Skip to main content

A highly efficient resource slicing and scheduling optimization algorithm for power heterogeneous communication networks based on hypergraph and congruence entropy

Abstract

New services, such as distributed photovoltaic regulation and control, pose new service requirements for communication networks in the new power system. These requirements include low latency, high reliability, and large bandwidth. Consequently, power heterogeneous communication networks face the challenge of maintaining quality of service (QoS) while enhancing network resource utilization. Therefore, this paper puts forward a highly efficient optimization algorithm for resource slicing and scheduling in power heterogeneous communication networks. Our first step involves establishing an architectural description model of heterogeneous wireless networks for electric power based on hypergraph. This model characterizes complex dynamic relationships among service requirements, virtual networks, and physical networks. The system congruence entropy characterizes the degree of matching between the service demand and resource supply. Then an optimization problem is formed to maximize the system congruence entropy through dynamic resource allocation. To solve this problem, a joint resource allocation and routing method based on Lagrangian dual decomposition is proposed. These methods provide the optimal solutions of the nodes and link mappings of service function chains. The simulation results demonstrate that the proposed algorithm in this paper can greatly enhance resource utilization and also meet the QoS requirements of various services.

1 Introduction

With the widespread integration of distributed power generation into the grid, the operational mode of power grid dispatching has shifted to coordinated control of source–grid–load–storage, multi-level coordination of microgrid transmission and distribution. This has led to the emergence of new services of new power system, including distributed photovoltaic regulation, precise load control, and distribution network protection. These diversified new power services require various performance metrics such as network throughput, latency, connections, and reliability. Currently, communication access on the “last mile” offers multiple options, including electric power wireless private networks, 5G networks, and 4G short multiplexing private networks. The electric power wireless private network offers small particle control services such as load control, power distribution automation, distribution substation monitoring, and distributed power supply. These services provide technical advantages in ensuring safety and reliability. However, the construction of a new electric power system has created a gap in the existing electric power wireless private network technology's communication technology indicators, including delay, bandwidth, reliability, and other aspects necessary for emerging services. Therefore, there is significant room for improvement. It is essential to integrate 5G slicing and other advanced technologies to compensate for and optimize the technical limitations of the private network. Additionally, wireless private network bearing solutions must be proposed to meet the bearing requirements of new services while safeguarding existing investments.

The advancement of 5G communication technology will undeniably facilitate the profound convergence of both the power industry and communication information technology, trigger modifications within the industrial chain, stimulate software and hardware ecological structure, and produce immense economic and social advantages. By collaborating with the private network of the grid company, the low latency, high reliability, and large bandwidth, among other characteristics of 5G networks, can significantly enhance network performance in terms of rate, delay, and security. This allows for an all-round perception of each unit of the source network, load, and storage, enabling wide-area control and regulation of the entire power system's generation, transmission, transformation, distribution, and utilization.

In the midst of diverse service scenarios and requirements, network slicing technology has become a pivotal enabler for 5G networks due to its distinct characteristics. Network slicing can be understood as a virtualized private network that spans the entire length of a mobile communication system and is made up of a sequence of virtual network functions (VNFs). Currently, researchers from domestic and international entities have conducted extensive studies on the resource management components of network slicing. Literature [1] establishes an end-to-end delay analysis model for 5G power slicing. It carefully examines the end-to-end delay of three typical power services, introducing an innovative delay rate guarantee enhancement algorithm. In addition, it quantifies and introduces three guaranteed degree factors to address specific challenges in power services, thus ensuring efficient use of system resources. On a different note, [2] describes the advantages of hypergraph theory in modeling complex data associations and outlines the current common approaches to hypergraph learning. In [3], the authors introduce a hypergraph clustering model that aligns with the compatibility relationship among various VNF instance performances, forming a mathematical framework for resource management in network slicing. To achieve the optimal resource allocation. Literature [4] introduces hypergraph theory to deal with sliced links and connections and proposes a new hypergraph-based network slicing framework exploiting the generalization property of hypergraphs to provide faster processing speed and better resource allocation. [5] Transforms the problem of interference reduction in NOMA into a maximum weighted clique set problem in hypergraph theory, obtaining higher spectral efficiency and system performance. In [6], the authors utilizes the hypergraph model to effectively solve the resource allocation problem in heterogeneous ultra-dense networks and significantly improves the spectral efficiency of cellular networks. [7] developed a mixed integer linear programming model for 5G network slicing. The model prioritizes slicing node factors, including topological characteristics, resource utilization, and delay time, using the VIKOR method. To configure the slicing links, the model employs the shortest path algorithm for determining the physical paths. Addressing the issue of spectrum sharing in cognitive capacity harvesting networks, the authors in [8] propose a strategy for sharing spectrum among network slices. This approach, which utilizes the 4D conflict graph model and the opportunity capacity model, optimizes the use of available spectrum resources, ultimately improving channel utilization.

Literature [9] innovatively suggests a genetic algorithm to resolve the resource allocation challenge in network slicing. This algorithm, guided by intelligent assessments of virtual network node resource demands, achieves a global optimal solution. Notably, it reduces underlying network overhead, enhances underlying network revenue, and improves the success of virtual network mapping compared to algorithms based on greedy strategies. Furthermore, [10] introduces a metric for VNF reliability requirements by considering the resource requirements and location constraints of VNFs. Building upon this, a sliced reliable mapping model is established, aiming to maximize gains from reliable VNF deployment while minimizing link bandwidth resource overhead. In the context of power services, the authors in [11] define the power service levels based on the QoS requirements of various types of power services. They propose a dynamic resource allocation strategy for hierarchical network slicing, utilizing a utility maximization algorithm. This strategy conducts two resource allocations for the slicing layer and the user layer, ensuring fairness while guaranteeing the quality of the user's experience. To address data security concerns in the current information collection scenario, [12] introduces a distributed multi-node slicing model based on blockchain. This model is designed to analyze examples and applications for tackling issues like theft, tampering, and destruction during data transmission and storage in the electric power information collection service. Recognizing the current lack of end-to-end global delay optimization methods for electric power services, [13] proposes a 5G network slicing resource scheduling and mapping method tailored to the characteristics of electric power services. This method prioritizes three key aspects: slices, virtual network functions, and physical resources. It meticulously filters and prunes each candidate matching pair, iteratively solving the optimization problem.

However, the development of the new power system has led to increasingly diverse service demands and a greater variety of network elements. This has resulted in an unprecedented scale of services, network nodes, and complex relationships within and between them. Current researches lack a mathematical method to describe the complex dynamic relationship between multiple services, networks, and slices, as well as assessment indexes for the overall advantages and disadvantages of the network architecture. Thus, this makes it difficult to accurately identify the factors affecting network performance and provide mathematical analytical solutions. Additionally, some of the existing literatures only address the requirements of a single business scenario, without considering the actual application of multi-service scenarios. Furthermore, some of the literatures on virtual network functions only take into account a single resource situation, without considering the optimization of multi-dimensional resource constraints. Therefore, when facing the new dynamic demands of power systems on communication networks, it is important to consider whether a suitable evaluation index can be found to measure the complexity or merit of the network architecture. Based on this index, the multi-dimensional network resources can be adjusted and scheduled on-demand to enhance its flexibility, maximize the value of the grid infrastructure, and serve more users.

To achieve this, our paper presents a hypergraph and congruence entropy-based methodology that dynamically optimizes resource slicing and scheduling for power heterogeneous communication networks. Firstly, we employ a hypergraph perspective to model the architecture of a power heterogeneous wireless network, which includes the physical, logical, and service domains. We abstract the core characteristics of power wireless network elements across multiple levels and dimensions, and then quantify and refine the complex relationships among these elements to create a comprehensive theoretical framework. The proposed method for dynamic resource slicing and scheduling optimization aims to meet the demands of large-capacity, low-latency, and highly reliable services within the new electric power system. This is achieved through the use of entropy-increasing matching technology, which matches service demand with available network resources. The main contributions of the proposed algorithm are as follows:

  • A hypergraph-based architectural description model of heterogeneous wireless networks for electric power is established, and the vertices and hyperedges of the hypergraph between physical-logical-service domains are designed to characterize the complex dynamic relationships among service requirements, virtual networks, and physical networks.

  • The system congruence entropy is defined to characterize the degree of matching between the service demand and the actual resource supply, and then a dynamic resource slicing and scheduling optimization problem for power heterogeneous wireless networks which maximizes the system congruence entropy is formed.

  • For the optimization problem of congruence entropy, a joint resource allocation and routing method based on Lagrangian dual decomposition is proposed to solve the node mapping and link mapping problems of service function chains.

  • Simulation results show that the proposed algorithm in this paper is able to improve the resource utilization while satisfying the QoS of different services.

2 System model

2.1 Network architecture

As shown in Fig. 1, the electric power heterogeneous wireless network consists of power wireless private network, 5G and other converged networks, which can be categorized into three-domain architectures based on their functions: physical domain, logical domain, and service domain.

Fig. 1
figure 1

Three-domain model of power heterogeneous wireless network based on hypergraph

Physical domain is the abstract modeling of physical equipment such as access network, bearer network, core network, etc., which provide basic resources and run network functions. The network components in the physical domain include base stations, routers, servers, control devices, terminals, etc., which mainly complete one or more functions of data collection, generation, storage, forwarding, reception, computation, etc., and they are the resource entities of the network. The physical domain can dynamically perceive the network state, carry out intelligent clustering and game decision-making of network components, and collaboratively schedule network resources.

In the logical realm, network services bring service requirements to fruition. The entity responsible for network service fulfillment is the service function chain (SFC). A logical sequence of virtual network function (VNF) combinations materializes the SFC, and different combinations of NFs assemble distinct network slices and private networks. Multiple closely interacting microservices are aggregated into network functions (NFs), which ultimately achieve various services, including data transmission processing and network security, through the time-ordered interactions among several NFs. Each node in the network has its own exclusive physical resources, such as computing, storage, and networking resources. Multiple virtual network functions (VNFs) can be assigned to each node. When deploying virtual network functions, it is crucial to allocate the necessary resources to VNFs upon instantiation on nodes and consider the end-to-end performance requirements of the service function chain within which they are located.

Service domain mainly categorizes the electric power service and models the various service abstractions generated by diverse scenarios. According to the communication performance requirements of electric power service, it can be divided into three categories: control class, information collection class, and mobile application class. The grid control class service imposes demanding communication delay constraints, necessitating a communication system that delivers low latency and high levels of reliability, as well as precise power distribution automation and load control. Conversely, the acquisition class service lacks stipulations regarding latency and bandwidth, and is characterized by operations such as acquiring power consumption data and monitoring transmission lines. Intelligent inspection and mobile operation are common types of mobile applications that require significant bandwidth and network mobility. Objective evaluation of such services is important for assessing their effectiveness and improving their functionality.

2.2 Hypergraph-based three-domain characterization model for power heterogeneous networks

2.2.1 Three-domain hypergraph model

With the development of new power systems, the increasingly diverse service requirements and network elements have led to unprecedented service scale, network node scale, and various complex relationships within the network and between network nodes and services. As a generalized graph, a hyperedge can connect any number of vertices, which can capture and represent the higher-order interactions of the elements in the network and the higher-order group relationships of the network. Hyperedges surpass the description of simple edges for pairwise relations, constituting the fundamental distinction between hypergraphs and conventional graph models. Thus, the hypergraph theory is suitably tailored to effectively characterize intricate and diverse complex power networks founded on hypergraph theory principles, remarkably fitting the unique attributes of power complex heterogeneous networks.

As shown in Fig. 1, this paper establishes a three-domain characterization model for power heterogeneous wireless networks based on hypergraphs, and designs the vertices and hyperedges constituting the inter-domain hypergraphs by analyzing multiple elements of the network architecture, extracting features such as service attributes, network functional attributes, and device performance and location attributes, as well as the relationships among the attributes. The specific elements constituting the hypergraph are expressed as follows: (1) Classify and quantify services within the service domain based on varying spatiotemporal characteristics, application scenarios, and QoS requirements. (2) Determine the quantity and types of microservices within the logical domain to enable function realization at varying levels of granularity. (3) Classify and quantify network components based on type, attribute, and behavior within the physical domain. (4) Explore various combinations of service types, virtualized network functions (VNFs), and specific network components across the three domains. The hypergraph shows the various combinations of service types, VNFs, and network components, along with a mathematical description for each element in the service, logical, and physical domains. Subject-specific terms are used where necessary to enhance precision of meaning. Grammatical and spelling errors are avoided.

2.2.2 Service domain hypergraph model

In the service domain, the service is categorized into typical electric power service such as control, information collection and mobile application. Assuming that \({Q}^{u}\), \({Q}^{e}\), \({Q}^{m}\) denote the set of typical service types in the service domain, the service domain hypergraph is modeled as \({\mathcal{H}}_{intra}^{1}({\mathcal{V}}_{intra}^{1},{\mathbb{E}}_{intra}^{1})\). Each service \({E}_{j}^{i},i\in (u,e,m),j\in (A,K,C)\) is a node in the hypergraph of the service domain, and the set of nodes of the service domain \({\mathcal{V}}_{intra}^{1}=Q\). Categorized according to the control category, the information collection category and the mobile application category and other typical electric power services, etc., the services belonging to the same category \({\xi }^{i}\) can constitute a hyperedge within the service domain, and considering each category of service class as a hyperedge, and the service domain hyperedge set can be expressed as \({\mathbb{E}}_{intra}^{1}=\{{\xi }_{u},{\xi }_{e},{\xi }_{m}\}\).

2.2.3 Logical domain hypergraph model

The set of all the service function chains that need to be mapped at the service function chain layer is \(S=\left\{{S}^{u},{S}^{e},{S}^{m}\right\}\), \({S}^{u}\), \({S}^{e}\), \({S}^{m}\) represent the requirements of the service function chain of each of the three categories.

The control class service function chain is represented as \({S}^{u}=\left\{{S}_{a}^{u}|a=\mathrm{1,2},\dots A\right\}\) where \({S}_{a}^{u}=\left\{{f}_{a,1}^{u},{f}_{a,2}^{u},\dots {f}_{a,\left|{S}_{a}^{u}\right|}^{u}\right\}\), \(\left|{S}_{a}^{u}\right|\) denotes the length of the \({a}^{th}\) service function chain of the control class, and \({f}_{a,n}^{u}\) denotes the \({n}\)th VNF instance in the \({a}\)th service function chain. For a low-latency service function chain \({S}_{a}^{u}\), the transmission delay is bounded by \({\tau }_{a}^{u}\).

The functional chain of mobile application services is represented as \({S}^{e}=\left\{{S}_{k}^{e}|k=\mathrm{1,2},\dots K\right\}\) where \({S}_{k}^{e}=\left\{{f}_{k,1}^{e},{f}_{k,2}^{e},\dots {f}_{k,\left|{S}_{k}^{e}\right|}^{e}\right\}\), \(\left|{S}_{k}^{e}\right|\) denoted by the functional chain of the mobile application services at the first length of the \({k}\) th service function chain, \({f}_{k,n}^{e}\) denotes the \({n}\)th VNF instance in the \({k}\)th service function chain. The VNFs in the service function chain of the mobile application are allowed to deflate the traffic in order to realize the high rate transmission, and the deflation ratio of its traffic defined as \({u}_{{f}_{k,n}^{e}}=\frac{{r}_{o}}{{r}_{n}}\) is denoted as the data rate flowing out of the VNF and \({r}_{n}\) is denoted as the data rate flowing into \({f}_{k,n}^{e}\) data rate of the VNF. The final rate requirement of \({f}_{k,n}^{e}\) for each such service function chain is \(V{R}_{{s}_{k}^{e}}\).

The collection class service function chain is represented as \({S}^{m}=\left\{{S}_{c}^{m}|c=\mathrm{1,2},\dots C\right\}\), where \({S}_{c}^{m}=\left\{{f}_{c,1}^{m},{f}_{c,2}^{m},\dots {f}_{c,\left|{S}_{c}^{m}\right|}^{m}\right\}\), \(\left|{S}_{c}^{m}\right|\) denotes the first \({c}\)th service function chain of the collection class of service function chains length, \(\mathrm{and }{f}_{c,n}^{m}\) denotes the \({n}\)th VNF instance in the \({c}\)th service function chain.

The virtual link between two neighboring VNFs of each service function chain is denoted as\({v}_{{f}_{y,n}^{x}{f}_{y,n+1}^{x}}\), and the initial data rate of each SFC is set to be respectively\({r}_{{S}_{a}^{u}}\), \({r}_{{S}_{k}^{e}}, {r}_{{S}_{c}^{m}}\). The latency of physical node \(i\) in the set of three types of hardware nodes to process the VNF is \({t}_{{N}_{i}^{u}}^{{f}_{a,n}^{u}}\), \({t}_{{N}_{i}^{e}}^{{f}_{a,n}^{u}}\), \({t}_{{N}_{i}^{e}}^{{f}_{k,n}^{e}}\), \({t}_{{N}_{i}^{m}}^{{f}_{a,n}^{u}}\).

The logical domain hypergraph is modeled as \({\mathcal{H}}_{intra}^{2}({\mathcal{V}}_{intra}^{2},{\mathbb{E}}_{intra}^{2})\), and each service function chain \(vn{f}_{g}\) constitutes a node in the logical domain hypergraph \({\mathcal{V}}_{intra}^{2}=S\). Each virtual network function constitutes an intra-logical domain hyperedge, and thus, the set of logical domain hyperedges is \({\mathbb{E}}_{intra}^{2}=\left\{{S}^{u},{S}^{e},{S}^{m}\right\}\).

2.2.4 Physical domain hypergraph model

The communication network of the underlying physical nodes is represented by the graph \(G=\left(N,E\right)\), and \(N\) denotes the set of available physical nodes at the bottom, and the set of physical nodes at the bottom, \(N\) is clustered into the three categories of general-purpose power service-specific hardware. The set of nodes \({N}^{u}\), \({N}^{e}\), \({N}^{m}\), \(N={N}^{u}\cup {N}^{e}\cup {N}^{m}\), the dedicated hardware nodes that perform the clustering completion can provide better physical resources and QoS for the VNFs. When service function chain mapping is performed, the service function chains in the corresponding scenarios are preferentially mapped to the set of corresponding hardware nodes. \({N}_{i}^{u},{N}_{j}^{u}\in {N}^{u}\) denotes the physical node \(i,j\) which is the physical device in the set \({N}^{u}\). The physical link between \({N}_{i}^{u}\) and \({N}_{j}^{u}\) is denoted as \({e}_{ij}^{u}\in {e}^{u}\), where \({e}^{u}\) denotes the set of links of \({N}^{u}\) physical nodes. In the physical network graph G, E denotes the set of links, where \(E={e}^{u}\cup {e}^{m}\cup {e}^{e}\). \({N}^{u}\), \({N}^{e}\), \({N}^{m}\) are the number of physical nodes of the three types of physical nodes \(\left|{N}^{u}\right|\), \(\left|{N}^{e}\right|\),\(\left|{N}^{m}\right|\) respectively. The transmission delay of the physical link between physical nodes \(i,j\) in the three types of power-specific hardware is denoted as \({t}_{{e}_{ij}^{u}}\), \({t}_{{e}_{ij}^{e}}, {t}_{{e}_{ij}^{m}}\). The bandwidth of the link is denoted as \({B}_{{e}_{ij}^{u}}\), \({B}_{{e}_{ij}^{e}}\), \({B}_{{e}_{ij}^{m}}\). The maximum utilization of resources on each link is \(\beta\). The set of resources on a physical node is \(Z=\left\{\left.{z}_{r}\right|r=\mathrm{1,2}\dots R\right\}\), and \({z}_{r}\) denotes the class of resources (computing, storage, communication, etc.). The total amount of pre-deployment of all types of resources at physical node \({N}^{i}\) for the corresponding service can be considered as \({C}_{{N}_{i}^{u}}^{{z}_{r}}\), \({C}_{{N}_{i}^{e}}^{{z}_{r}}\), \({C}_{{N}_{i}^{m}}^{{z}_{r}}\).

Assume that the set of physical domain network slices is denoted by \(N{S}^{x}\), which is defined as

$$\begin{array}{c}N{S}^{g}=\left\{n{s}_{1}^{g},n{s}_{2}^{g},\dots ,n{s}_{L}^{g}\right\}\end{array}$$
(1)

where \(n{s}_{l}^{g}=\{{N}_{l1}^{g},{N}_{l2}^{g},...,{N}_{lQ}^{g}\}\) denotes the physical domain \({l}_{Q}\) of physical components forming a certain slice \(n{s}_{l}^{g} 1\le {l}_{Q}\le \left|{N}^{g}\right|\).

The physical domain hypergraph is modeled as \({\mathcal{H}}_{intra}^{3}({\mathcal{V}}_{intra}^{3},{\mathbb{E}}_{intra}^{3})\), and multiple components in the physical domain enable physical domain-specific network slices, and these slices form physical domain nodes, then \({\mathcal{V}}_{intra}^{3}=NS\), where \(\left|NS\right|\) denotes the number of nodes in the physical domain. The set of network slices serving each type of service constitutes an intra-domain hyperedge; thus, the set of physical domain hyperedges is \({\mathbb{E}}_{intra}^{3}=\left\{N{S}^{u},N{S}^{e},N{S}^{m}\right\}\).

2.2.5 Cross-domain hypergraph construction

In reality, the three domains are not completely independent, but rather exhibit a certain degree of correlation. For instance, there is a correlation between the services in the service domain and the virtual network functions in the logical domain, as well as a correlation between the virtual private network in the logical domain and the physical private network. Therefore, it is essential to develop an inter-domain hypergraph to objectively depict the complex and multiple connections among the components in the three domains. An inter-domain hyperedge constitutes a complete network service, which combines services in the service domain, network functions in the logical domain, and physical paths in the physical domain. A collection of distinct network services form a set of inter-domain hyperedges, ensuring a logical and causal progression of information. Precise word choices and grammatical correctness must be maintained throughout.

The three-domain inter-domain hypergraph is modeled as \({\mathcal{H}}_{inter}(\mathcal{V},{\mathbb{E}})\), and the realization of a single complete network service is to be achieved in three-domain collaboration, and each complete network service is regarded as a three-domain inter-domain hyperedge, and the inter-domain hyperedges include each domain within the nodes, so the \({k}{\text{th}}\) inter-domain hyperedge \({\mathcal{E}}_{inter}^{k}\) is denoted as \({\mathcal{E}}_{inter}^{k}=\{{Q}_{1},{Q}_{2},...,{S}_{1},{S}_{2},...,N{S}_{1},N{S}_{2},...\}\), the three-domain inter-domain hyperedge set \({\mathbb{E}}_{inter}=\{{\mathcal{E}}_{inter}^{1},{\mathcal{E}}_{inter}^{2},...,{\mathcal{E}}_{inter}^{K}\}\), where \(K\) denotes the number of inter-domain hyper edges. Here the network service is defined as the actual request of the user in the network, which is mapped as a service in the service domain, a network function in the logical domain, and a physical path in the physical domain in the proposed three-domain model, respectively.

3 A dynamic resource slicing method based on congruence entropy

3.1 Congruence entropy definition

In this paper, we define the degree of demand-provision matching as the system congruence entropy. “Entropy” can be understood as a metric or evaluation index to quantify the degree of match between the demand for resources and the actual pre-deployment of resources in a VNF in the service function chain. The specific value of this “entropy” can reflect the efficiency of resource utilization and the rationality of resource allocation. The utilization of network services can be quantitatively evaluated through “entropy” to guide rational resource allocation, thereby enhancing the performance and efficiency of network services. A dynamic slicing optimization method for power heterogeneous wireless network resources is proposed based on analysis of the characteristics of various elements within and between domains.

The collaboration of the service, logical, and physical domains is needed to execute a web service. A cross-domain hyperedge can identify the execution which takes place at a specific time. The interconnectivity of multiple network services can create overlapping elements, leading to increased complexity and reduced stability when new services are added or removed. The statistical properties of the degree of overlap between network services can be measured using cross-domain congruence entropy.

The resource allocation optimization model can be analyzed through the relationship between logical and physical domains, and the VNF mapping relationship in the chain of service functions can be defined: the binary variable \({P}_{{f}_{y,n}^{x}}^{{N}_{i}^{x}}\) is defined.

$$\begin{array}{*{20}c} {P_{{f_{y,n}^{x} }}^{{N_{i}^{x} }} = \left\{ {\begin{array}{*{20}c} 1 & {If\;VNFf_{y,n}^{x} \;{\text{maps}}\;{\text{to}}\;{\text{node}}\;N_{i}^{x} } \\ 0 & {{\text{else}}} \\ \end{array} } \right.\quad \forall x \in \left\{ {u,e,m} \right\}} \\ \end{array}$$
(2)

\({\sum }_{i=1}^{\left|{N}^{x}\right|}{P}_{{f}_{y,n}^{x}}^{{N}_{i}^{x}}=1\), Ensure that a VNF can only be mapped once on the underlying physical node.

Mapping relationships for virtual links: Define the binary variables \({l}_{{v}_{{f}_{y,n}^{x}{f}_{y,n+1}^{x}}}^{{e}_{ij}^{x}}\), \({f}_{y,n}^{x}\) and \({f}_{y,n+1}^{x}\) denote the \({n}\)th and \({n+1}\)th VNF instances of the chain of \({S}_{y}^{x}\) service functions, respectively, \({v}_{{f}_{y,n}^{x}{f}_{y,n+1}^{x}}\) denotes the virtual link between the two VNF instances, and \({e}_{ij}^{x}\) denotes the set \(r\) of physical links between nodes \(i, j\).

$$\begin{array}{*{20}c} {\begin{array}{*{20}c} {l_{{v_{{f_{y,n}^{x} f_{y,n + 1}^{x} }} }}^{{e_{ij}^{x} }} = \left\{ {\begin{array}{*{20}c} 1 & {{\text{The}}\;{\text{virtual}}\;{\text{link}}\;v_{{f_{y,n}^{x} f_{y,n + 1}^{x} }} \;{\text{maps}}\;{\text{onto}}\;{\text{the}}\;{\text{physical}}\;{\text{link}}\;e_{ij}^{x} } \\ 0 & {{\text{else}}} \\ \end{array} } \right.} \\ {\quad \forall e_{ij}^{x} \in e^{x} ,\quad \forall x \in \left\{ {u,e,m} \right\}} \\ \end{array} } \\ \end{array}$$
(3)

Then the \(r\) type resource constraint for node i in the set of physical nodes \({N}^{x}\) is:

$$\begin{array}{c}{\sum }_{y=1}^{\left|{S}^{x}\right|}{\sum }_{n=1}^{\left|{S}_{y}^{x}\right|}{R}_{{f}_{y,n}^{x}}^{zr}{P}_{{f}_{y,n}^{x}}^{{N}_{i}^{x}}\le {C}_{{N}_{i}^{x}}^{{z}_{r}},\quad \forall x\in \left\{u,e,m\right\},\quad \forall y\in \left\{a,k,c\right\}\#\end{array}$$
(4)

Bandwidth physical resource constraints on link \(ij\):

$$\begin{array}{c}{\sum }_{y=1}^{\left|{S}^{u}\right|}{\sum }_{n=1}^{\left|{S}_{y}^{u}\right|}{r}_{{S}_{y}^{x}}\cdot {l}_{{v}_{{f}_{y,n}^{u}{f}_{y,n+1}^{u}}}^{{e}_{ij}^{u}}\le \beta {B}_{{e}_{ij}^{u}}, \quad \forall {e}_{ij}^{u}\in {e}^{u}\#\end{array}$$
(5)
$$\begin{array}{c}{\sum }_{y=1}^{\left|{S}^{x}\right|}{\sum }_{n=1}^{\left|{S}_{y}^{x}\right|}({\prod }_{t=1}^{n}{\mu }_{{f}_{y,t}^{e}}){r}_{{S}_{y}^{x}}\cdot {l}_{{v}_{{f}_{y,n}^{e}{f}_{y,n+1}^{e}}}^{{e}_{ij}^{e}}\le \beta {B}_{{e}_{ij}^{e}}, \hspace{0.33em}\quad \forall {e}_{ij}^{e}\in {e}^{e}\#\end{array}$$
(6)

Control class service function chain delay constraints:

$$\begin{array}{c}\begin{array}{c}{\sum }_{n=1}^{\left|{S}_{y}^{u}\right|}{t}_{{N}_{i}^{u}}^{{f}_{y,n}^{u}}\cdot {P}_{{f}_{y,n}^{u}}^{{N}_{i}^{u}}+{\sum }_{n=1}^{\left|{S}_{y}^{u}\right|-1}{t}_{{e}_{ij}^{u}}\cdot {l}_{{v}_{{f}_{y,n}^{u}{f}_{y,n+1}^{u}}}^{{e}_{ij}^{u}}\le {\tau }_{y}^{u},\\ \quad \forall {e}_{ij}^{u}\in {e}^{u}, \quad \forall y\in \left[1, \left|{S}^{u}\right|\right], \quad \forall i\epsilon {N}^{u}\end{array}\#\end{array}$$
(7)

Function chain arrival flow rate constraints for mobile application class services:

$$\begin{array}{c}{r}_{{S}_{y}^{e}}\cdot {\prod }_{n=1}^{\left|{S}_{y}^{e}\right|}{\mu }_{{f}_{y,n}^{e}}\cdot {P}_{{f}_{y,n}^{e}}^{{N}_{i}^{e}}\hspace{0.33em}\ge V{R}_{{s}_{y}^{e}}, \hspace{0.33em}\quad \forall y\in \left[1,\left|{S}^{u}\right|\right], \quad \forall i\epsilon {N}^{u}\#\end{array}$$
(8)

Functional chain constraints for information-gathering classes of services:

For mobile application class service function chains require high computational resources and low congestion rates. Therefore, the deployment goal should be to minimize the bandwidth usage on the physical links. As much as possible, the bandwidth load balancing on each link should be done; in other words, the remaining bandwidth on the physical link should be maximized.

$$\begin{array}{c}0<{\sum }_{y=1}^{\left|{S}^{m}\right|}{\sum }_{n=1}^{\left|{S}_{y}^{m}\right|}{r}_{{S}_{y}^{m}}\cdot {l}_{{v}_{{f}_{y,n}^{m}{f}_{y,n+1}^{m}}}^{{e}_{ij}^{m}}\le \beta {B}_{{e}_{ij}^{m}}\#\end{array}$$
(9)

When targeting the control class of network services, it is assumed that the \({n}\)th VNF \({f}_{a,n}^{u}\) in the chain of service functions \({S}_{a}^{u}\) has a demand for resources of type \(r\) of \({R}_{{f}_{a,n}^{u}}^{zr}\).The total amount of pre-deployment of each type of resource at physical node \({N}_{i}\) for the corresponding network service can be considered as \({C}_{{N}_{i}^{u}}^{{z}_{r}}\).

By measuring the variability between resource deployment and resource demand in the scenarios of network slicing routing and resource allocation, the proposed optimization objective aims to maximize the congruence entropy of the entire network. This objective can be transformed into a problem of maximizing the congruence entropy for the node with the smallest congruence entropy in the network. Therefore, the congruence entropy is defined to be when the control class network service Q is realized:

$$\begin{array}{c}{D}^{u}=\frac{{\sum }_{a=1}^{\left|{s}^{u}\right|}{\sum }_{n=1}^{\left|{s}_{a}^{u}\right|}{R}_{{f}_{a,n}^{u}}^{zr}{P}_{{f}_{a,n}^{u}}^{{N}_{i}^{u}}}{{C}_{{N}_{i}^{u}}^{{z}_{r}}}+\frac{{\sum }_{a=1}^{\left|{S}^{u}\right|}{\sum }_{n=1}^{\left|{S}_{a}^{u}\right|}{r}_{{S}_{a}^{u}}\cdot {l}_{{v}_{{f}_{a,n}^{u}{f}_{a,n+1}^{u}}}^{{e}_{ij}^{u}}}{\beta {B}_{{e}_{ij}^{u}}}\#\end{array}$$
(10)

Using the same approach, the congruence entropy of the network service for the mobile application class of service is denoted as:

$$\begin{array}{c}{D}^{e}=\frac{{\sum }_{k=1}^{\left|{s}^{e}\right|}{\sum }_{n=1}^{\left|{s}_{k}^{e}\right|}{R}_{{f}_{k,n}^{e}}^{zr}{P}_{{f}_{k,n}^{e}}^{{N}_{i}^{e}}}{{C}_{{N}_{i}^{e}}^{{z}_{r}}}+\frac{{\sum }_{k=1}^{\left|{S}^{e}\right|}{\sum }_{n=1}^{\left|{S}_{k}^{e}\right|}{r}_{{S}_{k}^{e}}\cdot {l}_{{v}_{{f}_{k,n}^{e}{f}_{k,n+1}^{e}}}^{{e}_{ij}^{e}}}{\beta {B}_{{e}_{ij}^{e}}}\#\end{array}$$
(11)

The congruence entropy of a web service in the information collection category is denoted as:

$$\begin{array}{c}{D}^{m}=\frac{{\sum }_{c=1}^{\left|{s}^{m}\right|}{\sum }_{n=1}^{\left|{s}_{c}^{m}\right|}{R}_{{f}_{c,n}^{m}}^{zr}{P}_{{f}_{c,n}^{m}}^{{N}_{i}^{m}}}{{C}_{{N}_{i}^{m}}^{{z}_{r}}}+\frac{{\sum }_{c=1}^{\left|{S}^{m}\right|}{\sum }_{n=1}^{\left|{S}_{c}^{m}\right|}{r}_{{S}_{c}^{m}}\cdot {l}_{{v}_{{f}_{c,n}^{m}{f}_{c,n+1}^{m}}}^{{e}_{ij}^{m}}}{\beta {B}_{{e}_{ij}^{m}}}\#\end{array}$$
(12)

3.2 Optimization models

For the scenario of network slicing routing and resource allocation described above, the proposed optimization objective is to assess the efficacy of the network service design and deployment within a specific spatiotemporal range. This is measured by the value of the congruence entropy, where a higher value indicates a more reasonable resource design and deployment for the network service. If the congruence entropy value is nearly 1, it suggests that the resource demand and the pre-deployment of resources are closely aligned, resulting in more efficient resource utilization and the ability of the network service to operate efficiently. On the other hand, if the congruence entropy value is significantly lower than 1 and closer to 0, it indicates that there is a poor match between resource demand and resource pre-deployment. This can result in both resource wastage and degradation of service quality.

Therefore, the dynamic slicing optimization problem of power heterogeneous network resources based on hypergraph and congruence entropy is:

$$\max \mathop {{\text{min}}}\limits_{{N_{i}^{x} \in N}} \left( {\frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {s^{x} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {s_{y}^{x} } \right|}} R_{{f_{y,n}^{x} }}^{{z_{r} }} P_{{f_{y,n}^{x} }}^{{N_{i}^{x} }} }}{{C_{{N_{i}^{x} }}^{{z_{r} }} }} + \frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {S^{x} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {S_{y}^{x} } \right|}} r_{{S_{y}^{x} }} \cdot l_{{v_{{f_{y,n}^{x} f_{y,n + 1}^{x} }} }}^{{e_{ij}^{x} }} }}{{\beta B_{{e_{ij}^{x} }} }}} \right)\quad \forall x \in \left\{ {u,m} \right\}$$
$$\begin{array}{*{20}c} {\max \mathop {{\text{min}}}\limits_{{N_{i}^{x} \in N}} \left( {\frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {s^{x} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {s_{y}^{x} } \right|}} R_{{f_{y,n}^{u} }}^{{z_{r} }} P_{{f_{y,n}^{u} }}^{{N_{i}^{x} }} }}{{C_{{N_{i}^{x} }}^{{z_{r} }} }} + \frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {S^{x} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {S_{y}^{x} } \right|}} \left( {\mathop \prod \nolimits_{t = 1}^{n} \mu_{{f_{y,t}^{x} }} } \right)r_{{S_{y}^{x} }} \cdot l_{{v_{{f_{y,n}^{x} f_{y,n + 1}^{x} }} }}^{{e_{ij}^{x} }} }}{{\beta B_{{e_{ij}^{x} }} }}} \right)\quad \forall x \in \left\{ e \right\}} \\ \end{array}$$
(13)
$$\begin{array}{*{20}c} \begin{aligned} & {\text{s}}.{\text{t}}. \\ & \mathop \sum \limits_{n = 1}^{{\left| {N^{x} } \right|}} P_{{f_{y,n}^{x} }}^{{N_{i}^{x} }} = 1\;\;\quad \forall x \in \left\{ {u,e,m} \right\} \\ \end{aligned} \\ \end{array}$$
(14)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{x} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{x} } \right|}} R_{{f_{y,n}^{x} }}^{zr} P_{{f_{y,n}^{x} }}^{{N_{i}^{x} }} \le C_{{N_{i}^{x} }}^{{z_{r} }} ,\quad \forall x \in \left\{ {u,e,m} \right\},\quad \forall y \in \left\{ {a,k,c} \right\}} \\ \end{array}$$
(15)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{x} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{x} } \right|}} r_{{S_{y}^{x} }} \cdot l_{{v_{{f_{y,n}^{x} f_{y,n + 1}^{x} }} }}^{{e_{ij}^{x} }} \le \beta B_{{e_{ij}^{x} }} ,\quad \forall x \in \left\{ {u,m} \right\}} \\ \end{array}$$
(16)
$$\begin{aligned} & \mathop \sum \limits_{y = 1}^{{\left| {S^{x} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{x} } \right|}} \left( {\mathop \prod \limits_{t = 1}^{n} \mu_{{f_{y,t}^{e} }} } \right)r_{{S_{y}^{x} }} \cdot l_{{v_{{f_{y,n}^{e} f_{y,n + 1}^{e} }} }}^{{e_{ij}^{e} }} \le \beta B_{{e_{ij}^{e} }} ,\quad \forall e_{ij}^{e} \in e^{e} \\ & \begin{array}{*{20}c} {\mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} t_{{N_{i}^{u} }}^{{f_{y,n}^{u} }} \cdot P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} + \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right| - 1}} t_{{e_{ij}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \le \tau_{y}^{u} ,\quad \forall e_{ij}^{u} \in e^{u} ,\quad \forall y \in \left[ {1,\left| {S^{u} } \right|} \right],\quad \forall i\epsilon N^{u} } \\ \end{array} \\ \end{aligned}$$
(17)
$$\begin{array}{*{20}c} {r_{{S_{y}^{e} }} \cdot \mathop \prod \limits_{n = 1}^{{\left| {S_{y}^{e} } \right|}} \mu_{{f_{y,n}^{e} }} \cdot P_{{f_{y,n}^{e} }}^{{N_{i}^{e} }} \ge VR_{{s_{y}^{e} }} ,\quad \forall y \in \left[ {1,\left| {S^{e} } \right|} \right],\quad \forall i\epsilon N^{e} } \\ \end{array}$$
(18)

In the above optimization problem, (13) represents the node mapping relationship constraints, (14), (15), (16) represent the resource constraints and link bandwidth constraints of the nodes, (17) represents the delay constraints of the service function chain, and (18) represents the rate constraints of the service function chain, respectively.

The complex optimization problem of the overall network deployment above is split into the following three subservice joint optimization problems.

The subproblems for the low-latency control class of operations are:

$$\mathop {\max }\limits_{{N_{i}^{u} \in N^{u} }} \left( {\frac{{\sum\limits_{y = 1}^{{\left| {s^{u} } \right|}} {\sum\limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} {R_{{f_{y,n}^{u} }}^{zr} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} } } }}{{C_{{N_{i}^{u} }}^{{z_{r} }} }} + \frac{{\sum\limits_{y = 1}^{{\left| {S^{u} } \right|}} {\sum\limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} {r_{{S_{y}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} } } }}{{\beta B_{{e_{ij}^{u} }} }}} \right)$$
$$\begin{array}{*{20}c} \begin{aligned} & {\text{s}}.{\text{t}}. \\ & P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \epsilon \left\{ {0,1} \right\},l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \epsilon \left\{ {0,1} \right\} \\ \end{aligned} \\ \end{array}$$
(19)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} t_{{N_{i}^{u} }}^{{f_{y,n}^{u} }} \cdot P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} + \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right| - 1}} t_{{e_{ij}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \le \tau_{y}^{u} ,\quad \forall e_{ij}^{u} \in e^{u} ,\quad \forall y \in \left[ {1,\left| {S^{u} } \right|} \right],\quad \forall i\epsilon N^{u} } \\ \end{array}$$
(20)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} R_{{f_{y,n}^{u} }}^{{z_{r} }} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \le C_{{N_{i}^{u} }}^{{z_{r} }} ,\quad \forall i\epsilon N^{u} } \\ \end{array}$$
(21)

The service subproblem of the collection class is to maximize the resource utilization on the nodes and on each link so that the network can access more services:

$$\mathop {\max }\limits_{{N_{i}^{m} \in N^{m} }} \left( {\frac{{\sum\limits_{y = 1}^{{\left| {s^{m} } \right|}} {\sum\limits_{n = 1}^{{\left| {s_{y}^{m} } \right|}} {R_{{f_{y,n}^{m} }}^{zr} P_{{f_{y,n}^{m} }}^{{N_{i}^{m} }} } } }}{{C_{{N_{i}^{m} }}^{{z_{r} }} }} + \frac{{\sum\limits_{y = 1}^{{\left| {S^{m} } \right|}} {\sum\limits_{n = 1}^{{\left| {S_{y}^{m} } \right|}} {r_{{S_{y}^{m} }} \cdot l_{{v_{{f_{y,n}^{m} f_{y,n + 1}^{m} }} }}^{{e_{ij}^{m} }} } } }}{{\beta B_{{e_{ij}^{u} }} }}} \right)$$
$$\begin{array}{*{20}c} \begin{aligned} & {\text{s}}.{\text{t}}. \\ & \mathop \sum \limits_{i = 1}^{{\left| {N^{m} } \right|}} P_{{f_{y,n}^{m} }}^{{N_{i}^{m} }} = 1,l_{{v_{{f_{y,n}^{m} f_{y,n + 1}^{m} }} }}^{{e_{ij}^{m} }} \epsilon \left\{ {0,1} \right\} \\ \end{aligned} \\ \end{array}$$
(22)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{m} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{m} } \right|}} R_{{f_{y,n}^{m} }}^{{z_{r} }} P_{{f_{y,n}^{m} }}^{{N_{i}^{m} }} \le C_{{N_{i}^{m} }}^{zr} ,\quad \forall i\epsilon N^{m} } \\ \end{array}$$
(23)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{m} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{m} } \right|}} r_{{S_{y}^{m} }} \cdot l_{{v_{{f_{y,n}^{m} f_{y,n + 1}^{m} }} }}^{{e_{ij}^{m} }} \le \beta B_{{e_{ij}^{m} }} \quad \forall e_{ij}^{m} \in e^{m} } \\ \end{array}$$
(24)

The subproblem expression for a service in the mobile application category is:

$$\min \left( {\frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {s^{e} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {s_{y}^{e} } \right|}} R_{{f_{y,n}^{e} }}^{{z_{r} }} P_{{f_{y,n}^{e} }}^{{N_{i}^{e} }} }}{{C_{{N_{i}^{e} }}^{{z_{r} }} }} + \frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {S^{e} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {S_{y}^{e} } \right|}} \left( {\mathop \prod \nolimits_{t = 1}^{n} \mu_{{f_{y,t}^{e} }} } \right)r_{{S_{y}^{e} }} \cdot l_{{v_{{f_{y,n}^{e} f_{y,n + 1}^{e} }} }}^{{e_{ij}^{e} }} }}{{\beta B_{{e_{ij}^{e} }} }}} \right)$$
$$\begin{array}{*{20}c} \begin{aligned} & {\text{s}}.{\text{t}}. \\ & P_{{f_{y,n}^{e} }}^{{N_{i}^{e} }} \epsilon \left\{ {0,1} \right\},l_{{v_{{f_{y,n}^{e} f_{y,n + 1}^{e} }} }}^{{e_{ij}^{e} }} \epsilon \left\{ {0,1} \right\} \\ \end{aligned} \\ \end{array}$$
(25)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{e} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{e} } \right|}} R_{{f_{y,n}^{e} }}^{{z_{r} }} P_{{f_{y,n}^{e} }}^{{N_{i}^{e} }} \le C_{{N_{i}^{e} }}^{zr} ,\quad \forall i\epsilon N^{e} } \\ \end{array}$$
(26)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{x} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{x} } \right|}} \left( {\mathop \prod \limits_{t = 1}^{n} \mu_{{f_{y,t}^{e} }} } \right)r_{{S_{y}^{x} }} \cdot l_{{v_{{f_{y,n}^{e} f_{y,n + 1}^{e} }} }}^{{e_{ij}^{e} }} \le \beta B_{{e_{ij}^{e} }} ,\quad \forall e_{ij}^{e} \in e^{e} } \\ \end{array}$$
(27)
$$\begin{array}{*{20}c} {r_{{S_{y}^{e} }} \cdot \mathop \prod \limits_{n = 1}^{{\left| {S_{y}^{e} } \right|}} \mu_{{f_{y,n}^{e} }} \cdot P_{{f_{y,n}^{e} }}^{{N_{i}^{e} }} \; \ge VR_{{s_{y}^{e} }} ,\quad \forall y \in \left[ {1,\left| {S^{e} } \right|} \right],\quad \forall i\epsilon N^{e} } \\ \end{array}$$
(28)

3.3 Solving the optimization problem

For control class low-latency services, the optimization problem is as follows:

$$\mathop {\max }\limits_{{N_{i}^{u} \in N^{u} }} \left( {\frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} R_{{f_{y,n}^{u} }}^{{Z_{r} }} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} }}{{C_{{N_{i}^{u} }}^{{z_{r} }} }} + \frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} r_{{S_{y}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} }}{{\beta B_{{e_{ij}^{u} }} }}} \right)$$
$$\begin{array}{*{20}c} \begin{aligned} & {\text{s}}.{\text{t}}. \\ & P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \epsilon \left\{ {0,1} \right\},l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \epsilon \left\{ {0,1} \right\} \\ \end{aligned} \\ \end{array}$$
(29)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} t_{{N_{i}^{u} }}^{{f_{y,n}^{u} }} \cdot P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} + \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right| - 1}} t_{{e_{ij}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \le \tau_{y}^{u} ,\quad \forall e_{ij}^{u} \in e^{u} ,\quad \forall y \in \left[ {1,\left| {S^{u} } \right|} \right],\quad \forall i\epsilon N^{u} } \\ \end{array}$$
(30)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} R_{{f_{y,n}^{u} }}^{zr} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \le C_{{N_{i}^{u} }}^{zr} ,\quad \forall i\epsilon N^{u} } \\ \end{array}$$
(31)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} r_{{S_{y}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \le \beta B_{{e_{ij}^{u} }} ,\quad \forall e_{ij}^{u} \in e^{u} } \\ \end{array}$$
(32)

Due to \({P}_{{f}_{y,n}^{x}}^{{N}_{i}^{u}}, {P}_{{f}_{y,n+1}^{x}}^{{N}_{j}^{u}}\in \{\mathrm{0,1}\}\), \({l}_{{v}_{{f}_{y,n}^{u}{f}_{y,n+1}^{u}}}^{{e}_{ij}^{u}}\epsilon \hspace{0.33em}\left\{\mathrm{0,1}\right\}\) binary variable exists so the objective function is a nonconvex and the feasible set is also a nonconvex problem, so the optimization problem is a nonlinear integer programming problem. Since \({l}_{{v}_{{f}_{y,n}^{u}{f}_{y,n+1}^{u}}}^{{e}_{ij}^{u}}\) is the product of the node mapping relation \({P}_{{f}_{y,n}^{x}}^{{N}_{i}^{u}},{P}_{{f}_{y,n+1}^{x}}^{{N}_{j}^{u}}\), in performing the problem solving without first considering the link mapping as the node mapping relation's product, as an independent variable to which additional constraints need to be added during problem transformation:

$$\begin{array}{*{20}c} {l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \le P_{{f_{y,n}^{x} }}^{{N_{i}^{u} }} ,P_{{f_{y,n}^{x} }}^{{N_{i}^{u} }} + P_{{f_{y,n + 1}^{x} }}^{{N_{j}^{u} }} - \;l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \le 1\quad \forall y,n} \\ \end{array}$$
(33)

Thus, the Lagrangian function can be expressed as:

$$\begin{aligned} L\left( {p,l,\omega ,\mu ,v} \right) & = \frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} R_{{f_{y,n}^{u} }}^{zr} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} }}{{C_{{N_{i}^{u} }}^{zr} }} + \frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} r_{{S_{y}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} }}{{\beta B_{{e_{ij}^{u} }} }} \\ & \quad + \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \omega_{y} \left( {\mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} t_{{N_{i}^{u} }}^{{f_{y,n}^{u} }} \cdot P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} + \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right| - 1}} t_{{e_{ij}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} - \tau_{y}^{u} } \right) \\ & \quad + \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} \mu_{y,n} \left( {l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} - P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} } \right) \\ & \quad + \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} v_{y,n} \left( {P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} + P_{{f_{y,n + 1}^{u} }}^{{N_{j}^{u} }} - l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} - 1} \right) \\ \end{aligned}$$
(34)

The dyadic problem of the original problem is expressed as follows:

$$\mathop {\min }\limits_{\omega ,v,u} \mathop {\max }\limits_{p,l} L\left( {p,l,\omega ,\mu ,v} \right)$$
$$\begin{array}{*{20}c} \begin{aligned} & {\text{s}}.{\text{t}}. \\ & \mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} R_{{f_{y,n}^{u} }}^{zr} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \le C_{{N_{i}^{u} }}^{zr} ,\quad \forall i\epsilon N^{u} \\ \end{aligned} \\ \end{array}$$
(35)
$$\begin{array}{*{20}c} {\omega_{y} ,\;\mu_{y,n} ,\;v_{y,n} \ge 0,\quad \forall y,n} \\ \end{array}$$
(36)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} R_{{f_{y,n + 1}^{u} }}^{zr} P_{{f_{y,n + 1}^{u} }}^{{N_{j}^{u} }} \le C_{{N_{j}^{u} }}^{zr} ,\quad \forall j\epsilon N^{u} } \\ \end{array}$$
(37)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} r_{{S_{y}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \le \beta B_{{e_{ij}^{u} }} \quad \forall e_{ij}^{u} \in e^{u} } \\ \end{array}$$
(38)
$$\begin{array}{*{20}c} {P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \epsilon \left\{ {0,1} \right\},\;l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \epsilon \left\{ {0,1} \right\}, P_{{f_{y,n + 1}^{u} }}^{{N_{j}^{u} }} \epsilon \left\{ {0,1} \right\}} \\ \end{array}$$
(39)

where \(p,l\) denote the mapping of virtual functions and the mapping relationship of links are primitive variables, respectively, and \(\mu ,v,\omega\) are called dyadic variables. If the dyadic variables \(\mu ,v,\omega\) are known, the Lagrangian function can be rewritten as the sum of the functions of nodes and links:

$$L\left(p,l,\omega ,\mu ,v\right)=g\left(p\right)+\hspace{0.33em}g\left(l\right)$$
$$\begin{aligned} g\left( p \right) & = \frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} R_{{f_{y,n}^{u} }}^{zr} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} }}{{C_{{N_{i}^{u} }}^{zr} }} + \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \omega_{y} \left( {\mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} t_{{N_{i}^{u} }}^{{f_{y,n}^{u} }} \cdot P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} } \right) \\ & \quad - \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} \mu_{y,n} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} + \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} v_{y,n} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \\ \end{aligned}$$
(40)
$$\begin{aligned} \left( p \right) & = \frac{{\mathop \sum \nolimits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \nolimits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} r_{{S_{y}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} }}{{\beta B_{{e_{ij}^{u} }} }} + \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \omega_{y} \left( {\mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right| - 1}} t_{{e_{ij}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} } \right) \\ & \quad + \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} \mu_{y,n} l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} + \mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} v_{y,n} \left( {P_{{f_{y,n + 1}^{u} }}^{{N_{j}^{u} }} - l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} } \right) \\ \end{aligned}$$
(41)

The above dyadic problem can be decomposed into two subproblems of mapping the current node of the virtual function and mapping the link relationship from the current node to the next hop for solving them separately.

$$P1:\underset{{P}_{{f}_{y,n}^{x}}^{{N}_{i}^{u}}}{{\text{max}}}g(p)$$

\(s.t.\)

$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} R_{{f_{y,n}^{u} }}^{zr} P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \le C_{{N_{i}^{u} }}^{zr} ,\quad \forall i\epsilon N^{u} } \\ \end{array}$$
(42)
$$\begin{array}{*{20}c} {\omega_{y} ,\;\mu_{y,n} ,\;v_{y,n} \ge 0,\quad \forall y,n} \\ \end{array}$$
(43)
$$\begin{array}{*{20}c} {P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} \epsilon \left\{ {0,1} \right\}} \\ \end{array}$$
(44)
$$P2:\mathop {\max }\limits_{{l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} }} g\left( l \right)$$
$$\begin{aligned} & {\text{s}}.{\text{t}}. \\ & \begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} R_{{f_{y,n}^{u} }}^{{z_{r} }} P_{{f_{y,n + 1}^{u} }}^{{N_{j}^{u} }} \le C_{{N_{j}^{u} }}^{{z_{r} }} ,\quad \forall j\epsilon N^{u} } \\ \end{array} \\ \end{aligned}$$
(45)
$$\begin{array}{*{20}c} {\mathop \sum \limits_{y = 1}^{{\left| {S^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} r_{{S_{y}^{u} }} \cdot l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \le \beta B_{{e_{ij}^{u} }} \quad \forall e_{ij}^{u} \in e^{u} } \\ \end{array}$$
(46)
$$\begin{array}{*{20}c} {l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} \epsilon \left\{ {0,1} \right\}, P_{{f_{y,n + 1}^{u} }}^{{N_{j}^{u} }} \epsilon \left\{ {0,1} \right\}} \\ \end{array}$$
(47)
$$\begin{array}{*{20}c} {\omega_{y} ,\;\mu_{y,n} ,\;v_{y,n} \ge 0, \quad \forall y,n} \\ \end{array}$$
(48)

In problem\(P1\), which contains the mapping relationship variable \({P}_{{f}_{y,n}^{u}}^{{N}_{i}^{u}}\) of VNFs on the underlying physical nodes, it is a traditional assignment problem, which can be carried out by the Hungarian algorithm for the mapping relation of service functions, by solving the mapping result of the current node of the \(P2\) problem, which is brought to the \(P1\) problem, and the mapping relation of the link \({l}_{{v}_{{f}_{y,n}^{u}{f}_{y,n+1}^{u}}}^{{e}_{ij}^{u}}\) into a solution of the node mapping for the next hop to achieve link mapping problem solving. The solutions of the primal variables that can be obtained by solving the above two subproblems by iterating m times are \({\left({P}_{{f}_{y,n}^{u}}^{{N}_{i}^{u}}\right)}^{m}\) and \({\left({l}_{{v}_{{f}_{y,n}^{u}{f}_{y,n+1}^{u}}}^{{e}_{ij}^{u}}\right)}^{m}\) follows the dyadic variables through the subgradient method. The formula for the \({m+1}^{th}\) update of the dyadic variable is as follows:

$$\begin{aligned} \omega_{y} \left( {m + 1} \right) & = \omega_{y} \left( m \right) + \Delta \left( m \right)\left( {\mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right|}} t_{{N_{i}^{u} }}^{{f_{y,n}^{u} }} \cdot \left( {P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} } \right)^{m} } \right. \\ & \quad \left. { + \mathop \sum \limits_{n = 1}^{{\left| {S_{y}^{u} } \right| - 1}} t_{{e_{ij}^{u} }} \cdot \left( {l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} } \right)^{m} - \tau_{y}^{u} } \right) \\ \end{aligned}$$
(49)
$$\begin{gathered} \mu_{y,n} \left( {m + 1} \right) = \mu_{y,n} \left( m \right) + \Delta \left( m \right)\;\left( {\mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} \left( {l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} } \right)^{m} - \left( {P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} } \right)^{m} } \right) \hfill \\ \hfill \\ \end{gathered}$$
(50)
$$\begin{aligned} v_{y,n} \left( {m + 1} \right) & = v_{y,n} \left( m \right) \\ & & \quad + \Delta \left( m \right)\;\left( {\mathop \sum \limits_{y = 1}^{{\left| {s^{u} } \right|}} \mathop \sum \limits_{n = 1}^{{\left| {s_{y}^{u} } \right|}} \left( {\left( {P_{{f_{y,n}^{u} }}^{{N_{i}^{u} }} } \right)^{m} + \left( {P_{{f_{y,n + 1}^{u} }}^{{N_{j}^{u} }} } \right)^{m} - \left( {l_{{v_{{f_{y,n}^{u} f_{y,n + 1}^{u} }} }}^{{e_{ij}^{u} }} } \right)^{m} - 1} \right)} \right) \\ \end{aligned}$$
(51)

where \(\Delta \left(m\right)\) denotes the step size of the dyadic variable iteration, and the product following the step size is the expression for the subgradient of the dyadic variable in the Lagrangian function, respectively.

3.4 Complexity analysis

The execution of the service function chain deployment algorithm based on pairwise decomposition proposed in this paper is a cyclic iterative process, and the number of iterations required to obtain the optimal solution is determined by the actual scenario. In each iteration, the algorithm first calculates the current node mapping results of the L VNFs and determines the mapping relationship of the links, and records the mapping location of the optimal service function chain. For the L VNFs, the pairwise variables are updated according to Eqs. (49), (50), and (51). Therefore, the computational complexity of each iteration of each VNF is 6L, and we assume that the maximum number of iterations is \(max\_ite\) and the maximum number of service requests is M, respectively, and the subgradient function is computed a total of \(6\cdot M\cdot L\cdot max\_ite\) times. Then the complexity of this algorithm is \(O(M\cdot L\cdot max\_ite)\).

4 Simulation design and result analysis

4.1 Simulation parameter setting

In order to evaluate the performance of the algorithm proposed in this paper, simulation experiments of the proposed algorithm program are conducted in this thesis using MATLAB 2020a software, which runs on a Windows 10 system PC with IntelCorei7-9500, 1.80GHz CPU, and 8GB of operating memory. The proposed method in this paper is compared with the CoordVNF [14] and a simulated annealing SA based method. In CoordVNF, the authors provide a heuristic to coordinate the composition of VNF function chains in network slices as well as to map service function chains to subnet networks. We will compare the algorithm proposed in the paper with the above two algorithms in terms of service function chain request acceptance rate, load balancing degree, average execution time. In the simulation diagrams, the legend of the algorithm proposed in this paper is labeled using DD.

In the simulation process, the experimental topology adopts a physical network of 20 nodes, each node has physical resources for computing and storage, the total amount of resources in each physical node obeys a uniform distribution with a mean of 100 units and a variance of 30, the link bandwidth is 200 units, and the link delay is set to obey a uniform distribution with a mean of 3ms and a variance of 1ms. The number of service function chains to be deployed is 10–150, and there are 10 types of virtual network functions. In the initialization of service function chains, each service function chain consists of 2–4 types of virtual network functions, and the resource demand for the three types is 0.2–1 unit, and the rate demand for the transmission of service function chains is 1–5 units.

4.2 Experimental results

Figure 2 illustrates the relationship between service request numbers and success rates for acceptance of service. The experimental results indicate that acceptance success rates remain relatively stable when service requests are under 400. However, when service requests exceed 500, the acceptance success rate of the requested service function chain experiences a severe decline according to the experimental graphs. The acceptance rate for service requests with the pairwise decomposition algorithm is approximately 3% higher than that of the CoordVNF algorithm on average and about 11% higher than the SA algorithm. This disparity is primarily due to the pairwise algorithm's deployment of the service function chain, aimed at maximizing the congruence entropy, to fully utilize the physical resources of nodes and links. As a result, the algorithm can accommodate more service function chain deployments with the same resource setup, leading to better performance.

Fig. 2
figure 2

Acceptance rate by number of service requests

Figure 3 shows the variation in the congruence entropy of node and link bandwidth resource deployment due to different numbers of service chain requests. It is evident that the congruence entropy of resource and link deployment of the physical nodes generally increases with an increase in service function chains. The table shows that the algorithm, which is based on dyadic decomposition and divides the underlying physical network into three virtual subnets based on function, improves the rationality of physical node and link bandwidth deployment by maximizing congruence entropy. This algorithm performs significantly better than CoordVNF and simulated annealing algorithms.

Fig. 3
figure 3

The congruence entropy of node and link deployment with different service request numbers

Figure 4 represents the average execution time required to deploy a chain of service functions with the same length as well as the same data rate at different sizes of underlying physical nodes. In order to evaluate the average execution time, we first cluster the devices with the same physical function using hypergraphs, respectively, so that the scope of the solution and the execution time can be narrowed down when performing the service function mapping. We compare the DD algorithm proposed in this paper with the CoordVNF algorithm and the SA-based approach to deploy the same service function chain simultaneously, and the trend in the figure shows that the average execution time of our algorithm and the CoordVNF algorithm and the SA-based approach increases as the length of the service function chain increases. The execution time of the algorithm proposed in this paper is roughly similar to that of CoordVNF and is significantly shorter than that of the SA-based approach.

Fig. 4
figure 4

Average execution time of the deployment service function chain

Since the service function chain is partitioned into three virtual subnets based on the group of physical nodes before mapping, Fig. 5 simulates the congruence entropy of node resources and link deployment for various service function chain types mapped on different subnets. The experimental topology utilized in the lower layer comprises 15 nodes and 30 links. The figure demonstrates a general trend of increased average resource use for nodes and links across the three service types as the number of service function chains grows larger. The control type service function chain consistently uses fewer physical nodes and links. Therefore, the congruence entropy of the deployment of physical nodes and links is the highest. Information type service function chains should select more physical nodes and minimize link bandwidth to reduce conflicts in the underlying network, resulting in the lowest congruence entropy for physical node and link deployment. Since the mobile-type service function chain only considers the total delay, its performance falls between those of other chains.

Fig. 5
figure 5

Congruence entropy of different subnet-to-node and link deployments

5 Conclusion

This paper investigates a dynamic optimization method for slicing wireless network resources that are power heterogeneous. The approach is based on hypergraph and congruence entropy. Based on the proposal to divide the heterogeneous network architecture, consisting of multiple levels of nodes and networks, into three domains (service, logical, and physical), intra-domain hypergraphs and cross-domain hypergraphs were constructed using hypergraph theory. Further, a power heterogeneous wireless network resource slicing method based on congruence entropy is proposed, in which the underlying physical network is first divided into three virtual subnets according to the service functions in the algorithm, and then an optimization model for maximizing the node and link utilization is established according to the different demands of the three major services of the 5G network. In solving the problem, we first decouple the link conditions, which are coupled due to variables in the link mapping problem. Then, we partition them into a mapping problem between two adjacent nodes. Subsequently, we solve the node problem and link split separately using the Lagrangian pairwise decomposition method to achieve optimal deployment of the service function chain. The method is based on the simultaneous request of multiple different types of services with real-time, fast and efficient characteristics, which can meet the demand of customized service scenarios for future 5G networks. Its execution time, resource utilization, and other aspects perform better while incorporating some AI methods in the future work to align with the intelligent network operation requirements.

Availability of data and materials

The authors confirm that the data supporting the findings of this study are available within the article.

References

  1. T.L. Ren, Research on 5G Network Slicing Resource Management Algorithm for Power Communication (North China Electric Power University, 2022)

  2. Y. Gao, Z. Zhang, H. Lin, X. Zhao, S. Du, C. Zou, Hypergraph learning: methods and practices. IEEE Trans. Pattern Anal. Mach. Intell. 45, 1–1 (2021)

    Google Scholar 

  3. X.L. Wang, Research on Virtual Resource Management Technology for 5G Network Slicing (Information Engineering University of the Strategic Support Force, 2019)

  4. O.A. Latif, M. Amer, A. Kwasinski, Hypergraph theory for network slicing, in 2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA) (IEEE, Ras Al Khaimah, 2022), pp. 283–286

  5. C. Zhuansun, K. Yan, G. Zhang, Z. Xiong, C. Huang, Hypergraph-based resource allocation for ultra-dense wireless network in industrial IoT. IEEE Commun. Lett. 26(9), 2106–2110 (2022)

    Article  Google Scholar 

  6. H. Zhang, L. Song, Y. Li, G.Y. Li, Hypergraph theory: applications in 5G heterogeneous ultra-dense networks. IEEE Commun. Mag. 55(12), 70–76 (2017)

    Article  Google Scholar 

  7. Y.H. Zang, H.K. Zheng, S.H. Yin, Resource allocation strategy for 5G network slicing oriented to new power systems. Hebei Electr. Power Technol. 42(01), 26–31 (2023)

    Google Scholar 

  8. J. Huang, F. Yang, Y.Z. Xie, Spectrum sharing strategy for network slicing in cognitive capacity collection networks. J. Commun. 42(07), 189–197 (2021)

    Google Scholar 

  9. J.L. Wang, Virtual network resource allocation algorithm based on genetic algorithm under network slicing. Jiangsu Commun. 37(06), 22–25 (2021)

    Google Scholar 

  10. G.F. Zhao, Research on Reliability-oriented 5G Network Slicing Mapping Algorithm (Chongqing University of Posts and Telecommunications, 2020)

  11. M.Y. Liu, Research on 5G Network Slicing Resource Allocation Algorithm for Smart Grids (North China Electric Power University, Beijing, 2022)

  12. C. Song, C. Ma, Distributed multi-node slicing model and application analysis for power information collection scene, in 2022 China International Conference on Electricity Distribution (CICED), Changsha, China (2022), pp. 1222–1227

  13. Y. Zhao, J. Shen, X. Qi, X. Wang, X. Zhao, J. Yao, A 5G network slice resource orchestration and mapping method based on power service, in2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, (2022), pp. 1419–1422

  14. Q.Y. Sun, P. Lu, W. Lu, Forecast-assisted NFV service chain deployment based on affiliation-aware VNF placement, in 2016 IEEE Global Communications Conference (GLOBECOM) (2016), pp. 1–6

Download references

Acknowledgements

This study was funded by the Science and Technology Project of State Grid Corporation of China (5108-202218280A-2-415-XG).

Funding

This project was supported by the Science and Technology Project of State Grid Corporation of China (5108-202218280A-2-415-XG).

Author information

Authors and Affiliations

Authors

Contributions

WW and HZ contributed to conceptualization; CJ and HZ provided methodology; LY provided software; WW carried out formal analysis; WW performed writing—original draft; CJ performed writing—review and editing; and DZ performed supervision. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Wendi Wang.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, W., Jiang, C., Yang, L. et al. A highly efficient resource slicing and scheduling optimization algorithm for power heterogeneous communication networks based on hypergraph and congruence entropy. EURASIP J. Adv. Signal Process. 2024, 41 (2024). https://doi.org/10.1186/s13634-024-01135-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13634-024-01135-1

Keywords