Dynamic resource allocation algorithm of virtual networks in edge computing networks

  • Xiancui Xiao
  • Xiangwei ZhengEmail author
  • Tian Jie
Original Article


The deployment and allocation of network resources are important in the application of edge computing. As an important resource allocation technology in edge computing, network virtualization faces the challenge of the virtual network mapping problem. Most existing studies are limited to static resource allocation, ignoring the time-varying properties of user resource demands, which results in wasted resources. Since user resource demands vary over time, resource allocation with predictive mechanism is a promising solution. However, there are few studies on the application of predictive algorithm as radial basis function network (RBF) algorithms in virtual network dynamic resource allocation. In addition, due to the excessive use of hidden RBF units, this method suffers from expensive inner product calculations and long training times. In this paper, we propose a dynamic network resource demand predicting algorithm based on the group search optimizer (GSO) and incremental design of the RBF (GSO-INC-RBFDM). In the network mapping, the GSO is first used to optimize the node solution. Then, the incremental design is utilized to eliminate the maximum error value and reduce the inner product calculation and training time by adding the RBF unit one by one. Finally, we apply the improved RBF to predict the user demand and reallocate resources based on the predicted results. Simulation results shows that the GSO-INC-RBFDM demonstrates good performance in terms of the acceptance rate, network cost, link pressure and average revenue compared with traditional algorithms.


Edge computing Virtual network Dynamic resource allocation Group search optimizer Radial basis function network 


Funding information

This study received support from the National Natural Science Foundation of China (61373149, 61672329, 61801278). Shandong Provincial Natural Science Foundation for Young Scholars of China (Grant No. ZR2017QF008), Shandong Provincial scientific research programs in colleges and universities (J18KA310).

Compliance with ethical standards

Conflict of interest

There is no conflict of interest.


  1. 1.
    Gharaibeh A, Salahuddin MA, Hussini SJ (2017) Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun Surv Tutorials 19(4):2456–2501CrossRefGoogle Scholar
  2. 2.
    Li A, Ye X, Ning H (2017) Thing relation modeling in the internet of things. IEEE Access 5:17117–17125CrossRefGoogle Scholar
  3. 3.
    Du Q, Song H, Zhu X (2019) Social-feature enabled communications among devices toward the smart IoT community. IEEE Commun Mag 57(1):130–137CrossRefGoogle Scholar
  4. 4.
    Shi W, Cao J, Zhang Q (2016) Edge computing: vision and challenges. IEEE Internet Things J 3 (5):637–646CrossRefGoogle Scholar
  5. 5.
    Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30–39CrossRefGoogle Scholar
  6. 6.
    Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5):78–81CrossRefGoogle Scholar
  7. 7.
    Hawilo H, Shami A, Mirahmadi M (2014) NFV: State of the art, challenges, and implementation in next generation mobile networks (vEPC). IEEE Netw 28(6):18–26CrossRefGoogle Scholar
  8. 8.
    Alcober s J, Hesselbach X, de la Oliva A (2013) Internet future architectures for network and media independent services and protocols[C]. In: 2013 15th International Conference on Transparent Optical Networks (ICTON), pp 1–4Google Scholar
  9. 9.
    Houidi I, Louati W, Ameur WB (2011) Virtual network provisioning across multiple substrate networks[J]. Comput Netw 55(4):1011–1023CrossRefzbMATHGoogle Scholar
  10. 10.
    Cheng X, Su S, Zhang Z, et al. (2011) Virtual network embedding through topology-aware node ranking. ACM SIGCOMM Computer Communication Review 41(2):38–47CrossRefGoogle Scholar
  11. 11.
    Farrell JA, Polycarpou MM (2006) Adaptive Approximation Based Control: Unifying Neural, Fuzzy and Traditional Adaptive Approximation Approaches, vol 48. Wiley, HobokenCrossRefGoogle Scholar
  12. 12.
    Martins JF, Pires VF, Pires AJ (2007) Unsupervised neural-network-based algorithm for an on-line diagnosis of three-phase induction motor stator fault. IEEE Trans Ind Electron 54(1):259–264CrossRefGoogle Scholar
  13. 13.
    Zhao Z, Min G, Gao W (2018) Deploying edge computing nodes for large-scale iot: A diversity aware approach[J]. IEEE Internet Things J 5(5):3606–3614CrossRefGoogle Scholar
  14. 14.
    Lischka J, Karl H (2009) A virtual network mapping algorithm based on subgraph isomorphism detection[C]. In: Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures. ACM 2009: pp 81–88Google Scholar
  15. 15.
    Chowdhury NMMK, Rahman MR, Boutaba R (2009) Virtual network embedding with coordinated node and link mapping[C]//IEEE INFOCOM 783-791Google Scholar
  16. 16.
    Fiedler M (2011) On resource sharing and careful overbooking for network virtualisation. International Journal of Communication Networks and Distributed Systems 6(3):232–248CrossRefGoogle Scholar
  17. 17.
    Hoeflin D, Reeser P (2012) Quantifying the performance impact of overbooking virtualized resources. 2012 IEEE International Conference on Communications 2012:5523–5527CrossRefGoogle Scholar
  18. 18.
    Zhang S, Qian Z, Wu J, Lu S, Epstein L (2014) Virtual network embedding with opportunistic resource sharing. IEEE Trans Parallel Distrib Syst 25(3):816–827CrossRefGoogle Scholar
  19. 19.
    Park J, Sandberg IW (1991) Universal approximation using radial-basis-function networks. Neural Comput 3(2):246–257CrossRefGoogle Scholar
  20. 20.
    Ahmed AN, Noor CWM, Allawi MF, et al. (2018) RBF-NN-Based model for prediction of weld bead geometry in Shielded Metal Arc Welding (SMAW). Neural Comput Applic 29(3):889– 899CrossRefGoogle Scholar
  21. 21.
    Yu H, Xie T, Paszczynski S, Wilamowski BM (2011) Advantages of radial basis function networks for dynamic system design. IEEE Trans Ind Electron 58(12):5438–5450CrossRefGoogle Scholar
  22. 22.
    Huang S, Tan KK (2009) Fault detection and diagnosis based on modeling and estimation methods. IEEE Trans Neural Netw 20(5):872–881CrossRefGoogle Scholar
  23. 23.
    Meng K, Dong ZY, Wang DH, Wong KP (2010) A self-adaptive RBF neural network classifier for transformer fault analysis. IEEE Trans Power Syst 25(3):1350–1360CrossRefGoogle Scholar
  24. 24.
    Awad M, Qasrawi I (2018) Enhanced RBF neural network model for time series prediction of solar cells panel depending on climate conditions (temperature and irradiance). Neural Comput Applic 30(6):1757–1768CrossRefGoogle Scholar
  25. 25.
    Li T, Duan S, Liu J, Wang L (2018) An improved design of RBF neural network control algorithm based on spintronic memristor crossbar array. Neural Comput Applic 30(6):1939–1946CrossRefGoogle Scholar
  26. 26.
    Zhou F, Peng H, Ruan W, Wang D, Liu M, Gu Y, Li L (2018) Cubic-RBF-ARX modeling and model-based optimal setting control in head and tail stages of cut tobacco drying process. Neural Comput Applic 30(4):1039–1053CrossRefGoogle Scholar
  27. 27.
    Chng ES, Chen S, Mulgrew B (1996) Gradient radial basis function networks for nonlinear and nonstationary time series prediction. IEEE Trans Neural Netw 7(1):190–194CrossRefGoogle Scholar
  28. 28.
    Karayiannis NB (1999) Reformulated radial basis neural networks trained by gradient descent. IEEE Trans Neural Netw 10(3):657–671CrossRefGoogle Scholar
  29. 29.
    Zhang L, Li K, He H, Irwin GW (2013) A new discrete-continuous algorithm for radial basis function networks construction. IEEE transactions on Neural Networks and Learning Systems 24(11):1785–1798CrossRefGoogle Scholar
  30. 30.
    Zhang L, Li K, Bai EW (2013) A new extension of newton algorithm for nonlinear system modelling using RBF neural networks. IEEE Trans Autom Control 58(11):2929–2933MathSciNetCrossRefzbMATHGoogle Scholar
  31. 31.
    Han HG, Qiao JF (2013) A structure optimisation algorithm for feedforward neural network construction. Neurocomputing 99:347–357CrossRefGoogle Scholar
  32. 32.
    Reiner P, Wilamowski BM (2015) Efficient incremental construction of RBF networks using quasi-gradient method. Neurocomputing 150:349–356CrossRefGoogle Scholar
  33. 33.
    Xie T, Yu H, Hewlett J, Rozycki P, Wilamowski B (2012) Fast and efficient second-order method for training radial basis function networks. IEEE Transactions on Neural Networks and Learning Systems 23(4):609–619CrossRefGoogle Scholar
  34. 34.
    Hoori AO, Motai Y (2018) Multicolumn RBF network. IEEE Transactions on Neural Networks and Learning Systems 29(4):766–778MathSciNetCrossRefGoogle Scholar
  35. 35.
    Chen S, Cowan CF, Grant PM (1991) Orthogonal least squares learning algorithm for radial basis function networks. IEEE Trans Neural Netw 2(2):302–309CrossRefGoogle Scholar
  36. 36.
    Huang GB, Saratchandran P, Sundararajan N (2004) An efficient sequential learning algorithm for growing and pruning RBF (GAP-RBF) networks. IEEE Trans Syst Man Cybern B Cybern 34(6):2284–2292CrossRefGoogle Scholar
  37. 37.
    Yu H, Reiner PD, Xie T, Bartczak T, Wilamowski BM (2014) An incremental design of radial basis function networks. IEEE Transactions on Neural Networks and Learning Systems 25(10):1793–1803CrossRefGoogle Scholar
  38. 38.
    Wilamowski BM, Yu H (2010) Improved computation for levenberg”CMarquardt training. IEEE Trans Neural Netw 21(6):930–937CrossRefGoogle Scholar
  39. 39.
    Gu L, Tok DS, Yu DL (2018) Development of adaptive p-step RBF network model with recursive orthogonal least squares training. Neural Comput Applic 29(5):1445–1454CrossRefGoogle Scholar
  40. 40.
    Xiaon XC, Zheng XW (2016) A proposal of survivable virtual network embedding algorithm. Journal of High Speed Networks 22(3):241–251CrossRefGoogle Scholar
  41. 41.
    Internet user behavior data sets named << 2016 China Mobile Internet User Analysis>> from the website
  42. 42.
    User Mobile Internet Behavior data sets named << 2018 China Mobile Internet User Behavior Insight Report>> from the website

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Information Science and EngineeringShandong Normal UniversityJinanPeople’s Republic of China
  2. 2.Shandong Provincial Key Laboratory for Distributed Computer Software Novel TechnologyJinanPeople’s Republic of China
  3. 3.Shandong Computer Science CenterQilu University of Technology (Shandong Academy of Sciences)JinanPeople’s Republic of China

Personalised recommendations