DNFS-VNE: Deep Neuro Fuzzy System Driven Virtual Network Embedding
Abstract
By decoupling substrate resources, network virtualization (NV) is a promising solution for meeting diverse demands and ensuring differentiated quality of service (QoS). In particular, virtual network embedding (VNE) is a critical enabling technology that enhances the flexibility and scalability of network deployment by addressing the coupling of Internet processes and services. However, in the existing deep neural networks (DNNs)-based works, the black-box nature DNNs limits the analysis, development, and improvement of systems. For example, in the industrial Internet of Things (IIoT), there is a conflict between decision interpretability and the opacity of DNN-based methods. In recent times, interpretable deep learning (DL) represented by deep neuro fuzzy systems (DNFS) combined with fuzzy inference has shown promising interpretability to further exploit the hidden value in the data. Motivated by this, we propose a DNFS-based VNE algorithm that aims to provide an interpretable NV scheme. Specifically, data-driven convolutional neural networks (CNNs) are used as fuzzy implication operators to compute the embedding probabilities of candidate substrate nodes through entailment operations. And, the identified fuzzy rule patterns are cached into the weights by forward computation and gradient back-propagation (BP). Moreover, the fuzzy rule base is constructed based on Mamdani-type linguistic rules using linguistic labels. In addition, the DNFS-driven five-block structure-based policy network serves as the agent for deep reinforcement learning (DRL), which optimizes VNE decision-making through interaction with the environment. Finally, the effectiveness of evaluation indicators and fuzzy rules is verified by simulation experiments.
Index Terms:
Network Virtualization, Virtual Network Embedding, Industrial Internet of Things, Deep Neuro Fuzzy Systems, Interpretable AI, Deep Reinforcement LearningI Introduction
I-A Background and Motivation
Network virtualization (NV) is the primary solution to Internet rigidity through the slicing and decoupling of network functions, applications, and services [1, 2, 3]. Through virtual network embedding (VNE) technology, infrastructure providers (InPs) can supply multiple sets of network services (which are defined as virtual network requests, VNRs) for multiple sets of Internet service providers (ISPs) to satisfy the needs of the network in terms of plurality, diversification, personalization, and high quality of service (QoS) [4].
Deep learning (DL) techniques, represented by deep neural networks (DNNs), have been maturely applied to various fields and successfully solved various industrial problems [5, 6]. Up to now, the existing VNE algorithms are all based on artificial intelligence (AI) community methods, and all of them have also achieved good results [7]. However, due to their black-box nature, DNNs lack an interpretable exploration of data association, which limits the analysis and development of systems [8]. For example, in the Industrial Internet of Things (IIoT), although there are some advanced resource allocation methods [2], the need for interpretability of decisions is becoming increasingly prominent, which not only helps to improve the transparency and interpretability of the system but also enhances researchers’ trust in decisions, thereby optimizing resource utilization efficiency and reducing potential risks. The fuzzy system is a system that defines input, output, and state variables on fuzzy sets. It can mimic human comprehensive inference to deal with fuzzy information processing problems that are difficult to solve by conventional mathematical methods [9]. A comparison of the two is shown in Table I, and it can be found that each has advantages and disadvantages in the expression, storage, application, and acquisition of knowledge. Therefore, fuzzy neural networks (FNNs) combine fuzzy systems with DNNs, fully taking into account the complementary nature of the two, and show excellent results in dealing with large-scale fuzzy application problems [10]. This class of systems based on the hybrid approach of FNNs is called deep neuro fuzzy systems (DNFS), which combines logical reasoning, linguistic computation, and nonlinear dynamics, and has the capabilities of learning, association, recognition, adaptive and fuzzy information processing [11], etc. To elaborate the potential associations to further explore the hidden value in the data, DNFS is widely used in various scientific researches such as communications, transportation, healthcare, etc., and exhibits higher interpretability and better decision-making [12].
Comparison | Neural Networks | Fuzzy System |
---|---|---|
Basic Composition | Multiple neurons | Fuzzy rule |
Knowledge Acquisition | Samples, algorithm examples | Expert knowledge, logical reasoning |
Knowledge Representation | Distributed representation | Membership function |
Reasoning Mechanism | Learning function self-control, parallel computing, fast speed | Combination of fuzzy rules, heuristic search, slow speed |
Reasoning Operation | Superposition of neurons | Operation of membership function |
Adaptability | Learning by adjusting weights, high fault tolerance | Inductive learning, low fault tolerance |
Advantage | Self-organization, high fault tolerance and generalization ability | Can use expert experience, easy to understand, less calculation |
Disadvantages | Black-box model, difficult to understand, heavy calculation | Difficult to learn, increased fuzziness in the reasoning process |
Based on the above motivations, a DNFS-based VNE algorithm (DNFS-VNE) is proposed in this work to enhance the interpretability of the technique, clarify hidden patterns and associations, and facilitate system development. To our knowledge, this is one of the first explorations of the interpretability of the VNE algorithm using DNFS.
I-B Overview of Related Work
The VNE algorithms in the current researches mainly consist of two categories, namely heuristic strategies and AI-based strategies [13]. Among them, heuristic strategies employ numerical optimization algorithms such as mixed integer programming (MIP), dynamic programming, and so on [2]. AI-based strategies employ reinforcement learning (RL), deep reinforcement learning (DRL), and other AI algorithms with powerful nonlinear fitting capabilities to better model the mathematical problem, dynamic characterization, and decision optimization of complex physical environments [14].
I-B1 Heuristic Strategies
The most classical algorithm to rank the substrate nodes based on their network topology and resource attributes applying the Markov Random Walk model was proposed by Cheng et al. [15]. And, they presented such node topology-aware VNE algorithm: NodeRank-VNE. In addition, they used the shortest path algorithm and breadth-first search (BFS) for virtual network embedding, respectively. Another classic algorithm is the MIP-based VNE algorithm proposed by Chowdhury et al. [16]. In this algorithm, the VNE problem is formulated as MIP, and two VNE algorithms, D-ViNE and R-ViNE, are designed by using deterministic and randomized rounding by relaxing the integer constraints. It is worth noting that these studies aim to maximize acceptance rate and revenue of the VNE algorithm. Moreover, it is proved that VNE is a typical NP-hard optimization problem. Since previous works lacked consideration of storage resource constraints, and efficient utilization of storage resources can alleviate bandwidth consumption, one of our previous works [17] firstly proposed a VNE strategy based on 3D resource constraints of network, computing, and storage. Specifically, two heuristic VNE algorithms are designed based on the node map** strategy: NRM-VNE and RCR-VNE.
Although heuristic strategies provided an effective solution for the early VNEs, such strategies have been difficult to apply to today’s complex and variable substrate networks. Moreover, these static VNE algorithms assume that the VNR is known, which is impractical for time-varying service requests in networks. Moreover, the artificially customized embedding rules used limit the effectiveness of the strategy.
I-B2 AI-based Strategies
For the problem that traditional VNE algorithms following static mechanisms are difficult to adapt to dynamic substrate network environments and some RL-assisted VNE algorithms ignore the continuity of node embedding, Yao et al. [18] proposed an RL-based continuous decision-making VNE algorithm (CDRL). Specifically, this work converts the continuous node embedding process into a recurrent neural network (RNN)-based complex time-series problem and updates the parameters using a policy gradient algorithm. The final results demonstrate the superiority of CDRL in terms of evaluation metrics.
In previous works, RL and DL provide better decision-making and perception for VNE algorithms, respectively. In addition, the emerging DRL combines the advantages of both by extracting environmental features through the nonlinear fitting ability of DNNs and guiding algorithm optimization through the interaction of the agent with the environment and incorporating feedback from reward mechanisms [19]. Therefore, the DRL paradigm has been the mainstream means of VNE algorithms in recent years [20]. Aiming at the problem that the algorithm needs to detect complex dynamic environments and provide automatic embedding solutions time-varyingly during runtime, Yan et al. [4] proposed an automatic VNE algorithm combining GCN and DRL. The algorithm designs a multi-objective function and a parallel DRL architecture, and the results show that it has superior performance and robustness. To improve the resource utilization of vehicular fog computing networks, one of our previous works proposed a DRL-based VNE algorithm incorporating spectral graph theory [21]. Specifically, a four-layer policy network based on spectral graph convolution was designed to compute the embedding probability of the substrate nodes, and optimization was guided by formulated reward signals. In addition, to address the real-time, dynamic, and privacy issues of the substrate network, a VNE algorithm based on horizontal federated learning was proposed for the first time in our previous work [22]. Specifically, the server and the DRL model are respectively deployed in the global domain and the local domain. Among them, the global is responsible for aggregating and sharing parameters, and the local is responsible for focusing on local resource optimization, which significantly improves the algorithm efficiency while ensuring privacy.
Although AI-based VNE algorithms are a big step forward from heuristic algorithms in terms of algorithmic dynamics and performance, the black-box nature of these AI-strategy restricts the exploration of the interpretability of potential data associations of the VNE algorithms, which limits the improvement and development of the related systems. As a result, the VNE community awaits an attempt at interpretable algorithms.
I-C Contribution
To summarise, the innovations and contributions of this work are as follows:
1. Targeting research on multi-domain substrate networks, based on the DNFS paradigm, we propose the DNFS-VNE structure with five blocks. Specifically, we employ a DL model based on convolutional neural networks (CNNs) as a data-driven fuzzy implication operator for entailment operations. Further, based on the policy gradient algorithm, the DNFS-driven five-block structure acts as the agent for DRL to optimize decision-making by interacting with the environment.
2. DNFS-VNE outputs inferred membership values, which are then aggregated and defuzzified to derive the embedding probabilities of substrate nodes. Furthermore, the identified fuzzy rule patterns are cached into weights by forward computation and gradient back-propagation. And, the fuzzy rule base is constructed by Mamdani-type linguistic rules between the antecedent layer and the consequent layer of the CNN-based fuzzy rule implication branch, using a set of linguistic labels to elucidate fuzzy implication principles.
3. Experiment verification demonstrates that DNFS-VNE outperforms other algorithms in terms of long-term average revenue, long-term average revenue-cost ratio, and VNR acceptance success rate, all of which are widely employed in VNE. More importantly, DNFS-VNE provides an interpretable solution to the previous black-box model of the VNE.
The content of this work is organized as follows: in Section II, the problem definition, problem modeling, DNFS paradigm, and related indicators have been presented; in Section III, the model details have been introduced, including model composition and learning process; in Section IV, we have performed simulation experimental verification and analysis; Finally, in Section V, we have summarised and looked forward this work.
II Problem Definition and Modelling
As mentioned earlier, the main goal of VNE is to efficiently decouple substrate network resources for allocation to different VNRs. In terms of quantitative indicators, the main purpose of VNE is to improve the algorithm acceptance rate and revenue and reduce cost.
II-A Problem Definition
![Refer to caption](x1.png)
A schematic diagram of the VNE process in which two users’ VNRs are embedded into the substrate network is shown in Fig. 1. From the figure, it can be found that for the ISP, when a user makes a service request, it creates VNRs that satisfy the corresponding demand (e.g., the numbers in the figure). For the InP, under the premise of the limited substrate network resources, it should respond to as many requests as possible and as reasonably as possible when a stable network flow sends service requests. Therefore, the VNE problem is defined as a problem of how to allocate the limited substrate network resources to VNRs more efficiently and reasonably. In addition, the VNE problem is obviously an NP-hard problem [23, 21]. Therefore, many researchers are constantly trying novel solutions, exploring and figuring out.
II-B Problem Modelling
Network | Notation | Definition |
---|---|---|
Substrate Network | Substrate nodes | |
Intra-domain substrate links | ||
Inter-domain substrate links | ||
Resource of substrate nodes | ||
Resource of substrate links | ||
Virtual Network Request | Virtual nodes | |
Virtual links | ||
Resource of virtual nodes | ||
Resource of virtual links |
Targeting research on widely used multi-domain substrate networks, to study the VNE problem, it is necessary to model the network to clarify the process of the problem. Specifically, the related notations definition used in this work is displayed in Table II. Among them, both the substrate network and the -th VNR are modeled as weighted undirected graphs, as follows,
(1) | ||||
(2) |
Furthermore, similar to previous works, we use computing (denoted as ) resources as an example to represent node resource attributes and bandwidth (denoted as ) resources as an example to represent link resource attributes.
Therefore, as analyzed above, the VNE problem can be modeled abstractly as follows,
(3) |
where indicates the number of VNRs, indicates the subset of the substrate network, indicates the -th VNR, and and indicate the start time and end time of the life cycle, respectively. To sum up, in other words, the VNE process is to effectively allocate part of the substrate network equipment and resources to each VNR within its life cycle to meet the corresponding network service requirements.
![Refer to caption](x2.png)
It should be noted that in multi-layer nested virtualization scenarios since the lowest-level network resources are physical, the substrate network resources may also be virtual. However, its resource allocation can be easily derived from the general scenario, so these cases are not considered in this work. In addition, the substrate network resource can be hosted in multiple virtual networks as long as sufficient resources can be allocated and related constraints are met. It can be found that the correspondence between substrate nodes and virtual nodes is , as shown in Case in Fig. 2. Moreover, a virtual link map** may span multiple substrate links, so the correspondence between substrate links and virtual links is , as shown in Case in Fig. 2.
II-C DNFS Paradigm
![Refer to caption](x3.png)
The most studied and most applied solution in the existing work is to customize DNFS as a five-layer feed-forward network structure. The specific structure is shown in Fig. 3, where each layer is,
-
•
Layer : Input layer. The number of nodes is the number of input variables;
-
•
Layer : Fuzzification layer. It is the membership function layer of the input variables to realize the fuzzy of the input variables. For example, the size of fuzzy sets for and are and , respectively;
-
•
Layer : Fuzzy rule layer. Each node in this layer is only connected to a unique node in each fuzzy set. The number of nodes in this layer is the number of fuzzy rules. For example, there are nodes;
-
•
Layer : Defuzzification layer. This layer is fully connected and the number of nodes is the number of fuzzy divisions of the output variable;
-
•
Layer : Output layer, also known as the clarity layer. This layer is a fully connected layer whose number of nodes is the number of output variables.
Therefore, DNFS essentially uses the learning method of DNNs to automatically design and adjust the design parameters of the fuzzy system according to the input and output learning samples, to realize the self-learning and self-adaptive functions of the fuzzy system.
II-D General Evaluation Indicators
As mentioned earlier, improving the algorithm acceptance rate and revenue and reducing cost are the optimization goals of the VNE algorithm [23, 24]. That is, more resource allocation revenue is obtained with less substrate network resource cost. Therefore, the following equations are used to intuitively measure cost and revenue for ,
(4) | |||
(5) |
where Eq. 4 and Eq. 5 denote the resource cost and revenue required for -th VNR embedding, respectively. , where indicates the number of virtual nodes in -th VNR. , where indicates the number of virtual links in -th VNR. It should be noted that denotes the path hops of this virtual link in the substrate network. This is mainly due to the fact that the virtual link may span multiple substrate links, and thus its required link resource is equal to the sum of all substrate link resources on the path. In addition, it is important to note that only the successful response of the current VNR produces costs and revenues.
Moreover, this work adopts evaluation indicators widely used by VNE: long-term average revenue, long-term average revenue-cost ratio, and VNR acceptance success rate, as shown in Eq. 6, Eq. 7, and Eq. 8, respectively. Among them, the long-term average revenue is expressed as the integral ratio of the revenue to time of all VNRs. The long-run average revenue-cost ratio is expressed as the integral ratio of revenue to cost of all VNRs. The VNR acceptance success rate is expressed as the integral ratio of successfully accepted VNRs to all VNRs. In addition, according to the expression of the equations, it is known that the performance of the algorithm can be reflected by the change of the evaluation indicator, and the larger its value, the better the performance.
(6) | |||
(7) | |||
(8) | |||
(9) | |||
(10) | |||
(11) |
where represents the number of successfully accepted VNRs, represents the number of all VNRs, and is a collective term for and .
III Algorithm Design of DNFS-VNE
Entailment is the core of the fuzzy system, which implies the logical cause-and-effect relationship, expressing reasoning or deductive logic [25]. In traditional fuzzy systems, entailment is realized by fuzzy implication operators, such as Min operator, Max operator, and so on [26]. It is realized in the form of an affirmative antecedent argument, as follows,
(12) |
It should be noted that assuming that is a subset of , the fuzzy implication operator calculates the membership value of , and the fuzzy rules infer according to , where is a subset of . However, for elements that are not in the subset of , it often leads to poor triggering effects of fuzzy rules. Therefore, this traditional fuzzy system is highly dependent on empirical knowledge, which requires training data and fuzzy rules to sufficiently cover possible test scenarios, that is, the reasoning space is required to be large enough. However, this situation is impractical for complex network environments.
Based on the inspiration of DNFS, in order to achieve self-learning, self-adaptation, self-reasoning, etc., of the VNE algorithms, this work aims to use classical DL-model convolutional neural networks (CNNs) to implement the fuzzy implication operator of the traditional fuzzy system and thus realize the implication operation. It is worth stating that its output will be the membership value of the fuzzy set of the subsequent defuzzification layer.
III-A Model Composition
![Refer to caption](x4.png)
Based on the general paradigm of DNFS shown in Fig. 3, the policy network diagram of the proposed DNFS-VNE algorithm is shown in Fig. 4. Specifically, it also contains five blocks, which are the input block, fuzzification block, fuzzy rule block, defuzzification block, and output block. The specific details of each block are as follows:
III-A1 Input block
This block focuses on extracting the substrate network information and constructing the feature matrix. Same as in previous works [22, 27, 28, 18], the following information is selected as the substrate node feature information:
Available node resources: the available node resource of the substrate node is denoted as,
(13) | ||||
where , indicates the number of substrate nodes.
Available link resources: it is expressed as the sum of available bandwidths connected to the substrate nodes. The available link resource of the substrate node is denoted as,
(14) |
where , indicates the number of substrate links, and represents the links between substrate nodes and .
Average distance: it is expressed as the average path length from the substrate node to other nodes. The larger its value, the greater the bandwidth occupied by the links passing through this node. The average distance of the substrate node to other substrate nodes is denoted as,
(15) |
where denotes the location of the substrate node , denotes the location of the substrate node , denotes the hops of the links between substrate nodes and , and denotes the Euclidean distance.
To eliminate the scale difference between various features, the input data is normalized using max-min normalization. This process maps the different data ranges into a uniform scale range, as follows,
(16) |
where , represents the minimum value of the vector, and represents the maximum value of the vector.
Thus, the input information is matrixed as follows,
(17) |
III-A2 Fuzzification block
This block involves fuzzification of the input data through a Gaussian membership function, which converts it into a fuzzy representation. The calculation is based on the distance between the input data and the center point , where smaller distances result in larger membership values. As the distance increases, the membership value decreases until it reaches . Here are the specifics,
(18) |
where denotes the membership value corresponding to the input value , denotes the centroid of the membership function, and denotes the width of the membership function. In this work, we utilize the clustering algorithm [29] to determine the centroids of clusters as and utilize the standard deviation as .
It should be noted that, as described in Section II-C, the fuzzy representation represents a method for processing uncertain information, including fuzzy sets and membership values. Wherein, the fuzzy set is utilized to express and process imprecise information in a fuzzy system. The uncertain state of the system is abstracted into a fuzzy set, which enables the data to be expressed in a linguistic manner. Moreover, the degree of affiliation of the data belonging to the corresponding fuzzy set is expressed through the membership value, which is a real number between and . For example, setting three membership functions for the variable will generate the fuzzy representation containing three fuzzy linguistic labels and corresponding membership values (e.g., “Large” = , “Medium” = , “Small” = ).
III-A3 Fuzzy rule block
This block consists of two branches, the CNN-based fuzzy implication branch and the fuzzy rule interpretation branch. In this work, the fuzzy implication branch is a CNN-based implication operator that outputs the inferred membership value, which serves as the input to the defuzzification block, and undergoes aggregation and defuzzification to obtain the output substrate network node embedding probability. In addition, the fuzzy rule interpretation branch establishes associations between the fuzzy sets with the highest membership values from the fuzzification block and the defuzzification block. These associations form fuzzy rules that can be interpreted based on their linguistic labels, thereby breaking away from the traditional black-box paradigm of DL models. In other words, these rules act as a map** between input to output spaces.
CNN-based fuzzy rule implication branch: This branch is primarily composed of two convolutional layers and two fully connected layers to compute the available computational vectors of the substrate network and infer the membership values of the consequent fuzzy rules as the input to the defuzzification layer. The convolutional layer is computed as follows:
(19) |
where represents the output of the fuzzification block, represents the weight matrix of the convolution layer, and represents the bias vector. Moreover, the weights are initially initialized using the truncated normal distribution method to avoid the vanishing or exploding of the gradient caused by extreme values. This method restricts of the weights to a range between and . In addition, the last fully connected layer is responsible for producing the membership values of the consequent, with the number of neurons equal to . The optimizer uses a gradient descent optimizer to minimize the loss function through forward propagation and gradient back-propagation (BP) of the model. During this process, the model will identify fuzzy rule patterns and cache them in weights. It is worth explaining that the input and output of the CNN-based fuzzy implication branch are associated with the subsequent fuzzy rule interpretation branch, which contributes to the interpretability of rule implication.
Fuzzy rule interpretation branch: Fuzzy rules are based on the more intuitive and interpretable Mamdani-type111It is an antecedent-consequent type rule and uses linguistic labels in both antecedent and consequent parts. linguistic rule [30]. In this work, the -th input data is () as in Eq. 17. The fuzzy set size222In general, the more Gaussian membership functions there are, the more precise the representation of the fuzzy set becomes. However, this may also lead to increased computation complexity and decreased operational efficiency. Hence, when determining the number of Gaussian membership functions, trade-offs and choices need to be made based on actual needs and computing resources. (number of fuzzy labels, depending on the number of membership functions) is defined as , i.e., linguistic labels “Very High (VH)”, “High (H)”, “Medium (M)”, “Low (L)”, and “Very Low (VL)”. Therefore, the encoding of fuzzy rules derived from the fuzzification layer (antecedent) and defuzzification layer (consequent) is as follows,
(20) | ||||
where represents the -the fuzzy rule, represents the linguistic label corresponding to the -th input dimension of from the fuzzification black, and represents the linguistic label corresponding to the -th output dimension from the defuzzification black.
III-A4 Defuzzification block
This block uses the center of gravity method for defuzzification to calculate the weighted average of the membership values of the fuzzy output and then uses the center of gravity as the output value. Unlike the maximum method, which may ignore relatively small membership values that have a certain impact, this method considers the possible impact of all membership values. Specifically, for the substrate node , it is calculated as follows,
(21) |
where represents the center of gravity of the substrate node , and represents the membership value of the -th dimension output of the last fully connected layer at the CNN-based fuzzy rule implication branch.
III-A5 Output block
This block utilizes the softmax function to output the embedded probabilities of the substrate network nodes. Specifically, for the substrate node , it is calculated as follows,
(22) |
where represents the embedded probability of .
Finally, after sorting, a set of candidate physical nodes with embedding probabilities from large to small is obtained. To further clarify the fuzzy rule implication process, we connect the consequent of the fuzzy rule interpretation branch to the output block. Thus, it can be further represented as,
(23) | ||||
where represent the linguistic label of substrate node, represent the rule weight of , , and represents a specific probability value.
The process of establishing the rule base is as follows: the establishment of rules is data-driven. When the first data is input, based on Eq. 23, the first rule is also established. If existing rules cannot explain current actions, new rules will be created. These rules are combined into a rule base to explain the principles and meaning of CNN-based fuzzy implication.
III-B DRL Configuration
The basic elements of DRL for this work are configured as follows,
III-B1 Agent
III-B2 State
It refers to the information collection of the environment at a certain moment, as defined in Eq. 17, and is also the input information extracted by the input block.
III-B3 Action
It refers to the scheme adopted by the agent at a certain moment. It is defined as the node embedding scheme and the link embedding scheme, as shown in Eq. 24. It should be noted that the node embedding probability is obtained from the output block, and the link embedding scheme is obtained through breadth-first search (BFS). At time , for , the action adopted is defined as Eq. 24, where indicates that the substrate node is used to host the virtual node, and indicates that the substrate link is used to host the virtual link. Furthermore, the map** relationship between the virtual node and the substrate node is , so . However, the map** relationship between virtual links and physical links is , which means that the virtual link may span multiple substrate links (also mentioned in Eq. 4).
(24) | ||||
III-B4 Reward
It refers to the feedback signal value obtained by an action taken by the agent at a certain moment, which is used to guide the agent to continue learning in the direction of a greater positive feedback value. Moreover, it is defined as the long-term average revenue-cost ratio, as follows,
(25) |
III-C Model Learning
As mentioned earlier, DNFS-VNE utilizes the BP algorithm to update the identified implication patterns into the weights. Specifically, the loss function employed in this work is the cross-entropy loss, as follows,
(26) |
Furthermore, the gradient is updated in the following directions,
(27) |
where represents the learning rate and represents the gradient derivative of . It should be noted that the reward will be used to jointly guide the model to optimize towards high reward feedback signals. It is widely recognized that the learning rate is a crucial parameter that requires careful tuning. Setting the learning rate too high or too low can hinder the model’s convergence. In this work, the learning rate is confirmed to be after being verified in Section IV-B. During the learning process, the model will be optimized along the direction of gradient descent, following Eq. 27, until the loss function reaches a converged state. At this point, the three evaluation indicators as shown in Eq. 6, Eq. 7, and Eq. 8 will also converge.
The algorithm flow of the proposed DNFS-VNE is shown in Algorithm 1. It should be noted that the current VNR embedding is successful only when all virtual nodes and virtual links are successfully embedded. At this point, the learned rule patterns are updated to the model weights for the current successful embedding. Otherwise, no learning is done for the failed embedding.
In addition, the rule base is built through inference in traditional fuzzy systems. This process involves pruning fuzzy rules with weak firing strength, less coverage, and less weight in order to ensure compactness. However, this approach may result in the removal of key information, as the pruned rules often imply that the event occurrences are relatively rare. On the other hand, DNFS-VNE can disregard this aspect, which is due to that the rule base is built by extracting knowledge from the data and implementing it based on the computation of DNNs. Then, the identified fuzzy rule patterns are updated into the weights. As a result, DNFS-VNE is not bound by rule pruning and does not require the training data to sufficiently cover the test data, as is the case in traditional fuzzy systems.
IV Simulation Experimental Verification and Analysis
IV-A Environment Configuration
Substrate Network | Setting | Virtual Network | Setting |
---|---|---|---|
Substrate domain | VNRs | ||
Training or Testing | |||
and | - | ||
U[]* | U[] | ||
U[] | U[] |
-
*
This indicates that the range of values for all elements in . The similar as , , and .
In this work, as shown in Table III, the environment settings are generated by the GT-ITM tool and saved in “.txt” files. Specifically, a total of substrate nodes and substrate links are generated. These substrate nodes are randomly distributed in substrate domains. Additionally, VNRs are generated and recorded in “.txt” files, with half as a training set and half as a test set. In each VNR, there are - virtual nodes, and virtual links are randomly generated with half probability, so there are virtual links. Furthermore, all VNRs arrive at the DNFS-VNE according to a Poisson-distributed time series to generate a continuous process.
![Refer to caption](extracted/5707962/figs/LR1000.png)
IV-B Learning Rate Selection and Training Performance
![Refer to caption](extracted/5707962/figs/LRC1000.png)
To determine the learning rate selection and stability of DNFS-VNE, it is important to observe the changes in indicator values at different learning rates. Therefore, we set to , , , and , and demonstrate the corresponding changes in indicator values during the training phase in Fig. 5, Fig. 6, and Fig. 7, respectively. It is observed that with , the stability speed is very slow. With , although stability can be achieved, the speed is unacceptable. Moreover, with , stability is faster, but the indicator fluctuates greatly due to the large stride. In contrast, when , due to the appropriate stride, the stability speed is faster and more stable, and it is stable in approximately - iterations. Therefore, considering overall performance, stability, and speed, we set . In addition, with , it can be observed that each evaluation indicator can reach the stability state quickly and more stably during the training process.
![Refer to caption](extracted/5707962/figs/ACC1000.png)
IV-C Fuzzy Linguistic Rules Definition
![Refer to caption](extracted/5707962/figs/gauss2.png)
During the learning process, we apply fuzzification to each input dimension of and use the clustering algorithm to determine the centroid and standard deviation of the Gaussian affiliation function. And, we randomly selected a substrate node from one iteration and visualized its fuzzification processing on the dimension of “Available node resources”, as shown in Fig. 8. As mentioned earlier, we generate five clusters that correspond to the linguistic labels “Very High”, “High”, “Medium”, “Low”, and “Very Low”. By analyzing the membership values of the current dimension values, we can determine the contribution values of the current input dimension values to different linguistic labels, which are then assigned to the corresponding fuzzy partitions. For instance, if , , we define that during this iteration process, the linguistic interpretation for this substrate node is “”. Therefore, based on Mamdani-type linguistic rules and following the same linguistic rules definition at the antecedent and consequent layers, reasonable interpretability can be provided for the VNE algorithm.
IV-D Generated Fuzzy Rule Interpretation
We show some generated rules by the fuzzy rule interpretation branch to explore the principles of the embedding process of the VNE, as shown in Table IV,
where represents the substrate node embedded probability. As mentioned before, , , represent available node resources, available link resources, and average distance, respectively. Therefore, by observing the comparison between different fuzzy rules, we can explain the embedding principle of the VNE process based on DNNs. For instance, by comparing and , we can conclude that the more remaining resources in the substrate node, the easier it is to be embedded. Similarly, by comparing and , we can conclude that the more available bandwidth resources in the substrate link, the easier it is to be embedded. Furthermore, by comparing with , we can conclude that the lower the number of substrate paths, the higher the embedding revenue. In fact, these reasoning results also align with the original intention of attribute design in many VNE works [22, 31, 27, 28, 18]. Therefore, this work provides a promising and interpretable solution to the black-box principle explanation of VNE working.
IV-E Comparison Experiment Analysis
Baseline | Descriptions | Parameter Settings |
---|---|---|
NodeRank [15] | A heuristic algorithm based on the priority of node resources. | , , , . |
NRM-VNE [17] | A heuristic algorithm based on multi-dimensional resource constraints. | Based on the MIP process. |
CDRL [18] | A reinforcement learning algorithm based on time series, but the embedding rules are not interpretable. | , , , . . |
![Refer to caption](extracted/5707962/figs/comp_L_AR2.png)
![Refer to caption](extracted/5707962/figs/comp_L_AR2C2.png)
![Refer to caption](extracted/5707962/figs/comp_V_AR2.png)
We selected the classic VNE algorithms (NodeRank [15], NRM-VNE [17], CDRL [18]) as baselines to prove the effectiveness of DNFS-VNE. The descriptions and parameter settings of all baselines are recorded in Table V. For rigor, all baselines are run in the same simulation environment as shown in Table III. Starting from the time series s of VNRs, the changes in indicators are recorded every s, as shown in Fig. 9, Fig. 10, and Fig. 11.
It can be found that the heuristic algorithm is generally inferior to the AI-based method. Most of the heuristic algorithms greedily allocate physical nodes and links with more resources, resulting in satisfactory performance initially but needing improvement in the long run. The CDRL algorithm introduces the RL algorithm on this basis, taking into account the interaction with the environment and comprehensively considering the VNR requirements, contributing to a significant improvement in effectiveness. In addition, the proposed DNFS-VNE fully considers the VNE implication rules and caches the identified inference patterns into weights through forward calculation and BP, thereby significantly improving the performance of each indicator.
As time progresses, the response to VNRs leads to a decrease in available resources for the substrate network. Consequently, this also reduces the number of VNRs that can be successfully embedded subsequently. Thus, the long-term average revenue and VNR acceptance success rate, as shown in Eq. 6 and Eq. 8, will continue to decrease. For Eq. 7, the long-term average revenue-cost ratio fluctuates as it is influenced by both revenue and cost. The results shown in the figures also validate these theories. In summary, this work is superior compared to other baselines as well as effective.
V Conclusion and Future
Based on the promising performance of interpretable DL represented by DNFS, this work proposes a DNFS-based VNE algorithm that aims to provide an interpretable NV scheme. Specifically, DNFS-VNE is a five-block architecture in which CNNs act as fuzzy implication operators to perform entailment operations and ultimately output the embedding probabilities of candidate substrate nodes. And, fuzzy rule patterns are cached into the weights during the model’s forward computation and gradient back-propagation. Moreover, Mamdani-type linguistic rules are used to construct the fuzzy rule base using linguistic labels and then interpret them. Furthermore, we use the policy network based on a five-block architecture as the agent of DRL to optimize the VNE scheme through interaction with the environment and joint guidance of the reward function. Finally, the effectiveness of the algorithm is proved through experiments.
Furthermore, it is important to mention that this work is only an initial effort to explore the interpretability of the VNE algorithm through DNFS. Additionally, this work can be easily extended to incorporate more resource dimensions, such as substrate link delay, substrate node degree, etc., to explore the influence of more attributes on the VNE process. Also, it can explore more complicated fuzzy implication designs to obtain more detailed fuzzy rules, and then develop more versions of DNFS-VNE.
References
- [1] D. Basu, S. Kal, U. Ghosh, and R. Datta, “DRIVE: Dynamic Resource Introspection and VNF Embedding for 5G Using Machine Learning,” IEEE Internet of Things Journal, vol. 10, no. 21, pp. 18 971–18 979, January 2023.
- [2] S. Wu, N. Chen, G. Wen, L. Xu, P. Zhang, and H. Zhu, “Virtual Network Embedding for Task Offloading in IIoT: A DRL-Assisted Federated Learning Scheme,” IEEE Transactions on Industrial Informatics, vol. 20, no. 4, pp. 6814–6824, January 2024.
- [3] H. Lu and F. Zhang, “Resource Fragmentation-Aware Embedding in Dynamic Network Virtualization Environments,” IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 936–948, February 2022.
- [4] Z. Yan, J. Ge, Y. Wu, L. Li, and T. Li, “Automatic Virtual Network Embedding: A Deep Reinforcement Learning Approach with Graph Convolutional Networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1040–1057, April 2020.
- [5] Z. Yang, R. Gu, H. Li, and Y. Ji, “Approximately Lossless Model Compression-Based Multilayer Virtual Network Embedding for Edge–Cloud Collaborative Services,” IEEE Internet of Things Journal, vol. 10, no. 14, pp. 13 040–13 055, March 2023.
- [6] Y. Li, Y. Zuo, H. Song, and Z. Lv, “Deep Learning in Security of Internet of Things,” IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22 133–22 146, 2022.
- [7] H.-K. Lim, I. Ullah, J.-B. Kim, and Y.-H. Han, “Virtual Network Embedding Based on Hierarchical Cooperative Multiagent Reinforcement Learning,” IEEE Internet of Things Journal, vol. 11, no. 5, pp. 8552–8568, 2024.
- [8] S. Dong and Y. Li, “Adaptive Fuzzy Event-Triggered Formation Control for Nonholonomic Multirobot Systems With Infinite Actuator Faults and Range Constraints,” IEEE Internet of Things Journal, vol. 11, no. 1, pp. 1361–1373, June 2024.
- [9] J.-S. Lee and C.-L. Teng, “An Enhanced Hierarchical Clustering Approach for Mobile Sensor Networks Using Fuzzy Inference Systems,” IEEE Internet of Things Journal, vol. 4, no. 4, pp. 1095–1103, 2017.
- [10] H. Zhao, J. Tang, B. Adebisi, T. Ohtsuki, G. Gui, and H. Zhu, “An Adaptive Vehicle Clustering Algorithm Based on Power Minimization in Vehicular Ad-Hoc Networks,” IEEE Transactions on Vehicular Technology, vol. 71, no. 3, pp. 2939–2948, January 2022.
- [11] C. Pham, L. A. T. Nguyen, N. H. Tran, E.-N. Huh, and C. S. Hong, “Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks,” IEEE Transactions on Network and Service Management, vol. 15, no. 3, pp. 1076–1089, April 2018.
- [12] N. Talpur, S. J. Abdulkadir, H. Alhussian, M. H. Hasan, N. Aziz, and A. Bamhdi, “Deep Neuro-Fuzzy System Application Trends, Challenges, and Future Perspectives: A Systematic Survey,” Artificial intelligence review, vol. 56, no. 2, pp. 865–913, April 2023.
- [13] N. Chen, S. Shen, Y. Duan, S. Huang, W. Zhang, and L. Tan, “Non-Euclidean Graph-Convolution Virtual Network Embedding for Space–Air–Ground Integrated Networks,” Drones, vol. 7, no. 3, p. 165, February 2023.
- [14] L. Song, X. Hu, G. Zhang, P. Spachos, K. N. Plataniotis, and H. Wu, “Networking Systems of AI: On the Convergence of Computing and Communications,” IEEE Internet of Things Journal, vol. 9, no. 20, pp. 20 352–20 381, May 2022.
- [15] X. Cheng, S. Su, Z. Zhang, H. Wang, F. Yang, Y. Luo, and J. Wang, “Virtual Network Embedding through Topology-Aware Node Ranking,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 38–47, April 2011.
- [16] N. M. M. K. Chowdhury, M. R. Rahman, and R. Boutaba, “Virtual Network Embedding with Coordinated Node and Link Map**,” in IEEE INFOCOM 2009, June 2009, pp. 783–791.
- [17] P. Zhang, H. Yao, and Y. Liu, “Virtual Network Embedding Based on Computing, Network, and Storage Resource Constraints,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3298–3304, July 2018.
- [18] H. Yao, S. Ma, J. Wang, P. Zhang, C. Jiang, and S. Guo, “A Continuous-Decision Virtual Network Embedding Scheme Relying on Reinforcement Learning,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 864–875, February 2020.
- [19] S. Zhang, Z. Wang, Z. Zhou, Y. Wang, H. Zhang, G. Zhang, H. Ding, S. Mumtaz, and M. Guizani, “Blockchain and Federated Deep Reinforcement Learning based Secure Cloud-Edge-end Collaboration in Power IoT,” IEEE Wireless Communications, vol. 29, no. 2, pp. 84–91, April 2022.
- [20] M. Dolati, S. B. Hassanpour, M. Ghaderi, and A. Khonsari, “DeepViNE: Virtual Network Embedding with Deep Reinforcement Learning,” in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), September 2019, pp. 879–885.
- [21] N. Chen, P. Zhang, N. Kumar, C.-H. Hsu, L. Abualigah, and H. Zhu, “Spectral Graph Theory-Based Virtual Network Embedding for Vehicular Fog Computing: A Deep Reinforcement Learning Architecture,” Knowledge-Based Systems, vol. 257, p. 109931, Decemeber 2022.
- [22] P. Zhang, N. Chen, S. Li, K.-K. R. Choo, C. Jiang, and S. Wu, “Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3363–3375, May 2023.
- [23] A. Fischer, J. F. Botero, M. T. Beck, H. De Meer, and X. Hesselbach, “Virtual Network Embedding: A Survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 1888–1906, February 2013.
- [24] W. Fan, F. Xiao, M. Lv, L. Han, J. Wang, and X. He, “Node Essentiality Assessment and Distributed Collaborative Virtual Network Embedding in Datacenters,” IEEE Transactions on Parallel and Distributed Systems, vol. 34, no. 4, pp. 1265–1280, February 2023.
- [25] J. Zhu, W. Zhao, H. Yang, and F. Nie, “Joint Learning of Anchor Graph-Based Fuzzy Spectral Embedding and Fuzzy K-Means,” IEEE Transactions on Fuzzy Systems, vol. 31, no. 11, pp. 4097–4108, June 2023.
- [26] B. Pang, “Fuzzy Convexities Via Overlap Functions,” IEEE Transactions on Fuzzy Systems, vol. 31, no. 4, pp. 1071–1082, July 2022.
- [27] H. Cao, Y. Zhu, G. Zheng, and L. Yang, “A Novel Optimal Map** Algorithm with Less Computational Complexity for Virtual Network Embedding,” IEEE Transactions on Network and Service Management, vol. 15, no. 1, pp. 356–371, November 2017.
- [28] S. Ma, H. Yao, T. Mai, J. Yang, W. He, K. Xue, and M. Guizani, “Graph Convolutional Network Aided Virtual Network Embedding for Internet of Thing,” IEEE Transactions on Network Science and Engineering, vol. 10, no. 1, pp. 265–274, September 2023.
- [29] A. Likas, N. Vlassis, and J. J. Verbeek, “The Global K-Means Clustering Algorithm,” Pattern recognition, vol. 36, no. 2, pp. 451–461, February 2003.
- [30] I. Iancu, “A Mamdani Type Fuzzy Logic Controller,” Fuzzy logic-controls, concepts, theories and applications, vol. 15, no. 2, pp. 325–350, March 2012.
- [31] R. Zhu, G. Li, Y. Zhang, Z. Fang, and J. Wang, “Load-Balanced Virtual Network Embedding Based on Deep Reinforcement Learning for 6G Regional Satellite Networks,” IEEE Transactions on Vehicular Technology, vol. 72, no. 11, pp. 14 631–14 644, May 2023.