang, Peiying Zhang, Chunxiao Jiang, and Song Guo. 2020. A continuous-decision virtual network embedding scheme relying on reinforcement learning. IEEE Transactions on Network and Service Management, Vol. 17, 2 (2020), 864--875.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Minlan Yu, Yung Yi, Jennifer Rexford, and Mung Chiang. 2008. Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Computer Communication Review, Vol. 38, 2 (2008), 17--29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Jiayi Zhang, Chang Liu, Xijun Li, Hui-Ling Zhen, Mingxuan Yuan, Yawen Li, and Junchi Yan. 2023. A survey for solving mixed integer programming via machine learning. Neurocomputing (2023).Google ScholarGoogle Scholar
  60. Peiying Zhang, Chao Wang, Chunxiao Jiang, Neeraj Kumar, and Qinghua Lu. 2021. Resource management and security scheme of ICPSs and IoT based on VNE algorithm. IEEE Internet of Things Journal (2021).Google ScholarGoogle Scholar
  61. Peiying Zhang, Chao Wang, Neeraj Kumar, Weishan Zhang, and Lei Liu. 2022. Dynamic virtual network embedding algorithm based on graph convolution neural network and reinforcement learning. IEEE Internet of Things Journal (2022).Google ScholarGoogle ScholarCross RefCross Ref
  62. Peiying Zhang, Haipeng Yao, and Yunjie Liu. 2017. Virtual network embedding based on computing, network, and storage resource constraints. IEEE Internet of Things Journal, Vol. 5, 5 (2017), 3298--3304.Google ScholarGoogle ScholarCross RefCross Ref
  63. Sheng Zhang, Zhuzhong Qian, Song Guo, and Sanglu Lu. 2011. FELL: A Flexible Virtual Network Embedding Algorithm with Guaranteed Load Balancing. In 2011 IEEE International Conference on Communications (ICC). 1--5. https://doi.org/10.1109/icc.2011.5962960Google ScholarGoogle Scholar
  64. Zhongbao Zhang, Xiang Cheng, Sen Su, Yiwen Wang, Kai Shuang, and Yan Luo. 2013. A unified enhanced particle swarm optimization-based virtual network embedding algorithm. International Journal of Communication Systems, Vol. 26, 8 (2013), 1054--1073.Google ScholarGoogle ScholarCross RefCross Ref
  65. Chenggui Zhao and Behrooz Parhami. 2019. Virtual network embedding through graph eigenspace alignment. IEEE Transactions on Network and Service Management, Vol. 16, 2 (2019), 632--646.Google ScholarGoogle ScholarCross RefCross Ref
  66. Guorui Zhou, Xiaoqiang Zhu, Chenru Song, Ying Fan, Han Zhu, Xiao Ma, Yanghui Yan, Junqi Jin, Han Li, and Kun Gai. 2018. Deep interest network for click-through rate prediction. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). 1059--1068.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. GAL-VNE: Solving the VNE Problem with Global Reinforcement Learning and Local One-Shot Neural Prediction

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
        August 2023
        5996 pages
        ISBN:9798400701030
        DOI:10.1145/3580305

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 August 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,133of8,635submissions,13%

        Upcoming Conference

        KDD '24
      • Article Metrics

        • Downloads (Last 12 months)362
        • Downloads (Last 6 weeks)43

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader