An_Intelligent_Route_Computation_Approach_Based_on_Real-Time_Deep_Learning_Strategy_for_Software_Defined_Communication_Systems
An_Intelligent_Route_Computation_Approach_Based_on_Real-Time_Deep_Learning_Strategy_for_Software_Defined_Communication_Systems
ABSTRACT Software Defined Networking (SDN) is regarded as the next generation paradigm as it simpli-
fies the structure of the data plane and improves the resource utilization. However, in current Software
Defined Communication Systems (SDCSs), the maximum or minimum metric value based routing strategies
come from traditional networks, which lack the ability of self-adaptation and do not efficiently utilize the
computation resource in the controllers. To solve these problems, in this paper, we utilize the deep learning
technique to conduct the routing computation for the SDCSs. Specifically, in our proposal, the considered
Convolutional Neural Networks (CNNs) are adopted to intelligently compute the paths according to the input
real-time traffic traces. To reduce the computation overhead of the central controller and improve the adapta-
tion of CNNs to the changing traffic pattern, we consider an online training manner. Analysis shows that the
computation complexity can be significantly reduced through the online training manner. Moreover, the sim-
ulation results demonstrate that our proposed CNNs are able to compute the appropriate paths combinations
with high accuracy. Furthermore, the adopted periodical retraining enables the deep learning structures to
adapt to the traffic changes.
INDEX TERMS Software defined communication systems, deep learning, real-time learning, routing
computation
2168-6750 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE
1554 permission.
Authorized licensed use limited to: Mepco Schlenk See ht_tps://www.ieee.org/publications/rights/index.html
Engineering College. Downloaded on October 09,2024 for more
at information. VOLUME
05:53:06 UTC from IEEE 9, NO.
Xplore. 3, JULY-SEPT.
Restrictions 2021
apply.
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
VOLUME 9, NO.
Authorized 3, JULY-SEPT.
licensed 1555
2021to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE Xplore. Restrictions apply.
use limited
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
1556 VOLUME
Authorized licensed use limited to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE 9, NO.
Xplore. 3, JULY-SEPT.
Restrictions 2021
apply.
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
ðl Þ ðl Þ ðl Þ shown in Eqs. (4) and (5). The details of the backward propa-
1
ui;j;k ¼ ðU ðl1 1Þ Wk 1 Þði; jÞ þ wbk1
gation method can be referred to [23].
P X
X M X
N
ðl1Þ ðl Þ
(1)
¼ wm;n;p aiþm;jþn;p þ wbk1 ; @JðW; BÞ
p¼1 m¼1 n¼1 w :¼ w þ h ; (4)
@w
ðl1 Þ ðl1 Þ
ai;j;k ¼ f ðui;j;k Þ; (2) @JðW; BÞ
b :¼ b þ h ; (5)
ðl1 Þ @b
where f ðÞ is the activation function and ai;j;k
is the activated
value of the unit in the ith row and jth column of the feature
ðl1 Þ ðl Þ where w and b represent any weight and bias, respectively.
map. Therefore, ui;j;k is the value before activation. wbk1
denotes the bias of the kth filter and is usually a single IV. PROBLEM STATEMENT AND MODEL DESIGN
ðl1 1Þ
numeric value. aiþm;jþn;d is the activated value of unit in the With the increasing number of users and rapidly changing net-
ði þ mÞth row and ðj þ nÞth column. The most commonly work environment, global networks are confronted by many
used activation function is the Rectified Linear Unit (ReLU) challenges. To meet the future network requirement, SDN has
function. been regarded as the next generation network paradigm since
After every convolution operation, the output consists of the separation of complex control logic and data forwarding
several feature maps. Then, to progressively reduce the spa- significantly simplifies and unifies the structures of the
tial size in order to reduce the number of parameters and switches. Moreover, the well-defined programmable interface
computation, the operation named downsampling is con- increases the network flexibility. However, current packet for-
ducted through inserting a pooling layer in-between the suc- warding algorithms still follow conventional fixed-rule-based
cessive convolutional layers. The final pooling layer is routing protocols, e.g., minimum or maximum metric values,
connected to the fully connected layer, in which every unit is resulting in the same decision when similar traffic patterns
connected to all units of the previous layer. As the CNN is occur, even though the decision has been proved wrong. To
usually used for classification, if we assume that there are v describe this more clearly, we can take the data plane as shown
kinds of different results, then we can use a vector consisting in Figure 2 as an example. Here, it is reasonable to assume that
of v binary values to represent the result [22]. And in the vec- some switches, S1 , S2 , and S3 , in the data plane, generate pack-
tor, only one unit must have the value of 1, of which the ets destined for the switch S8 . And the central controller choo-
order represents the result. To get the final vector, a softmax ses the best paths which have the minimum hop numbers.
regression process is necessary to be conducted on the final According to the network topology, it is easily understood that
fully connected layer. Since the CNN is trained in a super- the central controller chooses S5 as the next node for source
vised manner, the purpose of the training is to maximize the switches, S1 , S2 , and S3 , to send packets to S8 . Therefore, when
possibility of training data, which can be expressed as a loss three source switches send packets to S8 along with their short-
function as shown in Eq. (3) [22]. est paths concurrently, the joint router of these paths, S5 , easily
! becomes the network bottleneck, leading to the degradation of
1 X m X k
network performance [24]. Even though the congestion can be
JðW; BÞ ¼ 1fy ¼ jglog pi ðxi Þ ; (3)
m i¼1 j¼1 alleviated after the switches inform the controller about the
congestion and the controller updates the paths for S1 , S2 , and
where W and B represent the weights and biases of the CNN. S3 , this situation can happen again while similar traffic patterns
m is the number of training data. xi is the ith input training appear. Seriously, when source switches S1 , S2 , and S3 have
data. Here, 1fg is the indicator function and its values satisfy burst traffic patterns as shown in Figure 4(a) and all these pack-
that 1fa true statementg ¼ 1 and 1fa false statementg ¼ 0. ets are destined for S8 , the joint switch S5 becomes congested
The purpose of training is to minimize the loss function and the network performance in terms of the packet loss rate
which can be obtained by adjusting the values of the weights and average packet delay deteriorates repeatedly as shown in
and biases of the CNNs. The process which adopts the final Figure 4(b) and 4(c).
output to adjust the weight and bias is named as backward The reason behind this phenomenon is because of the
propagation and fulfilled through the gradient descent as fixed rule based routing strategy which lacks the ability of
VOLUME 9, NO.
Authorized 3, JULY-SEPT.
licensed 1557
2021to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE Xplore. Restrictions apply.
use limited
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
1558 VOLUME
Authorized licensed use limited to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE 9, NO.
Xplore. 3, JULY-SEPT.
Restrictions 2021
apply.
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
VOLUME 9, NO.
Authorized 3, JULY-SEPT.
licensed 1559
2021to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE Xplore. Restrictions apply.
use limited
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
matrix for source switch i and destination switch j and the kth destined for itself. Then, all the switches upload the informa-
path, respectively. The controller can choose one path from tion including the traffic patterns and delay values to the con-
each path matrix to construct a paths combination. And all the troller according to Step 9. With these data, the controller can
paths combinations can be saved in a three-dimensional matrix form a matrix TP representing the traffic patterns of all
represented by C in a descending priority order. In this matrix, switches, which will be used as the input of the deep CNNs.
the value of its unit ci;j;k denotes the path order for ODij in the Also, after numerous cycles running the conventional routing
kth paths combination. protocols, the controller can obtain multiple sets of delay val-
ues for each paths combination in C with different traffic pat-
Algorithm 2. Using CNNs to Choose Paths Combination terns. Therefore, for each paths combination, the central
during Each tu controller can judge whether it is congested or not according to
some pre-defined standard, for example, the threshold of the
Input: CNNs
congestion can be two times of the minimum delay value. As
Output: ðx; yÞ (x represents the traffic patterns, TP, y denotes
shown in Steps 12 to 16, if the delay of any chosen path pij
the labels of each paths combination)
1: for p ¼ 1; :::; n1 do exceeds the threshold, it means the chosen paths combination
2: for each paths combination ck do ck is congested, we can get one set of training data for CNNk :
3: Controller conducts a forward propagation process the input is the traffic patterns in previous update interval and
by inputting TP to CNNk and output y. the output is ð1; 0Þ, as we can only use the traffic patterns in
4: if y is (0,1) then last tu to decide the paths in next tu .
5: The paths combination ck is chosen.
6: end if B. RUNNING PHASE
7: break After getting initialized, the CNNs will be applied for routing in
8: end for the running phase to replace the traditional routing protocols.
9: Controller uses the chosen paths combination to gen- Moreover, since we utilize a real-time learning strategy as men-
erate the rules and installs the rules on the corre- tioned in Section IV, the CNNs in our proposal will be periodi-
sponding switches cally retrained with real-time data. Therefore, this phase can
10: for each traffic patterns recording interval d do consist of three parts as shown in Figure 6: data collection, rout-
11: Every switch forwards packets according to the
ing judgement, retraining CNNs, which will be discussed next.
installed rules, records the traffic patterns, and cal-
culates the delay for each received packet.
1) DATA COLLECTION
12: Every switch calculates the delay of the paths des-
Besides forwarding packets all the time, as shown in Steps 10
tined for itself, sends the traffic pattern and path
to 13 in Algorithm 2, every switch in the data plane keeps
delay values to the controller.
collecting the data of traffic patterns in each d as the input of
13: end for
14: The controller constructs the input traffic patterns of CNNs. The switches also calculate and record the delay val-
the CNN, TP. ues when receiving packets. And during each update interval
15: if the delay for any path of ODij , di;j > threshold tu , every switch uploads these data to the central controller,
then and the central controller addresses the data and utilizes for
16: y ¼ ð1; 0Þ two purposes. First, the traffic patterns in the previous path
17: else update interval are adopted as the input of CNNs to choose
18: y ¼ ð0; 1Þ the path for next tu . Second, the controller utilizes the traffic
19: end if patterns and delay values for retraining the CNNs in next tr .
20: The controller can generate a set of data ðTP; yÞ for For example, if the delay of paths combination ck exceeds
current paths combination ck the threshold when the traffic pattern is TP, then the control-
21: end for ler gets one set of data for retraining CNNk , and the input
and output are TP and ð1; 0Þ, respectively.
After obtaining all the paths combinations, the controller
constructs the CNNs as shown from Steps 2 to 4 in Algo- 2) ROUTING JUDGEMENT
rithm 1. Here, we can use CNNk to denote the CNN for paths Since it receives the traffic patterns from all the switches dur-
combination ck . Since the CNNs will be utilized for routing in ing the whole packet forwarding process, the controller can
the running phase, we need to get some data to train our CNNs organize the traffic patterns in the form of CNN’s input as
in the initial phase. As mentioned previously, in every d, each explained in Section IV. Therefore, at the beginning of the
switch records its traffic patterns including the traffic genera- kth update interval, tu , the traffic pattern data of ðk 1Þth
tion rate and the remaining buffer size as shown in Step 8 in update interval are utilized as the input to CNNs to determine
Algorithm 1. To judge whether the path is congested or not, whether the paths combination will lead to congestion or not.
every switch also needs to calculate and record the delay when As the paths combinations are saved in the descending prior-
receiving packets destined for itself. Therefore, in each tu , ity order, the controller will judge these paths combinations
every switch can calculate the delay values for the paths one by one. As shown from Step 2 to Step 8 in Algorithm 2,
1560 VOLUME
Authorized licensed use limited to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE 9, NO.
Xplore. 3, JULY-SEPT.
Restrictions 2021
apply.
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
the judgement process for each paths combination can be ful- In the controller, the deep learning related computations cost
filled by conducting a forward propagation of the corre- most of the resource. The values of computation and storage
sponding CNN with the traffic patterns as the input. The costs depend on the architectures of the CNN, which can be
detailed computation process has been introduced in only decided by trial and error. Therefore, we focus on the
Section III-B. As shown in Steps 4 to 7, if the result of time and space complexity analysis. According to the analysis
CNNk is ð0; 1Þ, which means the paths combination ck will in [25], the computation overhead of training and running one
not be congested, then the controller chooses the paths com- CNN at a time is dependent on the number of nodes in its input
bination for routing in the next tu and the remaining paths layer. Specifically, if n denotes the number of switches in the
combinations will not be considered since they have lower network and each path update interval equals k traffic pattern
priorities. It should be noted that the computation for judging recording intervals, the input layer of each CNN consists of kn
each paths combination is simple and the time cost is negligi- units. Then the time complexity can be denoted as Oðk2 n2 Þ.
ble compared to d. In this paper, we do not consider the delay As k is usually negligible compared with n in our considered
caused by the judgement process. SDCS, the time complexity can be simplified as Oðn2 Þ. The
traditional shortest path strategies, such as the Dijkstra algo-
Algorithm 3. Retraining the CNNs rithm, also have a time complexity not less than Oðn2 Þ. There-
Input: ðx; yÞ (x represents the traffic patterns, TP, y denotes fore, the computation cost of training one CNN with one set of
data is comparable to conventional algorithms. The most com-
the labels of each paths combination)
putation-consuming part of training a deep learning architec-
Output: Updated CNNs
1: for each paths combination ck do ture is that massive data need to be adopted to repeat and
2: Controller trains CNNk with its training data ðx; yÞ iterate the training. However, in our considered proposal, we
3: end for consider the real-time training manner, meaning that each
time, we just use a few sets of accumulated data to retrain sev-
eral CNNs. Compared with the traditional method which trains
all the CNNs one time, the increase of computation cost is still
3) RETRAINING PHASE
limited. This analysis is also applicable to the storage cost.
As mentioned in the previous section, in our proposal, the rout-
Therefore, the space complexity to save the recorded traffic
ing strategy keeps learning from the experiences, which is ful-
patterns and delay values is OðknÞ OðnÞ.
filled by periodically updating the weight matrices with the
Compared with the training process, to run the deep learning
newly generated traffic trace during the packet forwarding pro-
based proposal, it costs much less computation and storage
cess shown in Algorithm 3. The retraining of the CNNs in the
resource since we just need to utilize one set of traffic pattern
initial phase is nearly the same as that in the initial phase. And
to conduct the forward propagation of several CNNs. And this
compared with the training in this phase, the retraining is based
process has no iteration or repetition. Therefore, the time and
on the previous training, which means that the weights of every
space complexity are just Oðn2 Þ and OðnÞ, respectively.
CNN have reasonable values and the training has less itera-
In our proposal, the switches have the same operations
tions. To more clearly explain the two training process in these
during the training and running periods, meaning the same
two phases, we can think that in the initial phase, the CNNs
computation and storage costs. Moreover, the switches do
are trained to get the basic knowledge about how to choose the
not need to conduct any deep learning related computations
paths combination, while in the running phase, the CNNs
and are just responsible for recording their own traffic pat-
are trained to update and strengthen their knowledge. As the
terns and delay values of the paths from the source nodes to
retraining is a time-consuming process, here, we can assume
themselves. Therefore, we just need to analyze the storage
that the time cost for the retraining process is Dtr . Then, as
complexity, which is Oðk þ nÞ OðnÞ. Thus, it can be found
shown in Figure 6, before the retraining process is finished, the
that the storage cost for the switches is reasonable.
controller still utilizes the CNNs before retraining to judge the
According to the above analysis, we can find that the deep
paths combinations while the updated CNNs can be adopted
learning technique is related to more computation and storage
once the retraining process is finished.
costs compared with traditional strategy. However, our consid-
ered online training manner can not only increase the self-
VI. COMPLEXITY ANALYSIS adaptation of the CNNs to the traffic changes, but also signifi-
In this section, we make some analysis about the time and cantly alleviate the costs for the controller. Therefore, in the
space complexity of our proposal. As we mentioned earlier, paper, we consider the controller consisting of the CPU and
in our proposal, the switches record their traffic patterns and GPU pools, which can accelerate the computation process.
the delay values of different paths, which are sent to the con-
troller for the training and running of the considered CNNs VII. PERFORMANCE EVALUATION
in the controller. Since all the training and running tasks are This section evaluates our proposal in terms of network perfor-
conducted by the controller, most of the computation and mance through the simulation based on C++ [19]. Since all
storage costs happen in the controller. We first focus on the the computation is conducted on a workstation with Intel Core
controller part and then the switches. i7-6900K CPU, 64GB Random Access Memory (RAM), and
VOLUME 9, NO.
Authorized 3, JULY-SEPT.
licensed 1561
2021to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE Xplore. Restrictions apply.
use limited
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
Nvidia Geforce TitanX GPU, it is reasonable to restrict the packet generation rate and remaining buffer size of each
simulation to a small size network. Therefore, we consider a switch as two channels of the CNN. In each channel, every
scenario of 3 3 wireless heterogeneous network as the data switch records the data in last 10 updating intervals. In
plane and a PC as the central controller which has been shown conv1, we have 20 filters while conv2 has 30 filters, and the
in Figure 2. We consider that the controller manages the size of each filter is 3 3. The padding parameter and the
switches in the form of out of the band. Therefore, independent step size are both 1. The two fully connected layers consist
connections between the central controller and the switches of 100 nodes and 15 nodes, respectively. We consider Xavier
should be established for the transmission of control messages. initialization [28] to set the initial values of all weights and
And the congestion in the data plane does not affect the trans- biases. The accuracy rate of this CNN structure after training
mission of control messages. It is worthwhile to note that this reaches 98.7%, which is sufficient for our proposal.
scale of simulation is sufficient enough to demonstrate that our In the first simulation, we compare the network performance
proposal outperforms conventional routing protocols such as before and after utilizing our deep learning-based proposal.
IS-IS, OSPF, and RIP. In this network, the switches S1 , S2 and The packet generation process in three source switches satis-
S3 generate packets destined for S8 . In order to increase the fies the Possion distribution. And the whole simulation lasts
spectral efficiency, we consider a WLAN system that simulta- about 1,200s while the initial phase and running phase both
neously uses multiple bands such as 2.4GHz and 5GHz [26], share half of the simulation. The average packet generation
[27]. The link bandwidth and the buffer size of each switch are rate is 180Mbps. In the initial phase, the central controller runs
set to 480Mbps and 10MB, respectively. In our simulation, the the conventional routing protocols to generate data for training
sizes of each data packet and signaling packet are 1kb and the CNNs. Then, the CNNs are adopted in the controller to
512b, respectively. The time slot (d) in the simulation is 1s and choose the paths combinations in the running phase. Figure 7
the path updating interval (tu ) consists of only 1 time slot while (a) and 7(b) show the network performance in terms of packet
the retraining time interval (tr ) consists of 100 time slots. loss rate and average packet delay. In the two figures, we can
In our simulation, the structure of CNN after training and find a significant decrease after the application of trained
the parameters have been shown in Table 1. We can find that CNNs into routing, meaning that our proposed CNNs learn to
each CNN consists of 2 convolutional layers (denoted as avoid the congested paths from previous experiences. More-
conv1 and conv2, respectively) and 2 fully connected layers over, the values of packet loss rate and average packet delay
(represented as fc1 and fc2, respectively) as well as the input are still decreasing until reaching the lower bound. This indi-
and output layers. Since the size of the input layer is limited cates that our proposed CNNs are retrained periodically to
because of the considered network size, the pooling layer is learn the new experience, which helps to increase its knowl-
not necessary in our CNNs. In the input layer, we adopt the edge on routing and improve the SDCS performance.
1562 VOLUME
Authorized licensed use limited to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE 9, NO.
Xplore. 3, JULY-SEPT.
Restrictions 2021
apply.
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
FIGURE 8. The network performance comparison between the conventional routing protocol and our proposal in terms of packet loss
rate and average packet delay.
FIGURE 10. Comparison of SDCS performance under different packet generation rates in our proposal and the bencmark methods
(OSPF) in terms of packet loss rate, average packet delay, and throughput.
VOLUME 9, NO.
Authorized 3, JULY-SEPT.
licensed 1563
2021to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE Xplore. Restrictions apply.
use limited
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
the packet loss rates with the two routing strategies are both 0 REFERENCES
when the packet generation rate is 40Mbps. In Figure 10 [1] J. Liu, S. Zhang, N. Kato, H. Ujikawa, and K. Suzuki, “Device-to-device
(a), it can be clearly found that the network running the communications for enhancing quality of experience in software defined
multi-tier LET-A networks,” IEEE Netw., vol. 29, no. 4, pp. 46–52,
conventional routing algorithm gets congested when the Jul. 2015.
packet generation rate is just above 160Mbps while our [2] H. Guo, J. Liu, Z. M. Fadlullah, and N. Kato, “On minimizing energy con-
proposal can still successfully transfer all the packets sumption in fiwi enhanced LTE-A HetNets,” IEEE Trans. Emerging Top.
Comput., vol. 6, no. 4, pp. 579–591, Oct. 2018.
when the packet generation rate is 160Mbps. When the
[3] L. Qiang, J. Li, and C. Touati, “A user centered multi-objective handoff
packet generation rate is 280Mbps and 400Mbps, the scheme for hybrid 5G environments,” IEEE Trans. Emerging Top. Com-
SDCS using our proposal also gets congested which can put., vol. 5, no. 3, pp. 380–390, Jul.-Sep. 2017.
be explained by the switches’ limited buffer size and link [4] I. T. Haque and N. Abu-Ghazaleh , “Wireless software defined network-
ing: A survey and taxonomy,” IEEE Commun. Surveys Tuts., vol. 18,
bandwidth. On the other hand, the result can still demon- no. 4, pp. 2713–2737, May 2016.
strate that compared with the conventional routing proto- [5] I. F. Akyildiz, A. Lee, P. Wang, M. Luo, and W. Chou, “Research chal-
col, the proposed CNNs can make the better routing lenges for traffic engineering in software defined networks,” IEEE Netw.,
vol. 30, no. 3, pp. 52–58, May 2016.
decision for alleviating the traffic congestion. [6] H. Huang, P. Li, S. Guo, and W. Zhuang, “Software-defined wireless mesh
networks: Architecture and traffic orchestration,” IEEE Netw., vol. 29,
no. 4, pp. 24–30, Jul. 2015.
VIII. CONCLUSION [7] K. Wang, Y. Wang, D. Zeng, and S. Guo, “An SDN-based architecture for
next-generation wireless networks,” IEEE Wireless Commun., vol. 24,
SDN has been viewed as the paradigm of next generation
no. 1, pp. 25–31, Feb. 2017.
network due to its flexibility and conciseness. However, cur- [8] C. Chuang, Y. Yu, A. Pang, H. Tseng, and H. Lin, “Efficient multicast
rent SDN structure mainly utilizes conventional routing pro- delivery for data redundancy minimization over wireless data centers,”
tocols which are based on fixed rules and lacks the IEEE Trans. Emerging Top. Comput., vol. 4, no. 2, pp. 225–241,
Apr.-Jun. 2016.
intelligence to learn from previous experiences. This can [9] D. Kreutz, F. M. V. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodol-
lead to the repetition of wrong decisions when similar traffic molky, and S. Uhlig, “Software-defined networking: A comprehensive sur-
patterns happen. The inaccurate path decision results in the vey,” Proc. IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015.
[10] B. Mao, F. Tang, Z. M. Fadlullah, N. Kato, O. Akashi, T. Inoue, and
network congestion, which leads to further performance dete- K. Mizutani, “A novel non-supervised deep learning based network traffic
rioration. In this paper, we propose a deep learning based control method for software defined wireless networks,” IEEE Wireless
routing strategy which utilizes CNNs to choose the paths Commun. Mag., vol. 25, no. 4, pp. 74–81, Aug. 2018.
[11] H. Hu, H. H. Chen, P. Mueller, R. Q. Hu, and Y. Rui, “Software defined
combinations according to the network traffic trace in an wireless networks (SDWN): Part 1 [guest editorial],” IEEE Commun.
online fashion. This strategy can not only better choose the Mag., vol. 53, no. 11, pp. 108–109, Nov. 2015.
paths combinations according to previous network trace, but [12] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
J. Rexford, S. Shenker, and J. Turner, “OpenFlow: Enabling innovation in
also keeps improving its performance through continually campus networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 38,
learning from previous experience. Analysis shows that our no. 2, pp. 69–74, Apr. 2008.
proposal can avoid the congested paths and balance the net- [13] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521,
no. 7553, pp. 436–444, May 2015.
work traffic, resulting in the significant improvement of
[14] N. Kato, Z. M. Fadlullah, B. Mao, F. Tang, O. Akashi, T. Inoue, and
packet loss rate and average packet delay in the SDCS. Thus, K. Mizutani, “The deep learning vision for heterogeneous network traffic
it can be concluded that our proposal outperforms conven- control: Proposal, challenges, and future perspective,” IEEE Wireless
tional routing protocols in SDCSs. Furthermore, with the Commun., vol. 24, no. 3, pp. 146–153, Jun. 2017.
[15] G. E. Hinton, S. Osindero, and Y.-W. Teh, “A fast learning algorithm for
development of the new cellular communication technology, deep belief nets,” Neural Comput., vol. 18, no. 7, pp. 1527–1554,
5G, a growing number of network applications, such as the Jul. 2006.
Internet of Things (IoT) and Vehicle to Everything (V2X), [16] “The ibrain is here and it’s already inside your phone.” [Online]. Available:
https://backchannel.com/an-exclusive-look-at-how-ai-and-machine-learning-
are emerging to provide users with different services. There- work-at-apple-8dbfb131932b\#\.43bf9cm00, Accessed on: Jan. 2018.
fore, the future global network will consist of more heteroge- [17] X. He, K. Wang, H. Huang, T. Miyazaki, Y. Wang, and S. Guo, “Green
neous devices, while the traffic patterns will become more resource allocation based on deep reinforcement learning in content-centric
IoT,” IEEE Trans. Emerging Top. Comput., 2018, doi: 10.1109/
complex. On the other hand, the proposed SDCS neglects TETC.2018.2805718
the heterogeneity of the switches in the data plane, while the [18] Z. Wang, “The applications of deep learning on traffic identification,”
considered realtime learning based routing strategy is self- BlackHat USA, 2015, Available: https://www.blackhat.com/docs/us-15/
materials/us-15-Wang-The-Applications-Of-Deep-Learning-On-Traffic-
adaptable to the network changes. Therefore, our proposal, Identification-wp.pdf
in this paper, can efficiently improve the network perfor- [19] B. Mao, Z. M. Fadlullah, F. Tang, N. Kato, O. Akashi, T. Inoue, and K. Mizu-
mance of the future networks. tani, “A tensor based deep learning technique for intelligent packet routing,” in
Proc. IEEE Global Commun. Conf., Dec. 2017, pp. 1–6.
[20] J. L. Chen, Y. W. Ma, H. Y. Kuo, C. S. Yang, and W. C. Hung, “Software-
ACKNOWLEDGMENTS defined network virtualization platform for enterprise network resource
management,” IEEE Trans. Emerging Top. Comput., vol. 4, no. 2,
The research results have been achieved by ”Research and pp. 179–186, Apr.-Jun. 2016.
Development on Intellectual ICT System for Disaster [21] “CS231n convolutional neural networks for visual recognition.”
[Online]. Available: http://cs231n.github.io/convolutional-networks/,
Response and Recovery”, the Commissioned Research of Accessed on: Jan. 2018.
National Institute of Information and Communication Tech- [22] “Convolutional neural network.” [Online]. Available: http://ufldl.stanford.edu/
nology (NICT), Japan. tutorial/supervised/ConvolutionalNeuralNetwork/, Accessed on: Jan. 2018.
1564 VOLUME
Authorized licensed use limited to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE 9, NO.
Xplore. 3, JULY-SEPT.
Restrictions 2021
apply.
Mao et al.: An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems
[23] J. Bouvrie, “Notes on convolutional neural networks,” 2006, [Online]. ZUBAIR MD. FADLULLAH (M’11-SM’13)
Available: http://cogprints.org/5869/1/cnn_tutorial.pdf, Accessed on: Jan. received the BSc degree with honors in computer
2018. science and information technology from Islamic
[24] Y. Xiao, K. Thulasiraman, G. Xue, and M. Yadav, “QoS routing under University of Technology (IUT), Bangladesh, in
multiple additive constraints: A generalization of the LARAC algorithm,” 2003, and the MSc and PhD degrees in applied
IEEE Trans. Emerging Top. Comput., vol. 4, no. 2, pp. 242–251, information science from Tohoku University, in
Apr.-Jun. 2016. 2008 and 2011, respectively. He is currently an
[25] B. Mao, Z. M. Fadlullah, F. Tang, N. Kato, O. Akashi, T. Inoue, and associate professor with the Graduate School of
K. Mizutani, “Routing or computing? the paradigm shift towards intelli- Information Sciences, Tohoku University, Japan.
gent computer network packet transmission based on deep learning,”IEEE His research interests include 5G, smart grid, net-
Trans. Comput., vol. 66, no. 11, pp. 1946–1960, 1 Nov. 2017. work security, intrusion detection, game theory,
[26] N. Egashira, K. Yano, S. Tsukamoto, J. Webber, and T. Kumagai, “Low quality of security service provisioning mechanism and deep learning. He
latency relay processing scheme for WLAN systems employing multiband received the Dean’s Award and the President’s Award from Tohoku Univer-
simultaneous transmission,” in Proc. IEEE Wireless Commun. Netw. sity in 2011, the IEEE Asia Pacific Outstanding Researcher Award in 2015,
Conf., Mar. 2017, pp. 1–6. and the NEC Foundation Prize for research contributions in 2016. He also
[27] Z. M. Fadlullah, Y. Kawamoto, H. Nishiyama, N. Kato, N. Egashira, received several best paper awards in the Globecom, IC-NIDC, and IWCMC
K. Yano, and T. Kumagai, “Multi-hop wireless transmission in multi-band conferences. He is a senior member of the IEEE.
WLAN systems: Proposal and future perspective,” IEEE Wireless Com-
mun., vol. 26, no. 1, pp. 108–113, Feb. 2019, doi: 10.1109/
MWC.2017.1700148. NEI KATO (F’13) is a full professor and the director
[28] “Understanding xavier initialization in deep neural networks.” [Online]. of Research Organization of Electrical Communica-
Available: https://prateekvjoshi.com/2016/03/29/understanding-xavier- tion (ROEC), Tohoku University, Japan. He has been
initialization-in-deep-neural-networks/, Accessed on: Jan. 2018. engaged in research on computer networking, wire-
less mobile communications, satellite communica-
tions, ad hoc & sensor & mesh networks, smart
BOMIN MAO (S’15) received the BSc degree in grid, IoT, Big Data, and pattern recognition. He has
telecommunications engineering and the MS published more than 400 papers in prestigious
degree in electronics and telecommunications engi- peer-reviewed journals and conferences. He is the
neering from Xidian University, China, in 2012 vice-president (member & global activities) of IEEE
and 2015, respectively. Currently, he is working Communications Society (2018-2019), an editor-
toward the PhD degree in the Graduate School of in-chief of IEEE Network Magazine (2015-2017), an editor-in-chief of the
Information Sciences (GSIS), Tohoku University, IEEE Transactions on Vehicular Technology (2017-), an associate editor-
Japan. His research interests include wireless net- in-chief of the IEEE Internet of Things Journal (2013-), and the chair of IEEE
works, software defined networking, quality of ser- Communications Society Sendai Chapter. He served as a member-at-large on
vice, particularly with applications of machine the Board of Governors, IEEE Communications Society (2014-2016), a vice
intelligence and deep learning. He received the best chair of Fellow Committee of IEEE Computer Society (2016), a member of
paper awards in Globecom’17. He is a student IEEE Computer Society Award Committee (2015-2016) and IEEE Communi-
member of the IEEE. cations Society Award Committee (2015-2017). He has also served as the chair
of Satellite and Space Communications Technical Committee (2010-2012) and
Ad Hoc & Sensor Networks Technical Committee(2014-2015) of IEEE Com-
FENGXIAO TANG (S’15) received the BE degree munications Society. His awards include Minoru Ishida Foundation Research
in measurement and control technology and instru- Encouragement Prize (2003), Distinguished Contributions to Satellite Commu-
ment from the Wuhan University of Technology, nications Award from the IEEE Communications Society, Satellite and Space
Wuhan, China, in 2012 and the MS degree in soft- Communications Technical Committee (2005), the FUNAI information
ware engineering from the Central South Univer- Science Award (2007), the TELCOM System Technology Award from Foun-
sity, Changsha, China, in 2015. Currently, he is dation for Electrical Communications Diffusion (2008), the IEICE Network
working toward the PhD degree in the GSIS, System Research Award (2009), the IEICE Satellite Communications Research
Tohoku University, Japan. His research interests Award (2011), the KDDI Foundation Excellent Research Award (2012), IEICE
include unmanned aerial vehicles system, game Communications Society Distinguished Service Award (2012), IEICE Commu-
theory optimization, and machine learning algo- nications Society Best Paper Award (2012), Distinguished Contributions to
rithm. He is a student member of the IEEE. Disaster-resilient Networks R&D Award from Ministry of Internal Affairs and
Communications, Japan (2014), Outstanding Service and Leadership Recogni-
tion Award 2016 from IEEE Communications Society Ad Hoc & Sensor
Networks Technical Committee, Radio Achievements Award from Ministry of
Internal Affairs and Communications, Japan (2016) and Best Paper Awards
from IEEE ICC/GLOBECOM/WCNC/VTC. He is a distinguished lecturer of
IEEE Communications Society and Vehicular Technology Society. He is also a
fellow of the IEEE and IEICE.
VOLUME 9, NO.
Authorized 3, JULY-SEPT.
licensed 1565
2021to: Mepco Schlenk Engineering College. Downloaded on October 09,2024 at 05:53:06 UTC from IEEE Xplore. Restrictions apply.
use limited