1706 Ieee Transactions On Vehicular Technology, Vol. 69, No. 2 .

Transcription

1706IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 69, NO. 2, FEBRUARY 2020Network Function Virtualization Resource AllocationBased on Joint Benders Decomposition and ADMMYe Yu , Student Member, IEEE, Xiangyuan Bu , Kai Yang , Member, IEEE, Hung Khanh Nguyen,and Zhu Han, Fellow, IEEEAbstract—Network function virtualization (NFV) has emergedas a new technology to reduce the cost of hardware deployment. Itis an architecture that using virtualized functions run on the virtualmachine to achieve services instead of using specific hardware.Although NFV brings more opportunities to enhance the flexibilityand efficiency of the network, resource allocation problems shouldbe well taken into consideration. In this paper, we investigate thevirtual network function (VNF) resource allocation problem tominimize the network operation cost for different services. Bothsetting the VNF instances for each virtual machine and allocatingthe traffic volume in the network are considered. The problem isformulated as a mixed integer programming problem. Althoughit can be solved in a centralized fashion which requires a central controller to collect information from all virtual machines,it is not practical for large-scale networks. Thus, we propose adistributed iteration algorithm to achieve the optimal solution.The proposed algorithm framework is developed based on thejoint Benders decomposition and alternating direction method ofmultipliers (ADMM), which allows us to deal with integer variablesand decompose the original problem into multiple subproblemsfor each virtual machine. Furthermore, we describe the detailimplementation of our algorithm to run on a computer clusterusing the Hadoop MapReduce software framework. Finally, thesimulation results indicate the effectiveness of the algorithm.Index Terms—Network function virtualization, resourceallocation, Benders decomposition, alternating direction methodof multipliers, Hadoop, MapReduce.I. INTRODUCTIONETWORK function virtualization (NFV) is a currentlypopular topic among the research issues of industry andacademia. In the past, the function of the network is achieved bythe middleboxes or hardware appliances, such as firewall, proxies, load balancers, and so on [1]. NFV provides an opportunityNManuscript received December 25, 2018; revised June 2, 2019 and October15, 2019; accepted December 4, 2019. Date of publication December 12, 2019;date of current version February 12, 2020. This work was supported by theNational Natural Science Foundation of China under Grant 61771054 and Grant61501028 and in part by the US MURI AFOSR MURI 18RT0073, NSF EARS1839818, CNS1717454, CNS-1731424, CNS-1702850, and CNS-1646607. Thereview of this article was coordinated by Prof. R. Jantti. (Corresponding author:Kai Yang.)Y. Yu, X. Bu, and K. Yang are with the School of Information and Electronics,Beijing Institute of Technology, Beijing 100081, China (e-mail: yuye@bit.edu.cn; bxy@bit.edu.cn; yangkai@ieee.org).H. K. Nguyen is with the Department of Electrical and Computer Engineering,University of Houston, Houston, TX 77004 USA (e-mail: hknguyen9@uh.edu).Z. Han is with the University of Houston, Houston, TX 77004 USA, andalso with the Department of Computer Science and Engineering, Kyung HeeUniversity, Seoul 446-701, South Korea (e-mail: zhan2@uh.edu).Digital Object Identifier 10.1109/TVT.2019.2959347to reduce costs of implementing expensive hardware and flexibility for the network service, which means the instances of virtualization network functions (VNFs) can be created, migratedand released in any circumstances. The most significant powerconsumptions in the NFV are capital expenditures (CAPEX) andoperating expenditures (OPEX) [2]. NFV is achieved on VirtualMachines (VMs) that are located in databases. Computation,storage, and network resources are required for the implementation of VNFs. The operators can provide specific service bycomposing service function chain (SFC) using VNFs. However,the SFC should meet the users’ requirement considering boththe QoS parameters and the cost.NFV operation is supported by network functions virtualization infrastructure (NFVI), which is composed of hardware andsoftware to enable the physical and virtual layer of the network.Each VNF needs to be associated to a specific VM. Creation andoperation of VNFs are dominated by the management and orchestration (MANO). Meanwhile, software-defined networking(SDN) is integrated with NFV in the architecture [3]. The benefitof introducing SDN is separating the control and data plane byprogramming. This will bring flexibility to the network, andthe forwarding rules can be easily implemented by the SDNcontroller. The SDN-NFV architecture is a trend, and manyorganizations have proposed standards and related research [4].NFV has been a promising technology in the vehicular network, especially in efficient traffic management, road safety, andentertainment. In the next generation network, vehicle applications will require ultra-reliable low-latency communications.Many NFV frameworks are proposed for serving vehicular network so far. Enabling NFV on top of vehicles will provide mobileservice providers an easier access to the emerging paradigms.Currently, vehicle-to-everything (V2X) communication is a hottopic in the vehicle communication system. The SDN-NFVarchitecture has many merits, along with V2X. For example, itwill be easier to acquire dynamic data traffic routing for vehicleswith high mobility. In other words, the waiting time of trafficlight control or congestion can be significantly reduced. Because the virtual machines are virtualized and migrated amongvehicles, the specific vehicle can remain its operating area byexchanging the information involves computation, storage, sensing, communication resources, and environmental conditions.With timely service based on NFV, the accident rescue willbe more efficient with rapid emergency response. In addition,using NFV technique can reduce fuel consumption and carbonemissions with optimized on-road strategy. In short, introducing0018-9545 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See l for more information.Authorized licensed use limited to: University of Houston. Downloaded on December 14,2020 at 21:50:04 UTC from IEEE Xplore. Restrictions apply.

YU et al.: NETWORK FUNCTION VIRTUALIZATION RESOURCE ALLOCATION BASED ON JOINT BENDERS DECOMPOSITION AND ADMMNFV in vehicle communication network can provide advancedservices to the end users on the road, and it can improve the QoSof the current traffic techniques.Although NFV has many promising advantages, there aresome problems which cannot be ignored. The resource allocationproblem with SFC is an intractable issue in operating virtualization networks. VMs are virtualized on the physical machine,and they need to be appropriately assigned. Furthermore, theresources for the network are limited, which need to give an optimal decision on allocating power, bandwidth, etc. [5], [6]. In thegeneral cases, the global optimal solution is difficult to obtain.This is due to the formulated problems often are mixed-integernonlinear problems. It is hard to solve such NP-hard problems,not mentioning the influence of the network scale [7]. Thus, theheuristic algorithm is often proposed, e.g., in [8] and [9].In the service requests, some are related to the distributedresources. NFV has a distributed nature because the virtualization of the network is unrestricted from the position of thephysical machines [10]. Many distributed algorithms are introduced to this area, such as game theory, alternating directionmethod of multipliers (ADMM), and the other decompositionalgorithms [1]. The distributed architecture makes full utilizationof the resource in the networks.The resource allocation problem for NFV is studied by manypapers. However, the global optimal solution is difficult toobtain in many cases, considering a large number of constraintsand the large-scale of the network which will bring computingability issues to the central controller. Furthermore, the proposedalgorithms may have many constraints, which are not generallysuitable for certain other cases. These challenges motivate usto propose a general method to acquire the global optimalsolution for the NFV resource allocation. For the scale problemof the network, it is highly desirable to solve the problem in adistributed fashion to make full use of the resource allocated toVMs. In this way, the computation task for the controller canbe reduced significantly, as well as the execution time for thenetwork.In this paper, we consider the NFV resource allocation problem, including the VNF placement problem and traffic management problem. We aim to minimize the costs of implementingVNFs and operating traffic in NFV networks. The problemis formulated as a mixed integer linear programming (MILP)problem, and it is solved in a distributed manner by joint Bendersdecomposition and ADMM. We also describe the implementation details of our algorithm using the Hadoop MapReducesoftware framework. The simulation results verify the meritsand properties of our algorithm.Our main contributions are summarized as follows:r We formulate the resource allocation problem in an NFVnetwork as a mixed integer linear problem, which aims tominimize the system cost. Both VNF placement and trafficmanagement problems are considered.r We first propose an algorithm based on joint Bendersdecomposition and ADMM. The algorithm can be appliedto mixed integer problems and solve it in a distributed manner as a general framework. The Benders decompositioncan separate the integer variables apart with continuous1707TABLE ILIST OF NOTATIONSvariables. For the subproblem, a large-scale of continuous variables can be handled in a distributed way usingADMM. In this paper, we solve the VNF placement problem in the outer loop of the algorithm. For the trafficmanagement problem with continuous variables, we useADMM to solve it distributedly.r We evaluate the performance of our proposed algorithmin the simulation section. The implementation of our algorithm in the Hadoop MapReduce is described in detail. Theresults indicate that our algorithm is efficient for large-scalemixed integer problems and the computation complexityis significantly reduced.The rest of the paper is organized as follows. In Section II,the related work is surveyed. The NFV system model and theresource allocation problem are presented in the Section III.Then, the algorithm based on joint Benders decomposition andADMM is the proposed in Section IV. Section V describes theimplementation of the proposed algorithm using the HadoopMapReduce. The simulation results are shown in Section VI-A,and conclusions are stated in Section VII. The list of notationsof this paper is given in Table I.II. RELATED WORKNFV is a new network architecture, as shown in Fig. 1,proposed by the industry for the software-driven network [9].Authorized licensed use limited to: University of Houston. Downloaded on December 14,2020 at 21:50:04 UTC from IEEE Xplore. Restrictions apply.

1708Fig. 1.IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 69, NO. 2, FEBRUARY 2020The NFV network architecture.The up to date developments and challenges of NFV is surveyedin [11]. In [12], a new model for enhancing virtual machineapplications performance is proposed. In [13], the authors propose an architecture involving both mobile edge computing(MEC) and NFV, which enables joint managing applicationsand virtual network functions. The NFV compound effect ofthe system is evaluated. An adaptive memory load management scheme for the server running on the virtual machine inthe cloud data center is proposed in [14], which can preventthe memory overload. In [15], the authors jointly minimize thepower consumption considering servers and switches, whichgenerates the optimal VNFs placement. In [16], the authorsmodeled the VNF allocation problem by queuing system withconstraints and solve the Markov decision process to find theoptimal policy. In [17], a new dynamic resource pooling andtrading mechanism in network virtualization are proposed andsolved by the Stackelberg game. Most of the literature solvedthe problems using heuristic methods which cannot guaranteethe global optimal.Nowadays, NFV/SDN architecture is popular for its flexibility. In [18], the software-defined and network virtualizationnetworking is surveyed, as well as the SDN applied on OpenADN in a multi-cloud environment. The SDN-NFV mobilenetworks are modeled in [19] to minimize equipment failurerisks as well as fast recovery of network nodes after a disasterhappens. A service function chaining embedding problem forSDN-NFV is presented in [20], which is solved by splittingthe traffic to several VNFs in the service chain. In [21], theauthors introduce SDN and NFV including service chains. SFCis introduced in the NFV, which connects several services andenables a single network to achieve many services. ClusteredNFV service chaining is adopted to obtain the optimal number ofclusters in [22], which can minimize the end-to-end service timein MEC RANs. The function chains can be customized which isstated in [23]. Vehicles are playing a major role in the distributedmobile scenario. In [24], the authors propose an intelligent VNFsselection strategy in Vehicular Cloud Network (VCN), whichutilizes deep neural network (DNN) and Multi-Grained CascadeForest (gcForest) to distinguish service behaviors. In [25], theauthors elaborate the potential use of the NFV service for theheterogeneous vehicles with many benefits. In [26], the authorpropose a theoretical framework to evaluate the performance ofa Long-Term Evolution (LTE) virtualized mobility managemententity (vMME) hosted in a data center. In [27], the authorsdiscuss the new trends of applying NFV in 5G network tomanage the wireless/mobile broadband (5G WMB).Distributed solutions become more and more important sincethe networks become denser and denser [28]–[30]. There areplenty of algorithms have been taken into consideration in thedistributed applications. In [31], distributed algorithms for bigdata applications are introduced. Game theory is widely used inresource allocation of distributed networks. In [32], the authorsanalyze the congestion mitigation problem in NFV for bothcentralized and distributed methods using game theory. A Stackelberg game is adopted as the approach to solve the resourcemanagement problem in LTE unlicensed in [33]. In [34], a hierarchical game approach is presented for generating optimal strategies of visible light communication and D2D heterogeneousnetwork in a distributed manner. Benders decomposition is firstproposed in [35] and it is well studied by many researchers. In[35], Benders decomposition is introduced in details. The marketrisk management problem is modeled as a stochastic linearcomplementarity problem in [36], and Benders decompositionis adapted to this equilibrium models. Benders decomposition issuitable for solving mixed integer programming. In [37], a jointbase station (BS) association and power control algorithm is proposed based on Benders decomposition. The size and schedule inmicrogrids operation are studied using Benders decompositionin [38]. However, most of the papers only provide centralizedsolutions for the mixed integer programming. In addition togame theory and Benders decomposition, ADMM is anotherpowerful decomposition tool. ADMM is useful for breakingconvex optimization problems into small parts to achieve distributed methods, which is elaborated in [39]. In [40], the revenuemaximization problem for mobile data offloading in SDN ishandled by ADMM. Multi-block ADMM is surveyed in [41]for big data optimization problems in the smart grid. In [42], theauthors investigate resource allocation in network virtualizationusing ADMM in both parallel and distributed fashions. Theoptimal large-scale scheduling of microgrids using ADMM isproposed in [43].Although much research has been done in literature, ourwork is distinctive. For solving the mixed-integer programmingproblem which is often formulated in the NFV resource allocation, we propose a novel algorithm framework. The frameworkis composed of Benders decomposition and ADMM. Bendersdecomposition is designed for decomposing the continuous andinteger problem. ADMM is introduced to give a distributedsolution for the continuous problem. Both sub-algorithms takeadvantage of dual information. By adopting the proposed framework, large-scale mixed-integer programming problems can besolved in a distributed manner. As an alternative to the other existing heuristic algorithms studied in the literature, our algorithmhas the remarkable performance, effectiveness, and universality.III. SYSTEM MODEL AND PROBLEM FORMULATIONA. System ModelWe consider a virtualization network with N VMs and Llinks, as shown in Fig. 2. In this paper, we assume that theVMs are already placed on certain physical machines, and theAuthorized licensed use limited to: University of Houston. Downloaded on December 14,2020 at 21:50:04 UTC from IEEE Xplore. Restrictions apply.

YU et al.: NETWORK FUNCTION VIRTUALIZATION RESOURCE ALLOCATION BASED ON JOINT BENDERS DECOMPOSITION AND ADMM1709B. Problem FormulationOur main interest is to minimize the cost of the powerconsumption for the network by VNF placement and resourceallocation. In this paper, we consider the cost can be dividedinto two part. One is VNF placement and the other is trafficexpenditure. We assume that the data flow for each virtual linkis lossless. In the previous work of other papers, the powerconsumption for implementing VNFs have been pointed out. Weassume that the cost for each VNF is various, and it is denoted asξkm for implementing one instance of fkm in the k th SFC. Thus,the total cost for VNF placement is formulated asQp Fig. 2.The model of the network.memk ξk ,(3)k 1input and output nodes are fixed. The VM placement problemcan be solved similarly, which is beyond the scope of thispaper. Each VM has the capacity to achieve a series of VNFs;however, the capacity is limited. For the nth VM, the capacityis presented as Cn . Moreover, each VNF can be implementedin different VMs at the same time, considering utilizing theresources flexibly. We denote that the VNF set for the network isF {f1 , . . . , fI }, and the VNF set for each VM is a subset of F.We also assume that each VM can only process one VNF at thesame time. The SDN controller and the NFV MANO are themain central processors, and they have different functions.The SDN controller determines the logic of the traffic and passesthe status information to the NFV MANO. The NFV MANO canbe divided into three part: the orchestrator, VNFs managers, andvirtualized infrastructure managers. The placement of the VNFand the optimization of the traffic path are accomplished by theNFV MANO.Service function chain (SFC) is defined as a set of VNFs in acertain order to achieve different services. We assume M SFCsare required to traverse through the network, and the VNF set form m fk F}. Inthe mth SFC is expressed as F m {f1m , . . . , fKaddition, each VNF requests a data rate requirement, denotingas Rk . During each SFC period, the network resource allocationorchestration is invariant. For each VNF, the input and outputdata rates may change because of the specific processing. Thus,we denote the input-output ratio of fk as μfk .The existence of VNF fkm for the nth VM is defined as abinary variable, which can be denote as 1, if fkm is implemented on VM n,mδn,k (1)0, otherwise.For the data flow of the SFC, there may have many paths for oneVNF to another. We define the number of the instances of fkm isemk , and it can be calculated asemk K N mδn,k.(2)n 1mthIn other words, emk is a variable depending on δn,k . For the kthmVNF of the m SFC, we define vn,k as the traffic volume.Another cost is produced by the traffic for each VNF, anddifferent types of VNF have different cost coefficients, denotingas γk for the k th VNF. We assume that the cost is depend linearlyon the traffic volume of VNF. Thus, the cost can be formulatedasQt K γkN m mδn,kvn,k .(4)n 1k 1Therefore, the total cost function isQtotal Qp Qt .(5)From above, we can formulate the problem asminδ m(l) vm,(l)Qtotals.t 1 (6)N mδn,k N k, m,(7)m mδn,kvn,k φk Cn n, m,(8)mvn,k Rk k,(9)n 1K k 1N n 1 Nn 1μ f k Nmvn,k 1n 1mvn,k k,m {0, 1} m, n, k.δn,k(10)(11)Here, (7) indicates that all the VNF in the SFC should exist inthe network; however, it should not be implemented on everyVM. (8) is the constraint for the VM’s capacity for holdingthe VNF set, and φk is the resource cost for the unit traffic ofVNF. (9) is the constraint for the requested traffic of each VNF.(10) indicates the previous VNF output cannot exceed the latterVNF’s traffic volume. Finally, (11) is the binary constraint.Although this problem can be solved in a centralized manner,the computation task for the controller is arduous as an NP-hardproblem. The controller must deal with the same sized integervariables and continuous variables. Thus, the decentralized algorithm is necessary. In the following section, we propose analgorithm based on joint Benders decomposition and ADMMAuthorized licensed use limited to: University of Houston. Downloaded on December 14,2020 at 21:50:04 UTC from IEEE Xplore. Restrictions apply.

1710IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 69, NO. 2, FEBRUARY 2020to solve the problem in a distributed manner to release thecomputational burden of the controller.IV. ALGORITHM BASED ON BENDERSDECOMPOSITION AND ADMMIn this section, we propose the joint Benders decompositionand ADMM based on the former content. Benders decomposition is popular for separating the mixed integer programminginto continuous subproblems and discrete master problem. Forthe continuous subproblems, we use ADMM to decouple theconstraints with associating all variables to generate a distributedsolution, which is necessary in the NFV network. However,ADMM is known for solving convex problems distributedly. Ifthe convexity of the problem cannot be satisfied, the convergenceand optimal solution are unreliable. Naturally, we use Bendersdecomposition as the outer loop and use ADMM as the innerloop to solve the subproblem. In the following, we introduceBenders decomposition and ADMM respectively, and show howto integrate them into an algorithm framework. The analysis andimplementation are also presented.A. Benders DecompositionThe problem we formulated is a MILP problem. To solvethe problem, we need to deal with the integer variable first.Benders decomposition is an efficient technique for dealingwith complicating variables (e.g., integer variables). We treatthe Benders decomposition algorithm as the outer loop for ouralgorithm.The principle of the Benders decomposition algorithm isseparating the continuous variable and integer variable andhandling them individually. There are two kinds of problems inthe algorithm, which are the master problem and the subproblem.The master problem aims to solve the pure integer programmingproblem or a small scale mixed integer programming problem.The subproblem is to solve problems only with continuousvariables. Benders decomposition is an iteration algorithm. Firstis the initialization of the problem. Next, the subproblem issolved by involving only continuous variables, because theinteger variables are fixed. Through solving the subproblem,the continuous variables solution and the dual variable solutionassociated with the constraints of fixing the integer variables’value are obtained. After that, the upper and lower bounds aregenerated using the solutions from solving the subproblem. Thedifference between the upper and lower bounds is used for thestopping criterion in the iterations. Then, the master problem issolved. The whole procedure of the algorithm to solve the NFVresource allocation problem is stated as follows.Initialization: Actually, the initialization is generated fromthe trivial solution of the master problem. First we assign loopmis a binarycounter l to 1. In our problem formulation δn,kmm 1 (upper bound) and Lδn,k 0 (lowervariable and Uδn,kbound). Because the coefficient of the corresponding part in them,(l)m .objective function is positive, we simply assign δn,k Lδn,kFurthermore, we introduce a function α as an optimal value ofthe subproblem. The initial value of α(l) is set as αdown , whichshould be determined by the certain circumstances.Subproblem: The subproblem is constructed by fixing thevalue of complicating variables to avoid them. Thus, the subm,(l)problem can be expressed as the problem (12). θn,k is the dualvariable for the constraints that fixing the binary variables’ value.The subproblem is deduced to a problem with only continuousvariables and it is often solved in a distributed manner.minQtm(12)vK s.tm mδn,kvn,k φk Cn n, m,(13)k 1N mvn,k Rk k,n 1 Nn 1μ f k Nmvn,k 1n 1m,(l)mδn,k δn,k(14)mvn,km,(l): θn,k k,(15) m, n, k.(16)In this paper, we adopt ADMM to solve the subproblem whichis illustrated in the next section. By solving the subproblem, wecan acquire vm(l) and θ m,(l) for the following steps.Convergence checking: The convergence checking is significant for the algorithm because it performs as the stoppingcriterion. The upper bound for the primal problem is calculatedasQlup Qltotal (δ m,(l) vm,(l) ).(17)Correspondingly, the lower bound can be generated byQldown Qlp (δ m,(l) ) α(l) .Thus, the stopping criterion is given by Qlup Qldown ε, stop,otherwise,continue,(18)(19)where ε is a pre-defined tolerance for the problem. Once theiteration stops, the optimal solution is obtained as δ m,(l) andvm,(l) .Master problem: The master problem is only related to thebinary variables. After update the loop counter l l 1, theproblem which need to solve is stated as followsminQp αm(20)δ αs.t 1 N mδn,k N k, m,(21)n 1 Qt vm,(j) θ m,(j) δ m δ m,(j) αj 1, . . . , l 1,K m mδn,kvn,k φk Cn n, m,(22)(23)k 1α αdown ,(24)mδn,k(25) {0, 1} m, n, k,Authorized licensed use limited to: University of Houston. Downloaded on December 14,2020 at 21:50:04 UTC from IEEE Xplore. Restrictions apply.

YU et al.: NETWORK FUNCTION VIRTUALIZATION RESOURCE ALLOCATION BASED ON JOINT BENDERS DECOMPOSITION AND ADMMAlgorithm 1: NFV Resource Allocation Based on :sequentiallyx[t 1] : arg minL(x, z[t], λ[t]),(28)z[t 1] : arg minL(x[t 1], z, λ[t]),(29)λ[t 1] : λ[t] ρ (Ax[t 1] Bz[t 1] c) .(30)x(l)m , Lδ m , αInitialize: loop index l, Uδn,kn,kllwhile Qup Qdown ε doSubproblemacquire vm(l) and θ m,(l) using ADMMBounds calculationcalculate upper and lower bound (Qlup andQldown )by (17) and (18)Master problemstep 1: update loop index l l 1step 2: add new Benders cut to the problem (20)step 3: solve the problem in (20) to obtain theoptimal value of δ m and αend whilewhere the constraint (22) is the Benders cuts associated with theformer iterations. In every iteration, the new benders cut willbe added to the constraints of the master problem. The Benderscuts compose l 1 hyperplanes to approximate the objectivefunction of the subproblem from below.After the master problem is solved, the algorithm goes to thenext iteration with solving the subproblem. The whole procedureof the algorithm is presented in the Algorithm 1.zThe iterations stop when a stopping criterion meets.For the proposed subproblem, we need to transform problem(12)–(16) into an equivalent problem. Among the constraints ofthe problem, we can find that (14) and (15) are constraints thatinvolve all the VMs. To generate a distributed algorithm, weintroduce an auxiliary variable asm umvn,kn,k n, k,N umn,k Rk k,μ fkN umn,k n 1N umn,k 1 0 k.(33)n 1Thus, the equivalent problem is formulated asminQtm(34)vK m mδn,kvn,k φk Cn n, m,(35)umn,k Rk k,(36)k 1N n 1μ fkN umn,k n 1N umn,k 1 0 k(37)n 1m,(l)mδn,k δn,km,(l): θn,k m, n, km umvn,kn,k n, k.(38)(39)The augmented Lagrangian function of the problem is givenbyLρ Q t min f (x) g(z)N K m λn,k vn,k umn,kn 1 k 1(26)The optimization problem has variables x and z with the equalityconstraint. The augmented Lagrangian function for the problemis expressed asL(x, z, λ) f (x) g(z) λT (Ax Bz c)ρ Ax Bz c 2 .2(32)n 1s.ts.t. Ax Bz c.(31)mwhere umn,k is a copy of the vn,k . Thus, the constraints in (9) and(10) can be reformulated asB. ADMMFor our designed continuous subproblem, ADMM is the mostsuitable algorithm. For example, dual decomposition is an efficient way to generate a distributed solution. However, it cannotdeal with the constraints coupling with different users. OCD(Optimal Condition Decomposition) is another popular methodin distributed computing. Unfortunately, our problem cannotsatisfy the strong convexity condition (linear programming),which will cause convergence problem. Many other distributedcomputing methods have strict requirements which are inappropriate for our subproblem. Thus, we adopt ADMM for solvingthe subproblem in a distributed manner. ADMM is a method tosolve the problem by decoupling the constraints and breaking itinto many small problems. For the problem with a general formstated as follows1711(27)The Lagrangian multiplier is denoting as λ and ρ is thepenalty parameter. The ADMM iterations proceed as followsρ m2 vn,k umn,k 2 ,2n 1K N(40)k 1where λn is the Lagrangian multiplier and ρ 0 is the penaltyparameter. For the tth iteration, the primal and dual variablesupdate as followu[t 1] arg minLρ (u, v[t], λ[t]),(41)v[t 1] arg minLρ (u[t 1], v, λ[t]),(42)λ[t 1] λ[t] ρ(u[t 1] v[t 1]).(43)Thus, the variables can update sequentially in iterations.Authorized licensed use limited to: University of Houston. Downloaded

trading mechanism in network virtualization are proposed and solved by the Stackelberg game. Most of the literature solved the problems using heuristic methods which cannot guarantee the global optimal. Nowadays, NFV/SDN architecture is popular for its flexi-bility. In [18], the software-defined and network virtualization