ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction

Digital twin network (DTN) as an emerging network paradigm, have garnered growing attention. For large-scale networks, a crucial problem is how to effectively map physical networks onto the infrastructure platform of DTN. To address this issue, we propose a heuristic method of the adaptive boundary whale optimization algorithm (ABWOA) to solve the digital twin network construction problem, improving the efficiency and reducing operational costs of DTN. Extensive comparison experiments are conducted between ABWOA and various algorithms such as genetic algorithm, particle swarm optimization, artificial bee colony, differential evolution algorithm, moth search algorithm and original whale optimization algorithm. The experimental results show that ABWOA is superior to other algorithms in terms of solution quality, convergence speed, and time cost. It can solve the digital twin network construction problem more effectively.


Introduction
In recent years, Digital Twin (DT) technology has garnered significant attention from both academia and industry due to its widespread applications in areas such as real-time remote monitoring in industrial settings, traffic risk assessment, and intelligent scheduling in smart cities.The applications of DT technology have demonstrated its immense value in improving and optimizing the performance of various systems, providing new impetus and perspectives for development across multiple fields.
The application of DT in networks has also gradually become a research hotspot.Digital twin networks create real-time synchronized virtual mirrors of physical networks, enabling real-time interaction between physical and twin networks.This enables digital twin networks to play a significant role in network management, optimization, and prediction, thereby providing powerful support for innovation and intelligent development of networks.Through this approach, DTN can help the network achieve low-cost testing and validation, enhance the level of intelligent decision-making, and increase the innovative efficiency of network applications [1].This technology has been successfully implemented in various network scenarios, such as edge computing networks, network security, and the industrial internet [2][3][4].
With the advancement of computer network technology, network loads have been steadily increasing, and network scales continue to expand, making network operation and maintenance increasingly complex [5].As the scale of networks continues to expand, the number of digital twin entities involved in digital twin networks gradually increases, making the digital twin pattern of a single server even more challenging [6,7].For large-scale networks, it becomes nearly impossible for a single server to handle the simulation and emulation processes of a DTN.Consequently, it becomes necessary to map the modeled physical network entities onto multiple server platforms for distributed operation.DTN construction algorithms serve as the prerequisite and foundation for fulfilling this requirement [8].
In this context, a key challenge is how to effectively allocate the digital twin entities of various physical network elements to the distributed digital twin network infrastructure (DTNI, referring to a series of specially configured hardware and software resources, usually a group of dedicated servers connected by high-speed networks), to ensure that the servers can accommodate as many digital twins as possible, while enabling the platform to handle the communication traffic between entities effectively.Moreover, as the number of DTNI servers utilized increases, the operational power consumption and cost of the DTN also increase.Minimizing the number of DTNI servers used can thus enhance the operational efficiency of the digital twin network and reduce its operational costs.In addressing this issue, it is necessary to consider multiple factors comprehensively, including the performance characteristics of DTNI, the topological structure of the physical network and DTNI network, the workload of simulation entities, and communication patterns [1,9].To ensure the efficient operation of the entire DTN system, the key lies in adopting effective construction algorithms and deployment strategies.In large-scale distributed DTN systems, reasonably allocating the DTNI servers where numerous DT entities are located is a crucial task, which directly affects the performance and efficiency of the entire system.
We proposes a heuristic method using an Adaptive Boundary Whale Optimization Algorithm (ABWOA) to address the current issue of constructing digital twin networks, and its effectiveness has been validated through experiments.The following summarizes the main contributions of this paper.The rest of this paper is organized as follows."Related work" section reviews the related works."Problem statement" section introduces the DTN architecture in detail and analyzes DTN construction problem."Whale optimization algorithm" and "Adaptive boundary whale optimization algorithm" sections detail WOA and ABWOA, respectively.Experimental evaluation and results are presented in "Experimental evaluation" section.Finally, The conclusion will be elaborated in "Conclusion" section.

Related work
The origin of digital twin technology can be traced back to 2003, when Professor Michael Grieves from the University of Michigan first introduced the concept of the "mirror space model" while teaching Product Lifecycle Management (PLM) [10].In 2017, Grieves and Vickers proposed the formal definition of digital twin in their white paper [11], which encompasses three core elements: the physical entity in the physical space, the digitalized object in the virtual space, and the data link connecting these two spaces.
Tao et al. [12] defined digital twin as the creation of virtual replicas of physical objects using digital means.In this process, through data simulation, it accurately reflects the behavior of physical objects in real environments.Through interactive feedback between virtual and real, deep integration and analysis of data, and iterative optimization of decisions, digital twin technology can add or expand new functions to physical objects.Sun et al. [9] defined the digital twin network as a network system that includes physical network entities and their virtual twins, which can interact and map with each other in real time.They also designed a system architecture and analyzed the key technologies of the digital twin network, discussing its future development trends.Jyoti, A et al. [13] view dynamic resource allocation as a primary objective and employ a novel method based on load balancing and service proxies to address the issue of dynamic resource distribution.Kumar, M et al. [14] proposed an efficient meta-heuristic technique to provide improved exploration and exploitation capabilities and to optimize various QoS parameters.Zhao et al. [15] proposed the development of digital twin for software-defined vehicular networks (SDVN) on centralized servers or controllers, while Krishnan et al. [16] independently developed DT for software-defined Internet of Things (SD-IoT) on central servers.Currently, many studies have applied DT to physical networks, such as [15][16][17][18] etc., which apply DT to scenarios like industrial IoT, vehicular networks, and edge networks, indicating that DT has strong potential for enhancing the application performance of current communication networks.However, to the best of our knowledge, there is still limited research on the construction methods for large-scale distributed digital twin networks.

Digital dwin network architecture
Figure 1 illustrates the three-plane architecture of the digital twin network: the physical network plane, the twin network plane, and the control plane.Physical network plane serves as the physical object of the digital twin entities and can represent various network types such as data center networks, Internet of Things (IoT), and campus networks.Network elements within the physical network interact with the network digital twin through the southbound interface, exchanging network data and control information.As the core feature of the digital twin network system, twin network plane is responsible for organizing and managing the data collected from the physical network.Additionally, it manages all model data of the digital twin entities, utilizing this data to complete modeling tasks for various network applications.Control plane is responsible for the distributed construction of the digital twin network system.Initially, the distributed build scheduler obtains the load state and topological relationship of each network element in the physical network, from which it analyzes the resource demand of the digital twin corresponding to each physical network element.Based on the resource requirements and topological relationships of the digital twins, the distributed construction scheduler employs a construction algorithm to determine an allocation scheme.Following this scheme, digital twins are assigned to the appropriate Digital Twin Network Infrastructure (DTNI).DTNI consists of a series of specially configured hardware and software resources, typically a group of dedicated servers connected by a high-speed network, ensuring the efficient and stable operation of the digital twin network.Ultimately, each DTNI operates synchronously, forming a distributed digital twin network operation support platform.
Figure 2 illustrates the two stage construction process of a DTN.For clarity and convenience, we use a small-scale network as an example.The first step is to utilize the data of the physical network to model the entire physical network.Due to the diverse objectives of DTN applications, numerous methods for DT modeling have been extensively researched [1].Studies on DT modeling methods primarily concentrate on three aspects: specific models [19], multidimensional models [20], and general models [21].For example, in this step, host h1 and switch sw1 in Fig. 2 are modeled and implemented as digital twins DT h1 and DT sw1 , respectively.The second step involves deploying the modeled physical network entities (i.e., digital twin entities) onto the Digital Twin Network Infrastructure (DTNI).The DTNI executes complex simulations and analysis tasks while maintaining real-time synchronization between the physical entities and their corresponding digital twin entities.As per the construction scheme depicted in the figure, digital twins DT h1 , DT h2 , DT h3 , DT h4 , DT sw1 , and DT sw2 are deployed onto DTNI S1, which is responsible for their operation.Similarly, DT h5 , DT h6 , DT h7 , and DT sw3 are deployed onto DTNI S2 and managed by it.The link communication between digital twin entities deployed on the same DTNI is carried out internally within the DTNI.For example, the communication between DT h1 and DT h2 will involve data exchange within S1 and will not occupy DNTI link resources.Furthermore, link communication between digital twin entities deployed on different DTNI will be handled by the DTNI network links between them.For instance, the communication between DT sw2 and DT sw3 will be carried out by the DTNI network link between S1 and S2.DT modeling and DTs deployment form the foundation for building the entire DTN.This paper primarily focuses on researching the solution algorithm for the second step, which is the construction scheme.

DTN construction problem model
In the digital twin network construction scheme, the physical network is presented as a graph G = (V , E) .The V and E stand for the sets of nodes and links in the physi- cal network, respectively.Let V i , V j be two nodes in the physical network, and E ij be the link connecting nodes V i and V j in the physical network.For the convenience of description below, we use i, j instead of V i , V j and ij instead of E ij .Here, i, j ∈ V represent two nodes in G , and ij ∈ E represent the physical link connecting nodes V i and V j in G .A digital twin element of the physical net- work can be delineated as a triplet where i, j ∈ V , and ij ∈ E .Here, ω bw ij , ω mem i , and ω CPU i correspondingly signify the bandwidth of link ij as well as the memory and CPU required by the digital twin element of the physical network node i.
Similarly, the digital twin network infrastructure is presented as a graph  throughout the operational phase of the DTN.When these digital twins are assigned to different DTNI servers, their operational efficiency is significantly lower than when they are allocated to the same DTNI server, primarily because interactions between them must be completed through network communications between DTNI servers.Moreover, the increment in the count of DTNI servers requisitioned escalates the operational energy consumption and associated costs within the DTN framework.Therefore, the problem to be solved is to efficiently construct the physical network G to run on DTNI, with the aim of minimizing the number of DTNI servers used.The objective function of the DTNI construction problem is represented as Eq. ( 1).
where, p u represents whether the DTNI node u is being used, where p u = 1 if and only if u is used, otherwise In the operation of the DTN, there is only one DTNI responsible for the operation of the digital twin of the (1) physical network throughout the entire DTN system.Therefore, the DT uniqueness constraint for is: where,z i u represents whether the digital twin of the physical network node i is placed on the DTNI node u, and only when the digital twin of the physical network node i is deployed on the DTNI node u, there is The total CPU and total memory size of the digital twins deployed to a specific DTNI node must not exceed the capacity of that DTNI node, therefore, the CPU and memory constraints can be: The total network bandwidth of communication between digital twins across the DTNI nodes link uv (2) i∈V The problem of digital twins construction is a Multidimensional Bin Packing Problem (MBPP).DTNI is a box, and the DT is the item to be placed into the box.Since MBPP is a typical NP-hard problem [22,23], there does not exist a solution with polynomial time complexity unless P=NP [24].So, we designed a heuristic solution to solve it.

Whale optimization algorithm
Whale optimization algorithm is a new type of intelligent optimization algorithm proposed by Seyedali et al. [25], which has the advantages of easy implementation, few control parameters, and strong robustness.The algorithm is inspired by the unique hunting behavior of humpback whales, simulating their strategies for encircling prey.
The whale optimization algorithm mimics the predation strategy of humpback whales, treating each potential solution as a whale.These whales use a random exploration mechanism to locate prey and, upon detecting prey, employ two tactics for attack: encircling shrinkage and spiral bubble netting.The WOA algorithm summarizes three mechanisms for updating positions: shrinking encircling mechanism, spiral updating mechanism, and prey exploration mechanism.

Shrinking encircling mechanism
After detecting the prey, humpback whales approach the prey gradually by employing a strategy of encirclement contraction.The formula for updating their position is as follows: (5) Eq. 2 to Eq. 5. ( Where, t represents the current iteration number; X * represents the position vector of the best solution in the current population; X represents the position vector of the current individual, D and A control the step length of contraction and encirclement, their coefficients A and C are calculated by the following formulas: Where, r is a random vector whose values range between [0, 1] .a is a convergence factor, which lin- early decreases from 2 to 0 as the iteration progresses.a = 2 − 2t t max , t max is the maximum number of iterations.In the shrinking encircling mechanism, each whale updates its own position based on the current optimal position of the population.By adjusting the values of the coefficient vectors A and C , the search behavior of the whales around the prey can be controlled, while reducing the value of parameter a can achieve the behavior of shrinking encirclement.

Spiral updating mechanism
Whales attack their prey by moving upwards in a spiral motion and continuously shrinking the encirclement during the hunting process.In the spiral update position method, whales move towards the prey in a spiral motion.The formula for updating their position is as follows: Where, D ′ = X * t − X , represents the distance between the whale and the current global optimum individual; b is a constant defining the shape of the logarithmic spiral, l is a random number between [−1, 1].
Whales swim synchronously along a spiral path within the shrinking encirclement of the prey.In order to simulate this synchronous behavior, it is assumed that the probability of choosing the shrinking encirclement mechanism and the spiral update mechanism is both 0.5 during the optimization process.The formula for updating their position is as follows: Where, p is a random number uniformly distributed in the range [0, 1].

Prey exploration mechanism
Before the approximate location of the prey is determined, in order to enhance the exploration of the (9 hunting space, the search for prey mechanism is conducted.The whales swim outside the shrinking encirclement when the coefficient vector |A| > 1 .the position update formula of the prey exploration mechanism is as follows: Where, X rand stand for the position of a random indi- vidual in the whale population, D represents the distance between the current individual and the random whale individual.The definitions of coefficient vectors A and C are the same as in Eqs. ( 9) and (10).
Based on the above analysis, the main parameters of the WOA algorithm include coefficient vectors A and C .Among them, parameter A is crucial for adjusting the global exploration and local exploitation capabilities of the WOA algorithm.When |A| > 1 , the whale population is guided to conduct extensive searches, which helps to enhance the global exploration capability of the WOA algorithm in the solution space.Whereas when |A| ≤ 1 , the search range is limited to a smaller area, prompting the algorithm to conduct more detailed local searches, thereby improving local exploitation capability.
The flowchart of WOA is shown in Fig. 3.

Adaptive boundary whale optimization algorithm
Although WOA performs excellently in many situations, it has limitations in handling high-dimensional problems or problems with a wide feature space.In order to tackle this problems, we put forth an Adaptive Boundary Whale Optimization Algorithm.ABWOA enhances the algorithm's convergence speed and accuracy by dynamically adjusting the search boundaries during the search process.This method not only strengthens the algorithm's global search capability but also improves its performance in multimodal function optimization problems.The decimal coding scheme of population X is shown in Fig. 4. The individual x k within the population repre- sents a potential construction scheme, which is a 1 × m matrix, where m denotes the number of twin physical network nodes and n represents the quantity of DTNI service nodes.Each individual within the population X is designated as x k = (a k1 , a k2 , . . ., a ki , . . ., a km ) , where x k represents a possible construction scheme for DTN. a ki denotes the deployment of twinned physical network node i on DTNI node a ki , with in population X, m signifies the number of twinned physical network nodes, and n represents the number of DTNI nodes.For the construction scheme x k , let τ represent the number of distinct values of the discrete value a ki in x k .Then τ indicates that running m twin physical network nodes requires τ DTNI nodes.It is evident that the smaller τ is, the greater the quality of the solution.
Every swarm intelligence optimization algorithm incorporates some concepts of random algorithms, which directly leads to the randomness of solutions.Our proposed ABWOA algorithm is no exception.Under the influence of randomness, the solutions generated by the ABWOA algorithm are likely to be invalid, meaning that the allocation of services according to the allocation plan may result in negative remaining CPU, memory, or link bandwidth between some DTNI servers.A negative value indicates that the DTs deployed on these DTNI servers have exceeded the maximum available resources on these servers.
There are generally three methods to deal with illegal solutions.The first is to repair the illegal solutions to make them valid, but in this issue, repairing illegal solutions is relatively difficult, mainly because modifying the value must consider each constraint in "Problem statement" section, and the combination of these constraints constitutes an NP-hard problem.The second, and simplest, is to directly discard the illegal solutions, but this leads to a reduction in the number of individuals in the population and a loss of population diversity.The last method to handle illegal solutions is to penalize the illegal solutions, reducing their priority in the overall population, and this penalty should reflect the severity of different illegal solutions.The objective of the penalty function is to transform the constrained problem into an unconstrained one by introducing artificial penalties for violating constraints.
In this paper, we employ the Augmented Lagrangian Method (ALM) for constraint handling, which was first discussed by Hestenes and Powell in 1969 [26].Rockafellar modified the idea for inequality constraints [27].ALM is similar to the penalty method.However, it reduces the possibility of ill-conditioned situations occurring in the penalty method by incorporating explicit Lagrange multiplier estimates into the function to be minimized (referred to as the augmented Lagrangian function) [28].In generally, a series of such penalty functions are defined, in which the penalty term for constraint violation is multiplied by a positive coefficient (penalty coefficient or parameter).By increasing this coefficient, more where f(x) is the objective function and g(x) is the inequality constraint.
The ALM can be written as follows: where g(x) = g(x) if g(x) > 0 else it is zero, µ is the penalty coefficient and g i (x) 2 is the quadratic penalty term. is the Lagrange multiplier.The main advantage of this method is that, unlike the penalty method, it does not require the penalty coefficient µ to approach infinity to solve the original constrained problem.Instead, by introducing the Lagrange multiplier term, the penalty coefficient µ can remain relatively small, thus avoiding the occurrence of ill-conditioned situations.WOA uses a random vector to update the whale's position during the solution process.By using the coefficient vector A , whales are forced away from the cur- rent optimal solution to expand the search range.For the problem we need to solve, the expanded search range and the solutions dynamically adjusted according to the optimal solution may have already exceeded the range (15 of the optimal values that have been solved.Based on the previously mentioned encoding, we discovered that dynamically adjusting the search boundaries of the problem during the algorithm's iterative process -dynamically modifying the search boundaries of the whale -can significantly enhance the quality of the optimal solution and accelerate the algorithm's rate of convergence.According to "Problem statement" section and Eqs. ( 15), (16), it can be known that F (x k ) denotes the out- put of the individual x k after the operation of the eval- uation function F(x), which is the number of DTNI nodes used.Let y k = F (x k ) , then y k signifies the num- ber of DTNI nodes required to construct the DTN system according to the operation plan x k constructed by DTN, and Y signifies the output of the population X after the operation of the evaluation function F (X) .Let ε = min(Y ) , ε represents the optimal solution within the population X , suggesting that ε DTNI nodes are adequate for the operation of the DTN system.If ε < n , which implies that the number of DTNI nodes needed by the current scheme is less than the present search boundary n, the problem's upper limit can be reduced to ε .Then, the other components in population X are adjusted under the new upper bound.
The ABWOA will operate according to the pseudocode shown in Algorithm 1. (17) Fig. 4 The decimal coding scheme of population

Experimental evaluation
In this section, we discuss the performance of the ABWOA.Our experiments are based on Microsoft's public dataset Azure VM Packing Trace [29], from which we extract creation requests (each creation request includes CPU, memory, and other metrics) to serve as a reference for resource occupation during the operation of twin physical network nodes.According to the operation of the digital twin network, 10% of the requested data resources (CPU, memory) are taken as the resource occupation for DTNI operation.The physical network topology adopts the campus network [30], which consists of the core layer, distribution layer, access layer, and host.The bandwidth of the core layer network is 10Gbps, and the rest is 1Gbps.To ensure the operational efficiency of large-scale DTN, DTNI employs a fully connected network with a bandwidth of 20Gbps.To fully verify the superior performance of the ABWOA algorithm, we selected physical networks of six different network scales with 495, 1010, 1520, 2015, 2550, and 3054 nodes as experimental subjects.The number of nodes in each layer and the number of iterations corresponding to each network scale are shown in Table 1. Figure 5 shows an example of a physical network topology.To ensure the normal operation of DTN and to provide it with operational margin, during the physical network experiments with 495 and 1010 nodes, 50 DTNI nodes were selected; for the remaining larger-scale physical network experiments, 60 DTNI nodes were chosen.The experiment compares the ABWOA algorithm with ABC (Artificial Bee Colony) [31], DE (Differential Evolution Algorithm) [32], GA (Genetic Algorithm) [33], MSA (Moth Search Algorithm) [34], PSO (Particle Swarm Optimization) [35], and the original WOA algorithm.Furthermore, to verify the universality of the proposed adaptive boundary strategy, we applied the adaptive boundary strategy to each of the comparison algorithms mentioned above.
The algorithm is written in Python and runs on an Intel Core I7-12700KF CPU 3.6GHz, 32G RAM and Windows 11 64-bit operating system.To fairly compare all algorithms, the termination condition for each algorithm's run is the same number of iterations.To avoid the randomness of the experimental results, after multiple runs and comparisons of different parameters for each algorithm, and based on repeated parameter adjustments according to the literature, the results of 30 consecutive runs of each algorithm were selected for statistical analysis.The running parameters of each algorithm are shown in Table 2.
Table 3 illustrates the performance metrics of various algorithms across different problem dimensions.Where best, Worst, Average, Standard Deviation refer to the optimal, worst, mean and standard deviation obtained from 30 runs respectively.It is evident from the data that as the problem size escalates, the performance of most algorithms tends to degrade in terms of optimal solution quality.However, ABWOA consistently outperforms the other algorithms, showcasing superior solution quality and greater stability across all dimensions considered.Although the standard deviation of ABWOA increases with the size of the problem, its worst solution is always better than the best solutions of other algorithms.In contrast, ABC, DE, and MSA progressively fail to obtain better solutions as the problem size increases, reflecting the fact that it becomes increasingly difficult for them to find highquality solutions as the problem size increases.WOA can obtain better solutions, but its standard deviation is larger, indicating that WOA has poorer stability.Compared to the WOA, ABWOA not only improves the quality of the solutions but also enhances the stability of the solutions.PSO and GA have lower standard deviations at various scales, but their best solutions are far inferior to those of WOA and ABWOA, indicating that PSO and GA have better stability at various scales but lower solution quality.Fig. 5 The topology of physical network Figure 6 shows the convergence graphs of various algorithms on the problem of constructing large-scale digital twin networks.It can be observed that DE and MSA cannot converge on large-scale problems, and both the ABC and PSO have difficulty converging or even cannot converge.However, the convergence speed of GA is relatively stable, but under the unified limit of iteration times, their final results are not as good as the WOA algorithm.Among all the algorithms compared, WOA has the best convergence speed and convergence effect, but it still falls short compared to the ABWOA algorithm, which has the optimal running speed, convergence speed, and convergence effect.
Table 4 illustrates the performance metrics of various algorithms using adaptive boundary across different problem dimensions.In comparison with Table 3, it is evident that the adaptive boundary can also enhance the quality of solutions from each algorithm to a certain extent.However, the standard deviation of the algorithms that utilized adaptive boundary has also increased, indicating that the stability of the solutions is not as good as when adaptive boundary is not used.In large-scale experiments, the ABC, DE and MSA that used adaptive boundary still failed to converge, while the quality of solutions from the PSO algorithm that utilized adaptive boundary has significantly improved.Nevertheless, the optimal solutions obtained by other algorithms using adaptive boundary still have a considerable gap compared to the optimal solution of ABWOA.
It is worth noting that some of the algorithms in Tables 3 and 4 have zero standard deviation.This is because these algorithms have been unable to further improve and find a better solution.
Figure 7 shows the convergence graphs of various algorithms using adaptive boundary in the problem of constructing large-scale digital twin networks.It can be observed that after using adaptive boundary, the algorithms are improved in the experiment in 495  dimensions, but the effect is gradually less obvious as the scale increases, and in larger scales, the solution is still fails to converge.In addition, the PSO algorithm converges significantly faster and continues to converge at all scales, and the quality of the solution improves.The convergence speed of GA is also enhanced, and the quality of the solution is improved.Overall, adaptive boundary can enhance the convergence speed and the quality of the optimal solution at convergence of each comparative algorithm, but it still cannot match ABWOA.Tables 5 and 6 shows the average running time statistics of various algorithms.It can be observed that as the problem size continues to increase, the running time of the algorithms sharply increases.Through comparison, it can be seen that the contrast algorithms using adaptive boundary have also significantly improved in terms of running speed, but overall, they are still not as fast as ABWOA.

Conclusion
With the development of computer network technology and the application of digital twin network technology, the number of digital twins involved in DTN is increasing, necessitating the efficient allocation of digital twins of various physical network elements to the distributed digital twin network infrastructure.In this paper, we propose an adaptive boundary whale optimization algorithm for the DTN construction problem, aiming to efficiently obtain a set of DTNI servers while minimizing total resources, improving operational efficiency, and reducing operational costs.The ABWOA leverages the characteristics of adaptive boundary to flexibly adjust the search range, accelerate the convergence speed of the algorithm, and obtain better solutions during the convergence process.The algorithm was compared with other heuristic algorithms.Experimental results show that our algorithm is competitive, especially in larger scale networks.
As the physical network topology changes over time during operation, the digital twin network system also needs to adapt to these changes in real time.Future work two nodes in DTNI, and E D uv be the link connecting nodes V D u and V D v in DTNI.For the convenience of description below, we use u, v instead of V D u , V D v and uv instead of E D uv .The V D represents the set of DTNI nodes, with u, v ∈ V D indicating two nodes in G D .The E D repre- sents the set of links connecting DTNI nodes, with uv ∈ E D indicating the link connecting nodes G D u and G D v in G D .DTNI serves as the operational platform for the digital twin entities, characterized by three capacity metrics: the bandwidth capacity of link uv, the memory capacity of node u, and the CPU capacity of node u, denoted by C bw uv , C mem u and C CPU u respectively.A continuous exchange of data is maintained among digital twins

Fig. 1
Fig. 1 Architecture of large-scale digital twin network

Fig. 3
Fig. 3 The flow chart of WOA

Table 1
Number of network element nodes and number of iterations at each layer in each scale

Table 2
Comparison of ABWOA results with others

Table 3
Comparison of ABWOA results with other algorithms

Table 4
Comparison of ABWOA results with other algorithms using Adaptive Boundary

Table 5
The average running time statistics for algorithms (second) will focus on researching more efficient real-time scheduling algorithms to enable efficient migration of digital twin entities when there are changes in the physical network or the digital twin network infrastructure, ensuring effective adaptation to real-time changes in the physical network environment.

Table 6
The average running time statistics of algorithms using Adaptive Boundary (second)