Structure-Aware Reinforcement Learning for Node-Overload Protection in Mobile Edge Computing
نویسندگان
چکیده
Mobile Edge Computing (MEC) involves placing computational capability and applications at the edge of network, providing benefits such as reduced latency, network congestion, improved performance applications. The reliability MEC degrades significantly when server(s) in cluster are overloaded. In this work, an adaptive admission control policy to prevent node from getting overloaded is presented. This approach based on a recently-proposed low complexity RL (Reinforcement Learning) algorithm called SALMUT (Structure-Aware Learning for Multiple Thresholds), which exploits structure optimal multi-class queues average-cost setting. We extend framework work overload-protection problem discounted-cost proposed solution validated using several scenarios mimicking real-world deployments two different settings — computer simulations docker testbed. Our empirical evaluations show that total discounted cost incurred by similar state-of-the-art deep algorithms PPO (Proximal Policy Optimization) A2C (Advantage Actor Critic) but requires order magnitude less time train, outputs easily interpretable policy, can be deployed online manner.
منابع مشابه
Performance Optimization in Mobile-Edge Computing via Deep Reinforcement Learning
To improve the quality of computation experience for mobile devices, mobile-edge computing (MEC) is emerging as a promising paradigm by providing computing capabilities within radio access networks in close proximity. Nevertheless, the design of computation offloading policies for a MEC system remains challenging. Specifically, whether to execute an arriving computation task at local mobile dev...
متن کاملDeep Learning for Secure Mobile Edge Computing
Mobile edge computing (MEC) is a promising approach for enabling cloud-computing capabilities at the edge of cellular networks. Nonetheless, security is becoming an increasingly important issue in MEC-based applications. In this paper, we propose a deep-learning-based model to detect security threats. The model uses unsupervised learning to automate the detection process, and uses location info...
متن کاملSecurity in Mobile Edge Caching with Reinforcement Learning
Mobile edge computing usually uses cache to support multimedia contents in 5G mobile Internet to reduce the computing overhead and latency. Mobile edge caching (MEC) systems are vulnerable to various attacks such as denial of service attacks and rogue edge attacks. This article investigates the attack models in MEC systems, focusing on both the mobile offloading and the caching procedures. In t...
متن کاملA context-aware cache structure for mobile computing environments
This paper proposes a cache management method that maintains a mobile terminal’s cache content by prefetching data items with maximum benefit and evicting cache data entries with minimum benefit. The data item benefit is evaluated based on the user’s query context which is defined as a set of constraints (predicates) that define both the movement pattern and the information context requested by...
متن کاملMobile Edge Computation Offloading Using Game Theory and Reinforcement Learning
Due to the ever-increasing popularity of resourcehungry and delay-constrained mobile applications, the computation and storage capabilities of remote cloud has partially migrated towards the mobile edge, giving rise to the concept known as Mobile Edge Computing (MEC). While MEC servers enjoy the close proximity to the end-users to provide services at reduced latency and lower energy costs, they...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cognitive Communications and Networking
سال: 2022
ISSN: ['2332-7731', '2372-2045']
DOI: https://doi.org/10.1109/tccn.2022.3195503