Research on reliability mapping of 5G low orbit constellation network slice based on deep reinforcement learning (2024)

  • Journal List
  • Scientific Reports
  • PMC11222458

As a library, NLM provides access to scientific literature. Inclusion in an NLM database does not imply endorsem*nt of, or agreement with, the contents by NLM or the National Institutes of Health.
Learn more: PMC Disclaimer | PMC Copyright Notice

Research on reliability mapping of 5G low orbit constellation network slice based on deep reinforcement learning (1)

AboutEditorial BoardFor AuthorsScientific Reports

Sci Rep. 2024; 14: 15294.

Published online 2024 Jul 3. doi:10.1038/s41598-024-66188-6

PMCID: PMC11222458

PMID: 38961120

Yunjie Xiao,Research on reliability mapping of 5G low orbit constellation network slice based on deep reinforcement learning (2) Nan Li, Jiangtao Yu, Baozhu Zhao, Dawei Chen, and Zhengrong Wei

Author information Article notes Copyright and License information PMC Disclaimer

Associated Data

Data Availability Statement

Abstract

Reliability mapping of 5G low orbit constellation network slice is an important means to ensure link network communication. The problem of state space explosion is a typical problem. The deep reinforcement learning method is introduced. Under the 5G low orbit constellation integrated network architecture based on software definition network (SDN) and network function virtualization (NFV), the resource requirements and resource constraints of the virtual network function (VNF) are comprehensively considered to build the 5G low orbit constellation network slice reliability mapping model, and the reliability mapping model parameters are trained and learned by using deep reinforcement learning, solve the problem of state space explosion in the reliability mapping process of 5G low orbit constellation network slices. In addition, node backup and link backup strategies based on importance are adopted to solve the problem that VNF/link reliability is difficult to meet in the reliability mapping process of 5G low orbit constellation network slice. The experimental results show that this method improves the network throughput, packet loss rate and intra slice traffic of 5G low orbit constellation, and can completely repair network faults within 0.3s; For different number of 5G low orbit constellation network slicing requests, the reliability of this method remains above 98%; For SFC with different lengths, the average network delay of this method is less than 0.15s.

Keywords: Deep reinforcement learning, Resource demand, Functional virtualization, 5G low orbit constellation, Network slicing, Reliability mapping

Subject terms: Engineering, Mathematics and computing

Introduction

Low orbit constellation network consists of a group of low orbit constellation satellites, forming a communication network covering the whole world or specific regions1. The maneuverability of LEO constellation network is fully reflected in the modeling through the rapid movement of satellites in LEO and the dynamic changes of network topology, as well as the resulting link stability, transmission delay and packet loss rate fluctuations. This mobility not only challenges the performance and reliability of network slicing, but also provides an opportunity for deep reinforcement learning algorithm to optimize network resource allocation and routing strategy, so as to achieve more stable and efficient network slicing service. Network slicing is a network virtualization technology, which can divide a physical network into multiple virtual networks, and each virtual network can run and manage independently2. 5G low orbit constellation network slicing is a network service mode combining 5G communication and low orbit constellation technology3. This network slicing technology can provide customized network services to meet the needs of different users4. Reliability mapping of 5G low orbit constellation network slice is an important means to evaluate and guarantee the reliability of 5G low orbit constellation network slice service5. Reliability mapping typically involves backup and recovery mechanisms for virtual network elements, such as nodes and links. Specifically, the technology aims to prevent and respond to virtual network failures to ensure the normal operation of business. In the network slicing environment, because the virtual network is built on the physical network, the reliability of the physical network has a direct impact on the reliability of the virtual network. Through reliability mapping, it can ensure that when the virtual network fails, it can quickly recover and continue to provide services. Due to the dynamic and high-risk nature of low orbit constellation satellites, the reliability of the network is facing great challenges.

For the reliability mapping method of 5G low orbit constellation network slice, some relevant experts and scholars have studied it. For example, Musumeci et al.6 proposed a double objective heuristic method. By simultaneously optimizing the two key objectives of the constellation network, namely, the number of active control terminals and the number of wavelength channels, the number of terminals is controlled by trying to minimize the required network resources, Minimizing the number of wavelengths required means optimizing the network capacity and improving efficiency. At the same time, this method optimizes under the constraints of network capacity and delay requirements to ensure that the generated slices meet the network capacity requirements, and the data transmission delay is within an acceptable range. However, this method may not guarantee to find a global optimal solution, but can only find a local optimal solution, In some cases, better solutions will be missed. Thiruvasagam et al.7 proposed reliability awareness, delay guarantee and efficient resource allocation methods for the slice service function chain in the software 5G network, proposed a new SFC subchannel method to improve the reliability of no backup SFC when mapping network slices, and converted the reliable SFC layout problem of network slice mapping into an integer linear programming (ILP) problem, However, the network slice mapping method has the problems of high computational complexity and long running time for large-scale input instances. Scancalepore et al.8 proposed a delay driven network slicing arrangement method in 5g networks. Using a solid mathematical framework, the coordinator LACO based on multiple armed bandits (MAB) makes use of the exploration and development paradigm. The coordinator makes adaptive resource slicing decisions without prior knowledge of traffic demand or channel quality statistics, effectively managing and arranging network resources, To meet the needs of different users and businesses, LACO relies on system structure information to speed up decision-making. When LACO is in place, it measures the near optimal results within the affordable computing time, and dynamically adjusts according to real-time network conditions and needs, thus realizing the mapping of network slices. However, this method relies on real-time network status information. If the network status information is inaccurate or outdated, It may lead to mistakes in decision-making.

Deep reinforcement learning has adaptive decision-making ability9, which can enable agents to better cope with the dynamic changes and uncertainties in the low orbit constellation network. It is effective to optimize the allocation of network resources. Deep reinforcement learning Through learning historical data and real-time feedback10, agents can find the optimal way to use resources, thus improving the reliability of network slicing; Be able to process high-dimensional data, effectively extract useful features from a large amount of data, and provide more accurate prediction and decision support for reliability mapping; Deep reinforcement learning11 allows agents to accumulate experience through interaction with the environment and learn how to make optimal decisions, which can greatly reduce the need for manual intervention and make network management more automated and intelligent. Therefore, based on the shortcomings of the above methods, this paper studies the reliability mapping method of 5G low orbit constellation network slices based on deep reinforcement learning to improve the reliability and stability of network slices and meet the needs of users. Compared with traditional methods, the innovation of this method is:

  1. The method of deep reinforcement learning is introduced. Under the integrated network architecture of 5G- LEO constellation based on software-defined network and virtualization of network functions, the reliability mapping model of 5G- LEO constellation network slices is constructed by comprehensively considering the resource requirements and resource constraints of virtual network functions, and the parameters of the reliability mapping model are trained and learned by deep reinforcement learning to solve the problem of state space explosion in the process of reliability mapping of 5G- LEO constellation network slices.

  2. The node backup and link backup strategies based on importance are adopted to solve the problem that VNF/ link reliability is difficult to meet in the process of reliability mapping of 5G- LEO constellation network slices.

Compared with other methods, this method ensures the throughput, traffic transmission delay and data packet loss rate of 5G- LEO constellation network, and improves the load balance of 5G- LEO constellation network, thus improving the reliability of the network. Under the same number of requests, this method has higher reliability; According to the mapping of node reliability importance, resource allocation and redundancy management are carried out. This method can better identify key nodes and allocate more resources to them, thus improving the reliability and availability of network services.

5G low orbit constellation network slice reliability mapping

Network architecture

The 5G low orbit constellation integrated network architecture is shown in Fig.112, which completes the organic combination of terminal equipment, satellite network functions, satellite baseband gateway (S-GW), mobility management entity (MME), core network resources and management system through software definition network (SDN) and network function virtualization (NFV) technologies, and divides the core network into core network processing cloud and core network forwarding cloud, Realize the separation of forwarding and control, so that it can provide maximum flexibility, openness and programmability. Among them, the mobility management entity MME in the network is an important network element, which is specially responsible for processing signaling, business control and user mobility management. It caches user information. Serving GateWay (S-G) plays a key role in request routing, security control, protocol conversion, etc. It provides a series of functions to ensure the reliability and security of the network.

Open in a separate window

Figure 1

5G—Integrated Network Architecture of Low Earth Orbit Constellations.

Most functions of 5G low orbit constellation network slice are provided by the virtual network function (VNF) running in the distributed network function virtualization infrastructure13. In the ETSI ISG NFV terminology, the non virtualized functions of slices are expressed as physical network functions (PNF). Each 5G low orbit constellation network slice is composed of a series of VNF and PNF instances, which are linked together to form a service function chain (SFC) that lasts for a specific period of time. The service choreographer generates SFC according to service requests, uses mapping algorithms to realize network slice instantiation, and establishes a logically independent and mutually isolated network relying on satellite network infrastructure.

The problem of reinforcement learning is limited by multiple constraints, which include the challenge of data collection, the demand for real-time and dynamic, the balance between network performance and resource constraints, and the requirement of ensuring security and stability.

The service orchestration function of network architecture is usually deployed in the core part of the network, so that the network slicing resources can be managed, configured and optimized globally. In 5G and future network architecture, service orchestration can be deployed in multiple network elements, but it is most commonly deployed in central control nodes such as network management system (NMS), network function virtualization choreographer (NFVO) or network slice manager (NSM).

The deployment location of service orchestration function is as follows:

  1. Network Management System (NMS): NMS is responsible for the management and monitoring of the whole network, including the management of network slices. Therefore, deploying the service orchestration function in NMS can ensure a global view of the whole network and directly manage the network slice resources.

  2. Network Function Virtualization Orchestrator (NFVO): In NFV (Network Function Virtualization) architecture, NFVO is responsible for the life cycle management of network services, including instantiation, configuration, optimization and termination of network functions. Integrating the service orchestration function into NFVO can easily interact with NFV architecture and quickly respond to the needs of network slicing.

  3. Network Slice Manager (NSM): NSM is a network element dedicated to managing network slice resources. Deploying the service orchestration function in NSM can ensure the direct control and management of slicing resources and improve the flexibility and efficiency of slicing configuration.

The deployment location of service orchestration function has an important influence on transmission delay. The qualitative analysis of transmission delay under different deployment locations is as follows:

  1. Deployed in NMS: NMS is usually located at the core layer of the network and has good connections with other network elements in the network. Therefore, the transmission delay from NMS to each network slice is usually low. However, if the distance between NMS and the edge network nodes is far away, the management and response speed of edge slicing may decrease.

  2. Deployed in NFVO: NFVO is usually located at the core layer of the network and closely integrated with virtualization infrastructure (such as VNFM). Therefore, the transmission delay from NFVO to virtualized network functions is usually low. However, if there is a bottleneck in the connection between NFVO and physical network nodes (such as base stations, switches, etc.), the management and response speed of physical network slices may decrease.

  3. Deployed in NSM: NSM is a network element specially used to manage network slicing resources, and is usually closely connected with slicing related network elements (such as base stations, switches, etc.). Therefore, the transmission delay from NSM to each network slice is usually low, which can realize the rapid management and response of slice resources. However, if there are bottlenecks in the communication between NSM and NMS or between NMS and NMS and external systems (such as the coordination between NMS and NMS, the interaction between NMS and NMS and third-party systems, etc.), it may lead to the decrease of management and response speed across slices or systems.

Network modeling

  1. Physical networks.

The infrastructure layer provides the physical and virtual resources needed to create 5G low orbit constellation network slices14, and the underlying physical network is composed of weighted undirected graph Gs=(Ns,Ls), where Ns=n1,n2,...,nM is the set of physical nodes, the Ci denotes the computational power of the physical node ni,Ls=lijni,njNs denotes the set of physical node links, the lij denotes specific physical nodes on the underlying physical network ni, the physical link nj, of which, the link failure rate of the communication link lij is λij, with a bandwidth of Bijs.

  • 2.

    5G low orbit constellation network slice request.

5G low orbit constellation network slice request g is denoted by Gvg=(Nvg,Evg), where Evg=ekgvm,vnNvg is a set of virtual links.ekg denotes the k th virtual links of slice g.Cskg and Cdkg denote respectively the computational resource requirements of the source and destination nodes of the k th link of slice g.Nvg=v1g,v2g,...,vNg is the set of virtual nodes, the N denotes the number of virtual nodes of slice g, the bg=B(ekg),ekg denotes the required broadband capacity of slice g.

As shown in Fig.2, for each slice, mathematical models can be built using Kg two-point directed subgraph representations, the vskg and vdkg represent the source and destination nodes of the k th virtual link ekg, respectively, when the physical link lij is selected, the xijkg=1, otherwise xijkg=0.

  • 3.

    State, action and reward framework under deep reinforcement learning.

  • 4.

    State:

State describes the complete situation of network slicing at a certain moment, including all kinds of observable and unobservable information.

In the context of reliability mapping of network slices in 5G- LEO constellation, the state includes the current load, delay, packet loss rate, bandwidth utilization rate and other performance indicators of network slices, as well as the position and orbit information of satellites and the connection state with other satellites or ground base stations.

The information integrity of state is very important for agents to make correct decisions. Therefore, when designing the state, it is necessary to ensure that the state can fully reflect the current situation of the network slice.

  • 5.

    Action:

Action is an agent's behavior that is selected according to the current state and used to influence the environment.

In the context of reliability mapping of network slices in 5G- LEO constellation, actions include adjusting the resource allocation of network slices, changing routing strategies, optimizing transmission parameters, and so on. The purpose of these actions is to improve the reliability of network slicing, such as reducing delay and packet loss rate.

Action selection needs an agent-based strategy, which is usually trained by deep reinforcement learning algorithm.

  • 6.

    Reward:

Reward is a feedback signal given by the environment after performing an action on an agent, which is used to guide the learning process of the agent.

In the context of reliability mapping of 5G- LEO constellation network slices, the reward can be defined based on the performance index of network slices. If the agent reduces the delay of network slicing or improves the bandwidth utilization through an action, it can give a positive reward; Conversely, if the performance drops, a negative reward will be given.

The setting of rewards has an important influence on the learning direction and speed of agents. Therefore, when designing the reward function, we need to ensure that it can accurately reflect the research objectives and optimization direction.

5G low orbit constellation network slice reliability mapping model

The mapping is to allocate the physical network resources to each VNF according to certain constraints. The service choreographer calculates the reliability requirements of a single VNF according to the reliability threshold of the service request. The physical nodes allocated by VNF need to meet the reliability requirements and computing resource constraints; The virtual link is mapped to a loop free path of the underlying physical network. The available bandwidth of each link on the path must meet the bandwidth requirements of the virtual link.

Network slice request (NSR) is a logical service formed by a group of VNFs through network interconnection15. According to VNF importance index, VNF reliability requirements are calculated to provide different reliability guarantees. When the overall reliability requirements of NSR Rreqg is given, the RA assessment method can be used to obtain VNF reliability requirements. The three importance indicators defining VNF are: VNF vi computing resource requirements Si=Cig; VNF bandwidth resource requirements, is defined as the sum Di=ei,ei+1Eg(beig+bei+1g) of the bandwidth resources for all the adjacent links connected to the VNF vi; VNF degree centrality, reflecting its importance from the perspective of VNF position, is defined as Mi=1/vjVgdij. Among them,dij indicates the hop distance between VNF vi and vj. The greater the centrality of VNF, the more important the VNF is in the middle of the network slice. Based on three importance indicators, the normalized weight indicator for vi is:

pig=Si+Di+Mi/i=1KgSi+Di+Mi

1

According to the reliability calculation formula of components assessed by RA, it can be obtained that:

Rig=(Rreqg)pig

2

Among them.Rigi[1,2,...n] is the reliability requirements for vi, and Rreqg, the overall reliability of NS and the reliability requirements with each VNF shall meet:

viVgRigRreqg

3

In order to ensure the reliability of the 5G- LEO constellation network slice16, maximize the deployment benefits of VNF and minimize the overhead of broadband resources, resource migration can be regarded as a way to improve the reliability of the service chain and reduce the mapping cost. According to the VNF reliability weight index, the overall reliability of the 5G- LEO constellation network slice is ensured by meeting the reliability requirements of VNF. Among them,C1 is a binary variable constraint. When VNF node vi is mapping to physical node n,xvi,n is 1, otherwise is 0; if NSR virtual link ei maps to physical link lnm, then yei,lnm is 1, otherwise it is 0.C2 indicates that VNF nodes belonging to the same 5G low orbit constellation network slice cannot be mapped to the same physical node.C3 Represents that the reliability Rn probability value of the physical node is not greater than 1.C4 indicates that each VNF has different reliability requirements, and a single VNF is required to meet the reliability requirements in the mapping process.C5 while in the physical network without backup protection, the actual overall reliability of 5G low orbit constellation network slice must at least meet the overall reliability requirements of 5G low orbit constellation network slice.C6 indicates that the total computing resources required by all VNF nodes in each 5G low orbit constellation network slice deployed to the same physical node are less than or equal to the computing resource capacity of the physical node.C7 indicates that the remaining computing resources of the deployed VNF node must be greater than the computing resources required by the node.C8 indicates that the sum of bandwidth resources required by all links of each 5G low orbit constellation network slice deployed to the same physical link is less than or equal to the link resource capacity of the physical link.C9 indicates that the remaining bandwidth resources of the mapped physical link must be greater than the bandwidth resources required by the virtual link. To solve the above problems, 5G low orbit constellation network slicing requests are divided into three categories: Cig>Cn,nNS,vigVg,CnCig ; RnRig,nNS,vigVgandCnCig;Rig>Rn,nNS,vigVg, construct 5G low orbit constellation network slice reliability mapping model, and use formula (4) to describe:

maxxvi,n,yei,lnmwrgNSviVgxvi,nCigCn-wc(lnmLseiEgyei,lnmbeig)C1:xvi,n0,1,yei,lnm0,1C2:nP(Vg)xvi,n=1,viVgC3:0<Rn<1,nNSC4:Rn>Rig,nPg(vi)C5:nNSxvi,nRnRreqg,viVgC6:gNSviVgxvi,nCigCnC7:CnrCig,nPg(vi),viVgC8:gNSeiEgyei,lnmbeigbnmC9:bnmrb(ei),lnmPg(ei),eiEg

4

DQN based 5G low orbit constellation network slice reliability mapping

The 5G low orbit constellation network slice reliability mapping model based on Section "5G low orbit constellation network slice reliability mapping model", taking into account the formula (4) 5G low orbit constellation network slice reliability mapping model parameter set o contain continuous variables such as physical host resource utilization, and the large number of physical host nodes in the production environment will lead to the explosion of 5G low orbit constellation network state space, resulting in reduced reliability of network slice mapping. Therefore, based on the certain decision-making ability of deep reinforcement learning17, a reliability mapping method of 5G low orbit constellation network slice based on DQN (deep reinforcement learning) is proposed, and a deep reinforcement network is constructed to fit the 5G low orbit constellation network state behavior value function 18, to solve the state space explosion problem in the reliability mapping process of 5G low orbit constellation network slice. This algorithm constructs a neural network with a weight of θ, such that Q(o,a,θ)Q(o,a), of which,o is the parameter set of reliability mapping model for 5G low orbit constellation network slice, that is, the relevant parameters of formula (4),a is action to perform reliability mapping for. In this network, the observation state (the parameter of the reliability mapping model in Formula (4)) is taken as the input, and the two-layer convolutional network is used to process the input, which is used to understand the deployment state of the physical host in the current network, and then the processing results are imported into a full connection layer with ReLU as the activation function. Actual cumulative rewards for using this network r+γmaxaQ(o,a) as the target value.r denotes the immediate reward available to the core controller after performing the mapping action;γ indicates the discount factor, which is used to measure immediate and future rewards. The expected cumulative reward Q(o,a) is used as the predicted value, the training purpose is to make the predicted value as close as possible to the target value, so the loss function is defined as.

L(θ)=[rl+γmaxalQ(ol,al;θ)-Q(ol,al;θ)]2

5

Compute the partial derivatives of the loss function with respect to the weights of the neural network:

L(θ)θ=[rl+γmaxalQ(ol,al;θ)-Q(ol,al;θ)]×Q(ol,al;θ)θ

6

By using gradient descent method and back propagation mechanism for several iterations, it is possible to find Q(o,a,θ). In the neural network training process, the training samples used need to have the property of being independently and identically distributed, and the two neighboring training samples in the above process ol,al and ol,al are correlated, the neural network will overfit the training process and the learned experience cannot be generalized. Therefore, an experience replay cache pool and a target network are introduced into the network to break the correlation. Where the experience replay cache pool is used to record migration information, the ol,al,ol,al, while randomly sampling from the playback cache pool to obtain migration information oj,aj,oj,aj as the real training input to the neural network. The target network is a network with weights as θ, every after a number of training to update the target network, so that the target value is relatively fixed, so as to prevent the training process overfitting. The flow of the algorithm is shown in Fig.3.

Open in a separate window

Figure 3

Schematic diagram of 5G low orbit constellation network slice mapping based on DQN.

Code availability

The code for studying the reliability mapping of 5G low orbit constellation network slices should be modularized for easy understanding, modification, and expansion. The implementation of gradient descent and backpropagation mechanism should have clear interface definitions for each module to interact with other modules. Pseudocode under gradient descent and backpropagation mechanism:

  • Input: min (float X ,float Y)

  • { int Z;

  • Z = X > Y?X:Y

  • return (Z);

  • Ouput: The results of SDE.

  • end}

Using deep reinforcement learning to select the path for generating reliable mapping codes for 5G low orbit constellation network slicing, node segmentation is performed on all required information generated by embedded software code generation. According to the requirements of automatic code generation, the path traversal depth is reasonably set. The more native code information, the greater the coverage depth of the selected path, and the more paths can be selected for automatic code generation.

The formula for calculating path coverage depth is:

SD=i=1n(Ui-μi)n

7

In the formula, Ui represents the similarity between code nodes; μi represents the level of assessed risk obtained; n represents the number of evaluated nodes. The path generation process is shown in Fig.4.

Open in a separate window

Figure 4

Path Generation Process.

According to Fig.4, the 5G Low Orbit Constellation Network Slice Reliability Mapping System randomly allocates the code information to be generated into multiple test path sets, arranges the code generation paths of concurrent structures in embedded software and the structural paths within branches in order, outputs effective code generation paths, and selects the best 5G Low Orbit Constellation Network Slice Reliability Mapping code generation path based on the shortest path as the selection principle within the generated paths, achieving code availability research.

Backup programs that consider reliability

The deployment plan in Sect. "Dqn based 5g low orbit constellation network slice reliability mapping" and the availability of 2.5 code can obtain reliable 5G low orbit constellation network slice mapping results. However, there may be no physical nodes that meet the VNF reliability requirements within the mapping range during VNF deployment. In addition, the link reliable mapping model appropriately improves the link mappable length, which requires link backup to meet the reliability. Therefore, in order to improve the mapping success rate, corresponding backup schemes are required.

Node backup program

The node backup scheme is an important measure to ensure the reliability of the network slice in the case of failure or congestion. The specific content of this backup scheme involves configuring redundant nodes or resources in the network so that the main node can take over its work quickly when there is a problem. In sharing mode, backup nodes or resources can be shared by multiple network slices to improve resource utilization and cost-effectiveness. Multiple LEO constellation network slices can share a set of backup satellites or ground stations to provide backup services when needed. By collecting network state information and training the model, the algorithm can learn how to dynamically adjust the configuration and use of backup resources according to network conditions and business requirements.

Filtering the action space, including path length constraints, resource constraints, and reliability constraints, gets the set is:

Nkni=nihop(sk,ni-1)+hop(ni-1,ni)+hop(ni,dk)uk,Rni(RNk)ωI,cnIk<ci·psk,ni-1psk,vI-1k,pni-1,ni=lni-1,ni,pni,dk=lni,dk,nih(vIk)

8

Among them,sk is the network data flow entry point.dk is the location where the data stream is delivered; the maximum value of transmission hops is uk; The reliability requirements for vIk is (RNk)ωI; cnIk is the computational resource requirements for vIk. When the mapped nodes are determined, the set Lkli,j of mapped links can be determined, from which the minimum path hop(i,j)bI,Jk/bi,j is chosen, making their actions more conducive to achieving the optimization goal.

When VNF reliability requirements is high, when Nkni is empty, based on the idea of backup, two deployment nodes can be selected at the same time, one of which is the backup node. At this time, the node set is:

Nkni=nihop(sk,ni-1)+hop(ni-1,ni)+hop(ni,dk)uk,cnIk<cipsk,ni-1psk,vI-1k,pni-1,ni=lni-1,ni,pni,dk=lni,dk,nih(vIk)

9

In order to effectively improve the reliability of 5G low orbit constellation network slice mapping19, and improve the utilization rate of backup resources, the backup mode is set for the importance of VNF. By normalizing the importance, a dedicated backup is performed for those higher than the average SFC importance. The physical nodes with higher reliability are used for deployment, and the smaller ones are used for backup. On the contrary, shared backup can further reduce resource consumption while ensuring that important VNFs do not fail. At this time, select the deployment node in Nkni, and the backup node is used as the node mapping action.

Link backup algorithm

Since the deployment result may not meet the reliability of the 5G low orbit constellation network virtual link20,21, link backup is required at this time. For link delay, besides normal distribution, other distributions that can better capture the actual network conditions need to be considered, such as lognormal distribution, exponential distribution or Weibull distribution. These distributions can provide a more accurate simulation of delay behavior. For network traffic generation, Poisson process cannot fully reflect the complex and diverse traffic patterns in 5G networks. Consider using a hybrid model to simulate network traffic, and combine different stochastic processes to capture the behaviors of different types of traffic. Using network simulation tools is a powerful means to simulate and analyze the performance of 5G networks. These tools allow people to configure various parameters and scenarios, and generate detailed simulation results, so that people can better understand and optimize network performance. In order to select an appropriate path to be backed up, and to achieve sufficient reliability increment with minimum link resource consumption as the goal, the reliability improvement rate of unit resource is proposed:

σI,Jk=Δ/BW

10

Δ=li,j=g(lI,Jk),lI,JkLvkRL(li,j)·(1-li,j=g(lI,Jk),lI,JkLvkRL(li,j))

11

BW is the consumption of resources for link backup li,j.li,j*is the deployed links. In order to improve the reliability of low reliability virtual links, then:

χI,Jk=σI,Jk/li,jg(lI,Jk)RL(li,j)

12

χI,Jk effectively evaluates the importance of link lI,Jk in the backup process to achieve less costly link resources and greater reliability improvement, sort lI,Jk by χI,Jk, from large to small iterative backup to meet the reliability requirements.

Experimental analysis

In order to verify the effectiveness of the 5G low orbit constellation network slice reliability mapping of the method in this paper, the experimental environment of repeatable experiments is constructed as shown in Fig.1, and the cloud computing simulation platform CloudSimSDN is expanded to realize the business flow generation module and algorithm test module. CloudSimSDN is a cloud computing simulator used to build the underlying network environment, including simulating network topology and physical host resources, monitoring system operation, and analyzing system energy consumption. The network topology contains 45 nodes, which are connected in a tree form, and the link delay is randomly generated according to the normal distribution. The network flow generation module is used to generate network traffic based on Poisson process. In this study, it is agreed that the length of SFC is 10–30, and there are no more than 10 types of VNF. The algorithm test module realizes the validation of the reliability mapping of 5G low orbit constellation network slice by the method in this paper, and uses Java language to write code. The experimental hardware environment is Lenovo T480S computer, equipped with Intel Core i7-8550U 8 core processor, GeForce MX150 2GB GPU, DDR416GB memory, and the operating system is Ubuntu 18.04Server. Relevant parameters are shown in Table ​Table11.

Table 1

Experimental Parameters.

Experimental parametersNumerical value
Number of physical nodes45
Slice request reliability threshold[0.93, 0.99]
Physical node reliability[0.95,0.99]
Physical node CPU resource capacity[10.20]
Bandwidth capacity between physical nodes[30,60]
VNF computing resource requirements[3, 9]
Bandwidth requirements between VNFs[8, 16]
The number of VNFs requested for slicing[4, 8]
Iterations500
Playback buffer pool capacity100
Resource overbooking threshold0.3
Exploring Development Decision Thresholds0.9
Transmission delay weight0.2
Queuing delay weight0.8
Reward balance constant60

Open in a separate window

In order to verify the reliability mapping effect of 5G low orbit constellation network slice in this method, corresponding simulation failure scenarios are designed for three situations: network equipment failure, satellite communication failure and network congestion. The failure recovery time, recovery success rate, throughput, packet loss rate and intra slice traffic are taken as evaluation indicators. Before fault scenario simulation, measure and record the throughput, packet loss rate and intra slice traffic of 5G low orbit constellation network slice mapping, and use them as the baseline. In the simulated fault scenario, monitor the performance of 5G low orbit constellation network slice mapping in real time, and record the changes of these real-time data; After the end of the simulated fault scenario, observe and record the fault recovery time and recovery success rate of 5G low orbit constellation network slice mapping, and record the repaired throughput, packet loss rate and intra slice traffic. By comparing and analyzing the real-time monitoring and recorded data with the previous baseline data, observe the performance changes of 5G low orbit constellation network slice mapping under the three fault scenarios. The verification results are shown in Table ​Table22.

Table 2

Mapping Results of 5G Low Earth Orbit Constellation Network Slices Using the Method in this paper.

Fault TypeNo faultNetwork device failureSatellite communication failureNetwork congestionAfter repair
Throughput/kbps131011815
Packet loss rate/%161280
Slice flow rate/piece3526192137
Fault recovery time/s0.290.120.25
Recovery success rate/%100100100

Open in a separate window

Table ​Table22 clearly depicts the changes in performance indices of the 5G low orbit constellation network under various fault conditions. In scenarios where network equipment fails, satellite communication encounters issues, or the network becomes congested, the transmission efficiency and reliability of the network are significantly impacted, resulting in a noticeable downward trend in network throughput, packet loss rate, and intra-slice traffic. However, after implementing the processing method proposed in this paper, the performance of the 5G low orbit constellation network has been considerably enhanced. In terms of throughput, packet loss rate, and intra-slice traffic, the processed network exhibits superior performance. Notably, even in the event of network failures, these three indicators have improved compared to their pre-failure state. Furthermore, the failure recovery time of the 5G low orbit constellation network processed by this method is less than 0.3s, indicating its ability to restore normal operation promptly in the event of a failure. The recovery success rate achieves 100%, further validating the effectiveness of this method in enhancing network reliability.

In order to verify the reliability mapping capability of 5G low orbit constellation network slices of this method, set the number of 5G low orbit constellation network slices at 5–45, and calculate the average reliability of the double objective heuristic method, improved configuration method, network slice arrangement method and this method. Figure5 shows the average reliability change of the four methods when processing 5G low orbit constellation network slice requests.

Open in a separate window

Figure 5

Reliability of 5G Low Earth Orbit Constellation Network Slice Mapping with Different Methods.

As illustrated in Fig.5, as the number of 5G low orbit constellation network slice requests rises, the network load increases, causing an augmentation in the failure rate of service processing and data transmission. Consequently, the average reliability of the four methods exhibits a downward trend. When the number of 5G low orbit constellation network slicing requests is 5, the dual objective heuristic method achieves an average reliability of 93.8%, the improved configuration method achieves 96%, the slicing arrangement method achieves 96.5%, and the method presented in this paper achieves 98.4%. This indicates that, with a small number of requests, the method proposed in this paper is more reliable than the other three methods. As the number of requests for 5G low orbit constellation network slicing increases to 45, the reliability of the dual objective heuristic method, the improved configuration method, and the slicing arrangement method decreases by approximately 2%. However, the reliability of the method presented in this paper remains above 98%. In comparison to the first three methods, the method proposed in this paper maintains high reliability even when facing a large number of requests.

In order to further verify the effectiveness of the 5G low orbit constellation network slice reliability mapping of the method in this paper, compare the average network delay of the four methods when the service function chain (SFC) length range is 10–30 with the two objective heuristic method, the improved configuration method, the network slice layout method and the method in this paper. The comparison results are shown in Fig.6.

Open in a separate window

Figure 6

Average network latency of different methods.

As evident from Fig.6, in the 5G low orbit constellation network slicing environment, as the length of the service function chain (SFC) increases, encompassing more network components and services, the processing and communication time also elongates, leading to a corresponding rise in the average delay of the four methods. For a given SFC length, the double objective heuristic method generates the highest average delay, indicating its inefficiency in handling SFCs and significant performance limitations in realizing the service function chain. While the improved configuration method shows some improvement compared to the double objective heuristic method, its average delay remains high and does not meet the desired performance levels. When the SFC length is 10, the network slicing method exhibits a low delay, but as the SFC length increases, its delay growth rate is the fastest, indicating that it performs better with shorter SFCs but declines more rapidly when dealing with longer ones. In contrast, the method proposed in this paper exhibits a slow delay growth rate, consistently remaining below 0.15s. This demonstrates the good stability and performance of the method when handling SFCs of varying lengths.

Request acceptance rate is an important method to evaluate the reliability of 5G low orbit constellation network slice mapping, which helps to understand the performance and stability of the system, and provides a basis for further optimization and improvement. The request acceptance rate is the ratio of the number of successfully mapped slice requests to the total number of arriving requests under the reliability threshold constraint. A higher reliability threshold means that more physical resources are needed to ensure the reliability of the service. In order to verify the reliability of 5G low orbit constellation network slice mapping in this method, in this simulation experiment, set the total number of requests to 20. When the slice reliability threshold is 0.93–0.99, compare the request acceptance rate of the dual objective heuristic method, improved configuration method, network slice orchestration method and this method, so as to evaluate the performance of the four methods in providing reliable services. Figure7 shows how the request acceptance rate of the four methods changes with the slice reliability threshold in the experimental simulation.

Open in a separate window

Figure 7

Request acceptance rates for different methods.

It is evident from Fig.7 that, with a fixed amount of physical resources, an increase in the reliability threshold leads to resource insufficiency, resulting in a downward trend in the acceptance rate percentage of 5G low orbit constellation network slice service requests. As the reliability threshold rises, to meet higher reliability demands, more redundant resources are required to handle potential service failures. This increased allocation of redundant resources reduces the availability of resources, placing greater pressure on the redundancy allocation of virtual network functions, which further decreases the request acceptance rate. The low acceptance rate observed in the double objective heuristic method suggests that the method is inefficient in resource allocation and redundancy management, resulting in a shortage of available resources. In comparison, the improved configuration method and slicing arrangement method show some improvement, but when the reliability threshold rises to 0.99, the slicing request acceptance rate drops to approximately 75%. However, the method presented in this paper achieves the highest acceptance rate percentage in all scenarios, surpassing 90%. This demonstrates that this method excels in both resource allocation and redundancy management, making more effective use of limited physical resources and enhancing service reliability.

As an important indicator to measure the performance of this method, the reward curve can intuitively display the change of the reward value of this method in the training process. By observing the trend of the reward curve, we can understand whether this method can gradually improve the performance in the training process and eventually become stable. If the reward curve shows a gradually increasing trend, And it reaches a stable state in the late training period, which will strongly prove the effectiveness of the method in this paper. At the same time, the loss curve is also an important basis for evaluating the performance of the method in this paper. The loss value directly reflects the loss of the algorithm in the training process, that is, the gap between the current strategy and the optimal strategy. With the training, the loss value should gradually decrease and eventually become stable. By analyzing the change trend of loss curve, the convergence effect of this method on the reliability mapping problem of 5G low orbit constellation network slice can be further verified. The verification results are shown in Fig.8.

Open in a separate window

Figure 8

Convergence effect of the method proposed in this paper.

Figure8a depicts the reward curve of the method presented in this paper. As the number of training iterations gradually increases, it is evident that the reward value obtained after each iteration exhibits a steadily increasing trend. Once the number of training iterations reaches approximately 170, the reward value begins to stabilize, suggesting that the method has gradually converged to a relatively stable strategy. However, during this process, a punishment mechanism is occasionally triggered, leading to a sudden dip in the reward value. The purpose of this punishment mechanism is to encourage the algorithm to further explore and optimize the strategy, thus preventing it from getting stuck in a local optimum. Figure8b illustrates the loss curve of the method. As the number of training iterations increases, it is noticeable that the loss function gradually decreases. In the initial training stages, the loss function decreases significantly, indicating rapid learning and optimization of the strategy. However, as training progresses, the decrease in the loss function becomes more gradual, ultimately reaching a relatively stable state after 150 to 250 training iterations. This indicates that the neural network has gradually converged, thus verifying the effectiveness of this method in addressing the reliability mapping issue of 5G low orbit constellation network slices.

Conclusion

The traditional network slice mapping method ignores the different reliability requirements of VNF, which leads to poor reliability of the slice. In order to ensure the reliability requirements of VNF, based on the 5G low orbit constellation network scenario, this paper studies the 5G low orbit constellation network slice reliability mapping method based on deep reinforcement learning. The experimental results prove that this method ensures the throughput, traffic transmission delay and data packet loss rate of 5G low orbit constellation network, improves the load balance of 5G low orbit constellation network, and thus improves the reliability of the network; Compared with other methods, this method has higher reliability with the same number of requests; This method uses node reliability importance mapping to carry out resource allocation and redundancy management, which can better identify key nodes and allocate more resources to them, thus improving the reliability and availability of network services.

In a larger network scenario, the state space that agents need to deal with (that is, possible network configuration, traffic patterns, etc.) will increase significantly, and the deep reinforcement learning algorithm needs to have the ability to deal with this large-scale state space to ensure that effective strategies can be found. With the increase of network scale, the computational requirements of deep reinforcement learning algorithm will increase accordingly, including the computational resources needed for training neural networks and the resources needed for implementing strategies in the actual environment. In order to meet these requirements, high-performance computing resources, such as GPU cluster or cloud computing platform, need to be adopted. In addition, the design of the algorithm also needs to consider how to effectively use these resources to achieve better scalability.

Ethical approval

The research met all applicable standards for the ethics of experimentation.

Author contributions

Yunjie Xiao: Writing—Original Draft Preparation, Writing—Review and Editing, Investigation, Conceptualization, Formal Analysis Nan Li: Data Curation, Writing—Original Draft Preparation, Visualization, Writing—Review and Editing Jiangtao Yu: Investigation, Visualization, Conceptualization, Writing—Review and Editing Baozhu Zhao: Resources, Supervision, Formal Analysis, Writing—Review and Editing Dawei Chen: Methodology, Formal Analysis, Writing—Review and Editing Zhengrong Wei: Software, Validation, Writing—Review and Editing

Data availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

1. Valente F, Eramo V, Lavacca FG. Optimal bandwidth and computing resource allocation in low earth orbit satellite constellation for earth observation applications. Comput. Netw. 2023;232(8):1098491–1109849. [Google Scholar]

2. Datar M, Altman E, Le Cadre H. Strategic resource pricing and allocation in a 5g network slicing stackelberg game. IEEE Trans. Netw. Serv. Manage. 2023;20(1):502–520. doi:10.1109/TNSM.2022.3216588. [CrossRef] [Google Scholar]

3. Soret B, Leyva-Mayorga I, Cioni S, Popovski P. 5g satellite networks for internet of things: offloading and backhauling. Int. J. Satell. Commun. Network. 2021;39(4):431–444. doi:10.1002/sat.1394. [CrossRef] [Google Scholar]

4. Tsuchida H, Kawamoto Y, Kato N, Kaneko K, Aruga H. Efficient power control for satellite-borne batteries using q-learning in low-earth-orbit satellite constellations. IEEE Wireless Communications Letters. 2020;9(6):809–812. doi:10.1109/LWC.2020.2970711. [CrossRef] [Google Scholar]

5. Wang W, Chen T, Ding R, Seco-Granados G, Gao X. Location-based timing advance estimation for 5g integrated leo satellite communications. IEEE Trans. Veh. Technol. 2021;70(6):6002–6017. doi:10.1109/TVT.2021.3079936. [CrossRef] [Google Scholar]

6. Yu H, Musumeci F, Zhang J, Tornatore M, Ji Y. Isolation-aware 5g ran slice mapping over wdm metro-aggregation networks. J. Lightwave Technol. 2020;38(6):1125–1137. doi:10.1109/JLT.2020.2973311. [CrossRef] [Google Scholar]

7. Thiruvasagam PK, Kotagi VJ, Murthy CSR. A reliability-aware, delay guaranteed, and resource efficient placement of service function chains in softwarized 5g networks. IEEE Trans. Cloud Comput. 2020;10(3):1515–1531. doi:10.1109/TCC.2020.3020269. [CrossRef] [Google Scholar]

8. Zanzi L, Sciancalepore V, Garcia-Saavedra A, Schotten HD, Costa-Perez X. Laco: a latency-driven network slicing orchestration in beyond-5g networks. IEEE Trans. Wireless Commun. 2021;20(1):667–682. doi:10.1109/TWC.2020.3027963. [CrossRef] [Google Scholar]

9. Manogaran G, Ngangmeni J, Stewart J, Rawat DB, Nguyen TN. Deep-learning-based concurrent resource allocation method for improving the service response of 6g network-in-box users in uav. IEEE Internet Things J. 2023;10(4):3130–3137. doi:10.1109/JIOT.2021.3119336. [CrossRef] [Google Scholar]

10. Shabka Z, Zervas G. Network-aware compute and memory allocation in optically composable data centers with deep reinforcement learning and graph neural networks. J. Opt. Commun. Netw. 2023;15(2):133–143. doi:10.1364/JOCN.478944. [CrossRef] [Google Scholar]

11. Lin Z, Lin Z, Huang Z. Low latency and high-reliability data query algorithm in deep double Q network. Comput. Simul. 2021;38(8):417–420. [Google Scholar]

12. Lee Y, Choi JP. Connectivity analysis of mega-constellation satellite networks with optical intersatellite links. IEEE Trans. Aerosp. Electr. Syst. 2021;57(6):4213–4226. doi:10.1109/TAES.2021.3090914. [CrossRef] [Google Scholar]

13. Mcdonell T. Orchestrating a new multi-orbit broadband constellation. Space News Int. 2021;32(9):15–16. [Google Scholar]

14. Goncalves DM, Puliafito C, Mingozzi E, Bittencourt LF, Madeira ERM. End-to-end network slicing in vehicular clouds using the mobfogsim simulator. Ad hoc Netw. 2023;141(5):11–113. [Google Scholar]

15. Saibharath S, Hota C, Mishra S. Joint qos and energy-efficient resource allocation and scheduling in 5g network slicing. Comput. Commun. 2023;202(5):110–123. [Google Scholar]

16. Rajagopal A, Ramachandran A, Shankar K, Khari M, Joshi GP. Optimal routing strategy based on extreme learning machine with beetle antennae search algorithm for low earth orbit satellite communication networks. Int. J. Satell. Commun. Netw. 2020;39(3):305–317. doi:10.1002/sat.1391. [CrossRef] [Google Scholar]

17. Demizu T, f*ckazawa Y, Morita H. Inventory management of new products in retailers using model-based deep reinforcement learning. Expert Syst. Appl. 2023;229(11):1202561–12025611. [Google Scholar]

18. Paul A, Mitra S. Deep reinforcement learning based cooperative control of traffic signal for multi-intersection network in intelligent transportation system using edge computing. Trans. Emerg. Telecommun. Technol. 2022;33(11):45881–458825. [Google Scholar]

19. Ahmad A, Kumar N. Knowledge-based flexible resource allocation optimisation strategy for multi-tenant radio access network slicing in 5g and b5g. Int. J. Ad Hoc Ubiquitous Comput. 2023;42(2):124–135. doi:10.1504/IJAHUC.2023.10053535. [CrossRef] [Google Scholar]

20. Chen W, Smieliauskas W, Liu S. Study on the reliability assessment and early-warning method of online auditing based on the perspective of it control. Grey Syst. Theory Appl. 2020;11(3):484–497. doi:10.1108/GS-09-2019-0032. [CrossRef] [Google Scholar]

21. Liu YC, Zhang JN. Service function chain embedding meets machine learning: Deep reinforcement learning approach. IEEE Trans. Netw. Serv. Manag. 2024;15(1):1–11. [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

Research on reliability mapping of 5G low orbit constellation network slice based on deep reinforcement learning (2024)
Top Articles
How to Cut Up a Rabbit for Cooking - Hunter Angler Gardener Cook
How to Introduce New Chickens (Without Too Much Trouble)
Cpmc Mission Bernal Campus & Orthopedic Institute Photos
Knoxville Tennessee White Pages
Can ETH reach 10k in 2024?
Watch Mashle 2nd Season Anime Free on Gogoanime
35105N Sap 5 50 W Nit
Toyota gebraucht kaufen in tacoma_ - AutoScout24
Mylife Cvs Login
Baseball-Reference Com
U.S. Nuclear Weapons Complex: Y-12 and Oak Ridge National Laboratory…
Qhc Learning
Directions To O'reilly's Near Me
Chile Crunch Original
Morgan And Nay Funeral Home Obituaries
Money blog: Domino's withdraws popular dips; 'we got our dream £30k kitchen for £1,000'
How To Cut Eelgrass Grounded
Brett Cooper Wikifeet
Napa Autocare Locator
Tinker Repo
Hyvee Workday
How your diet could help combat climate change in 2019 | CNN
Gina Wilson All Things Algebra Unit 2 Homework 8
Craigslist Roseburg Oregon Free Stuff
Jayme's Upscale Resale Abilene Photos
Jackie Knust Wendel
Craigslist Ludington Michigan
Cor Triatriatum: Background, Pathophysiology, Epidemiology
Mynahealthcare Login
Rural King Credit Card Minimum Credit Score
Big Boobs Indian Photos
Healthy Kaiserpermanente Org Sign On
The Procurement Acronyms And Abbreviations That You Need To Know Short Forms Used In Procurement
RUB MASSAGE AUSTIN
Scottsboro Daily Sentinel Obituaries
How much does Painttool SAI costs?
Fapello.clm
Gold Dipping Vat Terraria
Keir Starmer looks to Italy on how to stop migrant boats
2 Pm Cdt
Alpha Labs Male Enhancement – Complete Reviews And Guide
Ucla Basketball Bruinzone
Huntsville Body Rubs
Amateur Lesbian Spanking
Syrie Funeral Home Obituary
Food and Water Safety During Power Outages and Floods
Definition of WMT
How to Do a Photoshoot in BitLife - Playbite
Free Carnival-themed Google Slides & PowerPoint templates
How to Get a Check Stub From Money Network
683 Job Calls
Att Corporate Store Location
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6668

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.