Keywords

1 Introduction

Powered by cloud computing and virtualisation techniques, Network softwarisation has paved the way for a holistic transformation of the underlying monolithic ICT infrastructure into a software-defined infrastructure where the legacy hardware-based networking components are replaced by software-based functions executed on general-purpose hardware [1, 17]. While this increases the flexibility in deployment, operation and management of immersive next generation services, it is also expected to significantly improve the revenue of the network operators [22]. To leverage the benefits of network softwarisation, NGMN proposes the concept of Network slicing as a basis for enabling co-existence of a myriad of logical, self-sufficient, autonomous networks with distinct attributes on a shared substrate platform further opening up newer business prospects in the form of Over-The-Top (OTT) content/service providers such as Amazon, Hulu, Netflix [23, 24]. Each of these logical networks, henceforth termed as network slices, represents an abstraction of a fraction of the shared physical substrate network resources tailored to meet customer/vertical-specific performance requirements.

Network slicing has gained traction in the recent years for its ability to provide “on-demand", end-to-end slices composed of an assortment of compute, storage, network, radio resources for a wide array of verticals/use-cases thereby empowering network operators to achieve the stringent yet diverse requirements of the emerging next generation (5G) services [19, 24, 26]. For example, deploying a network slice along a dynamic railway corridor will require very specific characteristics like high mobility, low latency and low throughput whereas a slice dedicated for collaborative automation within an industrial environment demands high reliability, guaranteed throughput with a relaxed mobility policy. Notwithstanding the imminent benefits, realising network slicing in practise entails several algorithmic challenges ranging from efficient resource provisioning mechanisms to online admission control policies [29].

Earlier proposals handled network slicing exclusively as a resource partitioning problem as in the virtual network embedding (VNE) problem addressed in [10, 16, 18]. Recent works have attempted to broaden the problem statement from merely assigning substrate network resources to pre-defined network slice requests to encompassing the design of the individual network slices (i.e., the network slice topology, the number of required virtual functions, their dimensioning, and the interconnections) as well as considering the impact of the stochastic traffic demands in the problem formulation [3, 4]. In this work, we consider the problem of designing a large-scale logical network slice capable of handling the uncertain nature of traffic demands proposed in [4]. We first present an exact formulation for the network slice design problem (NSDP) under uncertainty where the uncertain traffic demands in the network slice request are characterised using the multi-band uncertainty model proposed by Büsing and D’Andreagiovanni [9]. The multi-band uncertainty model extends the \(\varGamma \)-robustness model [5] by partitioning the deviation interval into multiple sub-intervals thereby returning solutions with reduced conservatism without compromising on their robustness guarantees against traffic uncertainty.

The robust counterpart of the network slice design problem is known to pose computational challenges to state-of-the-art commercial mixed integer programming (MIP) solvers due to the inclusion of robust constraints. This observation is in line with prior works that tackle the presence of uncertainty in the problem formulation as in [10, 11]. Inspired by the performance of the ant colony optimisation (ACO) algorithms on several real-world problems such as the travelling salesman problem (TSP), vehicle routing problem (VRP) and so on [8], we propose a meta-heuristic approach to solve the robust network slice design problem. Our approach employs the \(\mathcal {MAX-MIN}\) ant system [27] variant of the ACO algorithms within a hyper-cube framework [7] to guide the variable fixing procedure for the considered problem. Experiments conducted on a range of realistic network topologies from SNDlib [25] reveal that the proposed ACO-based meta-heuristic returns solutions of improved quality in comparison to the commercial MIP solvers.

The paper is structured as follows: We present a mathematical model for the robust NSDP by employing a multi-band uncertainty model in Sect. 2 followed by our ant colony optimisation approach to solve the robust NSDP in Sect. 3. Experimental results are presented in Sect. 4 with a conclusion in Sect. 5.

2 Robust Network Slice Design

In this section, we present the mathematical model for the robust network slice design problem. The physical substrate network infrastructure is modelled as an undirected graph G composed of a network of nodes V connected by edges E. The residual (i.e. unused) capacities of the nodes and edges are denoted by \(c^{0}_{v} \in \mathbb {R}_{\ge 0}\) and \(c^{0}_{e} \in \mathbb {R}_{\ge 0}\), respectively. The costs per allocated unit of the substrate network resources to the network slice is given by \(\gamma ^{0}_{v} \in \mathbb {R}_{+}\) and \(\gamma ^{0}_{e} \in \mathbb {R}_{+}\), respectively. Additionally, we allow the expansion of substrate network capacity in discrete steps of size \(c_{v} \in \mathbb {Z}_{+}\) and \(c_{e} \in \mathbb {Z}_{+}\) incurring a one-time installation costs denoted by \(\gamma _{v} \in \mathbb {R}_{+}\) and \(\gamma _{e} \in \mathbb {R}_{+}\), respectively.

We assume the network slice to be composed of a set of demands K, where each demand k is associated with an uncertain traffic volume \(d^{k} \in \mathbb {R}\) that must be routed from source \(s^{k}\) to destination \(t^{k}\) through a sequence of network functions \(F^{k} = \langle f_{i} \mid i\in \mathbb {N} \rangle \) usually derived from the corresponding service graph [2]. To comply with the restrictions arising due to technological, economic or geographical limitations, or security issues, we assume that only a subset of the substrate nodes \(V(f_{i}) \subseteq V\) are capable of offering the functionality \(f_{i}\) in virtual modules of size \(c_{f} \in \mathbb {Z}_{+}\).

In this work, we cast the NSDP under uncertainty within a layered graph framework [20]. This is achieved through the following steps: The given undirected graph G is converted into a directed graph \(G^{\prime } = (V, A)\), where for every edge \(\{u,v\} \in E\) we add two arcs (uv), (vu) to A. The digraph \(G^{\prime }\) is then transformed into a layered graph \(G^{k}_{L} = (V^{k}_{L}, A^{k}_{L})\), where the newly-constructed vertex set \(V^{k}_{L} = \{v_{i} \mid v\in V, 1 \le i \le \vert F^{k} \vert + 1\}\) is obtained by creating \(\vert F^{k} \vert + 1\) copies of the nodes in V. We retain the connection of the vertices according to the original digraph \(G^{\prime }\) to obtain \(A^{k, E}_{L} = \{ (u_{i},v_{i}) \mid (u,v) \in A, 1 \le i \le \vert F^{k} \vert + 1 \}\). We then encode the potential routing of the demand k through the network functions \(F^{k}\) by creating a set of inter-layer arcs \(A^{k, V}_{L} = \{ (v_{i}, v_{i+1}) \mid v\in V(f_i), 1 \le i \le \vert F^{k} \vert \}\). Finally, we let \(A^{k}_{L} = A^{k,V}_{L} \cup A^{k,E}_{L}\) to complete the transformation.

A formal problem statement for the robust network slice design problem can now be stated as:

Definition 1

The robust network slice design problem. Let \(G = (V,E)\) denote the physical substrate network infrastructure with residual node and edge capacities \(c^{0} :V \rightarrow \mathbb {R}_{\ge 0}\) and \(c^{0} :E \rightarrow \mathbb {R}_{\ge 0}\) expressed in bits per second, whose costs per occupied unit bandwidth is given as \(\gamma ^{0} :V \rightarrow \mathbb {R}_{\ge 0}\) and \(\gamma ^{0} :E \rightarrow \mathbb {R}_{\ge 0}\). Let the node and edge capacities be expanded, optionally, in discrete steps of size \(c :V \rightarrow \mathbb {Z}_{+}\) and \(c :V \rightarrow \mathbb {Z}_{+}\) costing \(\gamma :V \rightarrow \mathbb {Z}_{\ge 0}\) and \(\gamma :E \rightarrow \mathbb {Z}_{\ge 0}\) per unit module of installed capacity. Given a set of demands K, where each demand k is associated with an uncertain traffic flow of volume \(d :K \rightarrow \mathbb {R}\) from \(s^{k}\) to \(t^{k}\) through a sequence of network functions \(F^{k}\), the robust network slice design problem on a transformed layered graph instance \(G^{k}_{L} = (V^{k}_{L}, A^{k}_{L})\) concerns routing the uncertain traffic volume of each demand over the layered graph instance such that the cumulative costs of substrate resource utilisation and potential capacity expansions to host the network slice are minimised.

To this end, we employ the following family of decision variables to model the robust NSDP. Variables \(x^{k}_{a} \in \{0,1\}\) indicate if demand k is routed over arc a of the layered graph. Variables \(y_{vf} \in \mathbb {Z}_{\ge 0}\) specify the number of virtual modules allocated to the network function f hosted on node v. Variables \(y_{v} \in \mathbb {Z}_{\ge 0}\) and \(y_{e} \in \mathbb {Z}_{\ge 0}\) specify the number of capacity modules installed on the nodes and edges of the substrate network, respectively. The robust network slice design problem takes the form:

$$\begin{aligned} \min \max _{d\in \mathcal {D}} \quad&\sum _{v \in V}\gamma _{v}y_{v} + \sum _{f\in F}\sum _{v\in V(f)}\gamma ^{0}_{v}c_{f}y_{vf} \nonumber \\&+ \sum _{e\in E}\gamma _{e}y_{e} +\sum _{e\in E}\sum _{k\in K}\sum _{a \in A^{k,E}_{L}(e)}\gamma ^{0}_{e}d^{k}x^{k}_{a} \end{aligned}$$
(1a)
$$\begin{aligned} \text {s.t.}\quad&\sum _{a \in \delta ^{+}_{v}}x^{k}_{a} - \sum _{a \in \delta ^{-}_{v}}x^{k}_{a} = b^{k}\qquad \qquad \qquad \qquad \qquad \forall v \in V^{k}_{L}, k\in K \end{aligned}$$
(1b)
$$\begin{aligned}&\sum _{k\in K:f\in F^{k}}\sum _{a\in A^{k,V}_{L}(f,v)} d^{k}x^{k}_{a} \le c_{f}y_{vf} \qquad \forall d\in \mathcal {D}, f\in F, v\in V(f) \end{aligned}$$
(1c)
$$\begin{aligned}&\sum _{f\in F:v\in V(f)} c_{f}y_{vf} \le c^{0}_{v} + c_{v}y_{v} \qquad \qquad \qquad \qquad \qquad \forall v \in V \end{aligned}$$
(1d)
$$\begin{aligned}&\sum _{k\in K}\sum _{a \in A^{k,E}_{L}(e)} d^{k}x^{k}_{a} \le c^{0}_{e} + c_{e}y_{e}\qquad \qquad \qquad \quad \forall d\in \mathcal {D}, e \in E \end{aligned}$$
(1e)
$$\begin{aligned}&x^{k}_{a} \in \{0,1\} \end{aligned}$$
(1f)
$$\begin{aligned}&y_{vf}, y_{v}, y_{e} \in \mathbb {Z}_{\ge 0} \end{aligned}$$
(1g)

Objective function (1a) minimises, for the worst-case realisation of the uncertain demands, the sum of capacity consumption and capacity installation costs for accommodating the network slice request on the substrate network infrastructure. Constraints (1b) are standard flow conservation constraints, where \(b^{k} = 1\) if \(v = s^{k}\), \(b^{k} = -1\) if \(v = t^{k}\), else 0. Constraints (1c) denote the capacity requirements of the network functions on the substrate nodes. Constraints (1d) and (1e) ensure that the consumption of the substrate network resources doesn’t exceed the available capacity (residual and installed together) at the substrate nodes and edges, respectively. Note that constraints (1c) and (1e) must hold good for every realisation of the uncertain traffic flow d contained in the uncertainty set \(\mathcal {D}\).

2.1 Multi-band Uncertainty Model

We consider the multi-band uncertainty model proposed in [9] to design the uncertainty set \(\mathcal {D}\) for the robust NSDP. Under this model, we assume the uncertain coefficient \(d^{k}, \forall k\in K\) to be an independent and bounded random variable represented by the nominal (or forecast) traffic volume \(\bar{d}^{k} > 0\) and a deviation from the forecast traffic volume \(\hat{d}^{k}\) belonging to the deviation range \([\hat{d}^{k}_{R^{-}},\hat{d}^{k}_{R^{+}}]\), where \(\hat{d}^{k}_{R^{-}} < 0\) and \(\hat{d}^{k}_{R^{+}} > 0\) represent the maximum negative and positive deviation from the forecast traffic volume \(\bar{d}^{k}\). The deviation range of each uncertain coefficient is partitioned into \(R = R^{-} + 1 + R^{+}\) disjoint ranges on the basis of R deviation values:

$$\begin{aligned} -\infty< \hat{d}^{k}_{R^{-}}< \cdots< \hat{d}^{k}_{-1}< \hat{d}^{k}_{0} = 0< \hat{d}^{k}_{1}< \cdots< \hat{d}^{k}_{R^{+}} < \infty \end{aligned}$$

A band \(r \in \{R^{-}+1, \cdots , R^{+}\}\) now corresponds to the range \((\hat{d}^{k}_{r-1}, \hat{d}^{k}_{r}]\), and band \(r = R^{-}\) corresponds to the single value \(\hat{d}^{k}_{R^{-}}\). We impose a lower bound \(\theta _{r}\) and an upper bound \(\varTheta _{r}\) on the number of realisations of the uncertain traffic coefficients in band r, where \(0 \,{\le }\, \theta _{r} \,{\le }\, \varTheta _{r} \,{\le }\,\vert K \vert \) with \(\varTheta _{0} = \vert K \vert \). To guarantee a feasible realisation of the uncertain traffic coefficients, we ensure \(\sum _{r\in \{R^{-}, \cdots , R^{+}\}}\theta _{r} \le \vert K \vert \).

The multi-band uncertainty set for the robust NSDP can now be defined as:

$$\begin{aligned} \mathcal {D} = \{ d^{k}\in \mathbb {R} \mid d^{k} = \bar{d}^{k} + \sum ^{r=R^{+}}_{r=R^{-}}\hat{d}^{k}_{r}z^{k}_{r}, \forall k\in K, z \in \mathcal {Z} \} \end{aligned}$$

where

$$\begin{aligned} \mathcal {Z} = \big \{ \theta _{r} \le \sum _{k\in K}z^{k}_{r} \le \varTheta _{r}&\qquad \forall r\in \{R^{-}, \cdots , R^{+}\} \\ \sum ^{r=R^{+}}_{r=R^{-}}\hat{d}^{k}_{r}z^{k}_{r} = 1&\qquad \forall k\in K \\ z^{k}_{r} \in \{0,1\}&\big \} \end{aligned}$$

2.2 The Multi-band Robust NSDP

Since the goal of the decision maker is to be protected against the worst-case realisation of the uncertain traffic coefficients in multi-band uncertainty set \(\mathcal {D}\), we introduce additional terms \(\text {DEV}^{\varGamma }_{vf}(x, \mathcal {D})\) and \(\text {DEV}^{\varGamma }_{e}(x, \mathcal {D})\) in every equation affected by the uncertain coefficients \(d^{k}\) in the robust NSDP indicating additional capacities required at the network functions and the substrate edges in order to cope with traffic uncertainty. These terms, however, render the robust NSDP formulation non-linear and can be linearised by transforming the inner maximisation problem into its dual equivalent as follows:

$$\begin{aligned} \text {DEV}^{\varGamma }_{vf}(x, \mathcal {D}) = \max&\sum _{k\in K:f\in F^{k}}\sum _{a\in A^{k,V}_{L}(f,v)}\sum _{r\in R}\hat{d}^{k}_{r}x^{k}_{a} z^{k}_{rvf} \end{aligned}$$
(2a)
$$\begin{aligned} \text {s.t.}&\sum _{k\in K:f\in F^{k}} z^{k}_{rvf} \le \varGamma _{r}\qquad \qquad \forall r\in R \end{aligned}$$
(2b)
$$\begin{aligned}&\sum _{r\in R} z^{k}_{rvf} \le 1 \qquad \quad \forall k\in K:f\in F^{k} \end{aligned}$$
(2c)
$$\begin{aligned}&z^{k}_{rvf} \in \{0,1\} \end{aligned}$$
(2d)

where binary variables \(z^{k}_{rvf}, \forall k\in K:f\in F^{k}, r\in R\) take the value 1 if the coefficient \(\hat{d}^{k}\) falls in the r-th band. Objective function (2a) maximises the worst-case deviation for each constraint (1c). Constraints (2b) ensure that not more than \(\varGamma _{r}\) coefficients deviate in each band whereas constraints (2c) impose that each coefficient deviates in at most one band. As the constraint matrix of the problem is totally unimodular [9], variables \(z^{k}_{rvf}\) can be relaxed. By virtue of strong LP duality, the resulting LP can be replaced by its dual equivalent:

$$\begin{aligned} \text {DEV}^{\varGamma }_{vf}(x, \mathcal {D}) = \min&\sum _{r\in R} \varGamma _{r}\pi ^{r}_{vf} + \sum _{k\in K:f\in F^{k}}\rho ^{k}_{vf} \end{aligned}$$
(3a)
$$\begin{aligned} \text {s.t.}&\ \pi ^{r}_{vf} + \rho ^{k}_{vf} \ge \sum _{a \in A^{k,V}_{L}(f,v)}\hat{d}^{k}_{r}x^{k}_{a} \nonumber \\&\qquad \qquad \qquad \qquad \qquad \quad \,\,\,\forall r\in R, k\in K:f\in F^{k}\end{aligned}$$
(3b)
$$\begin{aligned}&\pi ^{r}_{vf}, \rho ^{k}_{vf} \in \mathbb {R}_{\ge 0} \end{aligned}$$
(3c)

where \(\pi ^{r}_{vf}, \forall r\in R\) and \( \rho ^{k}_{vf}, \forall k\in K: f\in F^{k}\) are dual variables. The dual equivalent of \(\text {DEV}^{\varGamma }_{e}(x,\mathcal {D})\) can be obtained in a similar fashion. Substituting the inner maximisation problems with their dual equivalents, we can obtain the compact reformulation of the robust NSDP for the multi-band uncertainty set.

3 An ACO-Based Meta-Heuristic for the Robust NSDP

In the previous section, we presented a compact reformulation of the robust NSDP for the multi-band uncertainty set. Through the inclusion of (hard) robust constraints in the formulation, we restrict the solution space to contain only those solutions that are robust against traffic uncertainty. Such inclusion is known to pose computational challenges to state-of-the-art commercial MIP solvers such as CPLEX as observed in [4, 11, 12]. To circumvent this computational difficulty, we present a resolution method that employs the \(\mathcal {MAX-MIN}\) ant system [27] variant of the ACO algorithms within a hyper-cube framework [7] to solve the robust NSDP.

Ant colony optimisation is a stochastic meta-heuristic that draws influence from the foraging behaviour of real ants [13]. A standard ACO meta-heuristic involves a family of computing agents iteratively constructing candidate solutions for the considered problem by means of probabilistic sampling from a set of solution components. Each solution component is typically associated with two values of attractiveness - an a-priori pheromone trail value and an a-posteriori desirability value - that influence the transition probability of the solution components. During the construction phase, a computing agent makes a probabilistic move from the current state (with a partial solution) to the next state by augmenting the incumbent solution with a new solution component until a complete solution is found. The probability of selecting the next move from a set of plausible moves is usually governed by a state transition rule. Upon the completion of the solution construction phase, the pheromone trail values of the solution components are reinforced essentially creating a positive feedback mechanism to aid the construction of improved solutions. The process is repeated until a termination condition is satisfied. For an exhaustive introduction to the theory and applications of ACO algorithms, we refer the reader to the works of [8, 14].

3.1 A Meta-Heuristic for the Multi-band Robust NSDP

In this section, we sketch our meta-heuristic that employs the \(\mathcal {MAX-MIN}\) ant system within a hyper-cube framework to guide the decision making strategy for our robust NSDP. A crucial decision within the problem formulation is to determine the routing paths for the network slice demands K in given substrate network infrastructure. Once the routing template for the network slice demands is identified, we can easily compute the capacities required to support the identified routing template to complete the robust network slice design solution. We accomplish the vital task of identifying the routing template through the ant-based solution construction module. Algorithm 1 presents a high-level description of the proposed ACO-based meta-heuristic. In the following, we explain, in further detail, the different phases involved in the meta-heuristic.

figure a

Initialisation. In the first step, we set the global-best (\(x^{gb}, y^{gb}\)) and restart-best (\(x^{rb}, y^{rb}\)) ant solutions to a null value, the convergence factor cf to 0, and the boolean variable \(gb\_update\) to false. Similar to [7], the pheromone trail values \(\mathrm {T}\) are initialised to 0.5.

Ant-Based Solution Construction. The algorithm starts with a family of \(\varPsi > 0\) computing agents that set out to build feasible solutions to the multi-band robust NSDP at each iteration. Within the inner construction loop, agent \(\psi \in \varPsi \) incrementally constructs the solution to the problem as outlined in the ConstructNSDP\(\left( \mathrm {T}\right) \) module. For every \(k\in K\), agent \(\psi \) probabilistically selects a path p from the set of candidate paths \(P_{k}\) over which the traffic of the demand k can be possibly routed. The probabilities of the candidate paths to feature in the solution are determined by the following state transition rule proposed in [21]:

$$\begin{aligned} \mathfrak {pr}^{\psi }_{pk} = \frac{\alpha \cdot \tau _{pk} + (1-\alpha ) \cdot \eta _{pk}}{\sum _{p\in P_{k}}{\alpha \cdot \tau _{pk} + (1-\alpha ) \cdot \eta _{pk}}} \end{aligned}$$
(4)

where \(\alpha \in [0,1]\) controls the level of influence of the pheromone trail value \(\tau \) and the desirability value \(\eta \). We remark that this rule has the advantage of using simpler computational operations and lesser parameters over the classical transition rule. Upon termination of the inner construction cycle by agent \(\psi \), we execute the variable fixing strategy for the robust NSDP as follows: For every demand k, we activate the arcs comprising the chosen routing path while deactivating the remaining arcs, consequently arriving at the fixing of the binary routing variables \(x^{k}_{a}\). Having established a complete routing template for the network slice request, we determine the number capacity modules \(y_{vf}\) to be allocated network functions \(f\in F\) using (1c). We then check if the substrate network has enough resources to fulfill the routing template under traffic uncertainty thereby deriving the fixings for variables \(y_{v}\), and \(y_{e}\), respectively. If no constraint of the problem is violated, we declare that the computing agent \(\psi \) has found a complete feasible solution to the multi-band robust NSDP, the costs for which can be assessed by using the equation (1a). A formal representation of the solution construction is depicted in Algorithm 2. At the end of the solution construction phase, we update variable \(\left( x^{ib}, y^{ib}\right) \) to contain the best solution found by the ants in the current iteration.

figure b

Pheromone Reinforcement. Traditional pheromone reinforcement models consider only the iteration-best solution to update the pheromone trails. We employ a rather sophisticated model to update the pheromone trail values of the candidate paths wherein the pheromone deposit each candidate path receives is influenced by three different solutions: the iteration-best \(\left( x^{ib}, y^{ib}\right) \), the restart-best \(\left( x^{rb}, y^{rb}\right) \) and the global-best \(\left( x^{gb}, y^{gb}\right) \) solutions. The level of influence of each of these solutions on the pheromone reinforcement depends on the state of convergence of the algorithm indicated by convergence factor cf. An update to the pheromone trail values is now performed by the following rule:

(5)

where \(\varrho \in (0,1]\) is the pheromone evaporation rate, and \(\tau ^{+}\), \(\tau ^{-}\) are the upper and lower bounds of the pheromone trail values. The update ensures that pheromone trail values of the solution components remain in the range [\(\tau ^{-}\), \(\tau ^{+}\)]. Finally, parameter \(\omega _{pk} \in [0,1]\) is expressed as:

(6)

where \(\kappa _{ib}\), \(\kappa _{rb}\), and \(\kappa _{gb}\) are the weights of the solutions \((x^{ib}, y^{ib})\), \((x^{rb}, y^{ib})\), and \((x^{gb}, y^{ib})\), respectively such that the total sum of the weights doesn’t exceed 1. These weights are chosen according to the schedule specified in Table 1. The term \(\delta \big (\left( x,y\right) , (p,k)\big ) \in \{0,1\}\) takes the value 1 if the solution component (pk) features in the solution (xy), else 0.

Table 1. The schedule for weights \(\kappa _{ib}\), \(\kappa _{rb}\), and \(\kappa _{gb}\) depending on the convergence factor cf and the Boolean update variable \(gb\_update\).

Convergence Factor. In the final phase of the solution construction, we compute the convergence factor cf which estimates the state of convergence of the algorithm using the formula (7). A convergence factor of \(cf \ge 0.999\) indicates that the algorithm has converged and the probability of finding better solutions in the future iterations is extremely low. To overcome this, the boolean variable \(gb\_update\) is set to true and the pheromone trail values are reset to 0.5.

(7)

This concludes one complete iteration of the ACO-based meta-heuristic for the robust NSDP. To accelerate the search towards solutions of improved quality, at every \(50^{th}\) iteration of the algorithm, we introduce a small number of elitist agents that conduct the probabilistic search on a smaller pool of the shortest candidate paths \(P^{e}_{k} \subset P_{k}\) for each demand k. As a result of working on a smaller solution space, these elitist ants may not only find solutions of (possibly) improved quality but also influence the search towards such solutions in the subsequent iterations.

4 Performance Evaluation

In this section, we validate the performance of the proposed solution methodologies using realistic problem instances. We consider ten different network topologies from SNDlib [25] to model the underlying substrate network infrastructure. For each network topology, the residual capacities of the nodes are drawn at random from the tuple (2.0,3.0,4.0) Tbps weighted by (0.3,0.4,0.3), and the cost per occupied unit of the node resources is set to EUR 12.5/Gbps. Auxiliary capacity modules of size 40 Gbps can be installed on the nodes at a cost of EUR 50,000 per module. The residual capacities of the edges are sampled at random from (0.2,0.3,0.4) Tbps with probability (0.3,0.4.0.3). The cost per occupied unit of the edge resources is set to EUR 5/Gbps. The capacity of the edges can be optionally expanded in steps of size 10 Gbps with each module costing EUR 20,000.Footnote 1

We consider the design of a network slice for the use-case of next generation emergency services for which the set of network functions comprising the service is assumed to be \(F = \langle \textsc {vf1}, \textsc {vf2}, \textsc {vf3}, \textsc {vf4}, \textsc {vf5}\rangle \). These network functions can be instantiated on substrate nodes in virtual modules of size 1 Gbps. For every network function \(f\in F\), we draw samples of size \(\lceil \vert V \vert / 2 \rceil \) uniformly at random from the physical substrate node set V to construct the candidate physical substrate nodes that support the functionality. Historical traffic traces for the demands of the network slice are generated using the following three-step procedure: First, for every demand k, we randomly draw a value from the tuple (10.0,20.0,50.0) Gbps with probability (0.3,0.4,0.3). Second, to enforce that the traffic coefficients \(d^k\) are normal distributed, for each demand k, we draw 1440 samples at random from a normal distribution of mean 0 and standard deviation of 50% of the respective value chosen in the first step. In the final step, the value determined in the first step is added to each of these 1440 samples to obtain the historical traffic traces. Each of the constructed problem instances is now solved using the proposed solution methodologies for bands \(\vert R \vert \in \{2,4,6\}\), encompassing the 68-95-99.7 areas of the normal distribution of the uncertain traffic demands.

We employ a single-threaded Linux machine with Intel® Core i3-3120M CPU @ 2.5GHz and 8 GB RAM to conduct the performance evaluation. The compact reformulation (1) is implemented in JuMP v0.18 [15] —a modelling language for mathematical optimisation embedded in Julia v0.6 [6] and is solved using IBM® ILOG® CPLEX® Optimization Studio v12.7.1 [28] with a time limit of 3600 s. The ACO-based meta-heuristic is coded in Julia v0.6 and a truncated time limit of 2400 s is imposed on each problem instance. The parameters of the ACO-based meta-heuristic are hand-tuned to the following values: Candidate paths considered for the construction of the network slice design solution are computed using the \(k-\)shortest path algorithm [30], where k is set to 10. Six computing agents are considered for the ant-based solution construction. Additionally, three computing agents periodically conduct an elitist search to find improved solutions in quick intervals. The lower and upper bounds for the pheromone trail values are fixed at \(\tau ^{-} = 0.001\) and \(\tau ^{+}=0.999\), respectively and the pheromone evaporation rate \(\varrho \) is set to 0.1.

We evaluate the performance of the proposed solution methods by comparing the absolute gap of the slice design solutions obtained from the respective methods. The absolute gap of a solution is defined as the difference between its best integer objective value and the best lower bound to the problem (returned by CPLEX). Table 2 reports the absolute gaps of the robust network slice design solutions obtained from the considered solutions methodologies, where \(|R |\) indicates the number of bands employed in the multi-band uncertainty set to capture the uncertain traffic coefficients, “LB" indicates the lower bound to the considered problem instance which, in this case, is produced by CPLEX, and the values under columns labelled “Exact" and “ACO" indicate the absolute gaps of the robust network slice design solutions obtained from the commercial MIP solver CPLEX and the ACO-based meta-heuristic.

Firstly, the absolute gaps of the robust network slice design solutions from CPLEX are observed to be exceedingly high as compared to their ACO-based counterparts consequently rendering these solutions cost-ineffective to implement in practise. In addition, for 27% of the problem instances, CPLEX couldn’t find a non-trivial solution. Despite solving these failed instances using a computationally powerful IBM Decision Optimisation on Cloud service, we observed a negligible improvement in the absolute gaps of the solutions (in the range of 0–3%). We remark that this behaviour is in line with many of the previous works where the robust counterparts were often hard to solve for the commercial MIP solvers thereby justifying the need for scalable heuristic methods [4, 11]. The ACO-based meta-heuristic, on the other hand, performs significantly better by yielding solutions of reduced absolute gap for 97% of the considered instances. In most cases, we observe that these solutions are at least an order of magnitude better when compared to the state-of-the-art commercial MIP solvers. The improved performance of the ACO-based meta-heuristic is particularly evident for larger problem instances (i.e., germany50, janos-us, pioro40) thereby establishing the effectiveness of the proposed ACO-based meta-heuristic.

Table 2. Numerical results for the robust network slice design problem.

In order to further assess the performance of the meta-heuristic, we develop a simple greedy algorithm to solve the robust NSDP and compare the resulting solution costs with that of the proposed ACO-based meta-heuristic. The algorithm employs a greedy strategy of routing each demand k of the network slice request over the shortest path in the substrate network infrastructure. In the next step, the binary routing variables \(x^{k}_{a}\) are fixed to reflect the shortest path routings for each demand. After setting up the routing template for the network slice, the remaining variables and the costs of the constructed solution are derived similar to the procedure outlined in Algorithm 2. While the solutions returned by the simple greedy algorithm outperform those of CPLEX for 29 of the considered problem instances, these solutions are still found to be of inferior quality when compared to those of our ACO-based meta-heuristic.

Fig. 1.
figure 1

Evolution of the objective value of the robust network slice design solutions yielded by the ACO-based meta-heuristic for bands \(|R |\in \{2,4,6\}\).

We now focus on the performance of the ACO-based meta-heuristic over the course of its execution. Figure 1 traces the evolution of the costs of the robust network slice design solutions during the ACO-based meta-heuristic execution for two exemplary networks: janos-us and pioro40. We observe from Fig. 1 that the final best solutions yielded by the ACO-based meta-heuristic show, on average, a cost improvement of 8.27% against the initial best solutions over the course of 2400 s. This improvement is noticeably higher (9.91%) for instances with \(|R|= 2\), and reduces (to 7.85% and 7.05%) with the increase in the number of bands. This can be explained as follows: The computational difficulty of the considered instances increases with the number of bands employed to capture the uncertain traffic coefficients. As a result, each computing agent \(\psi \) consumes more time at every iteration to construct a feasible solution to the robust NSDP, limiting the number of ant-based solution construction iterations. We remark that the computational burden of repetitive evaluation of the objective function after every iteration of the ant-based solution construction can be lessened by means of fitness approximation techniques. Re-defining the cost function (1a) using an approximate cost function may not only reduce the time consumed to execute the ConstructNSDP module in Algorithm 1 but can also accelerate the search process of the meta-heuristic through quick identification of good solutions in the modified solution landscape.

5 Conclusion

In this work, we propose a meta-heuristic based on the ACO algorithms to solve the robust network slice design problem. Experimentations conducted using realistic problem instances reveal that the proposed heuristic is capable of yielding solutions with improved absolute gaps in comparison to the commercial MIP solver CPLEX. As a further step, the ACO-based meta-heuristic can be integrated with a perturbative method relying on an exact solver to further improve the quality of the obtained network slice design solutions. We plan to evaluate the performance of the integrated ACO-based meta-heuristic with the existing solution methods [4] for the robust network slice design problem.