SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Big data and machine learning
for network research problems
Sabidur Rahman
Friday Group Meeting
December 22, 2016
krahman@ucdavis.edu
http://www.linkedin.com/in/kmsabidurrahman/
Agenda
• Big data and machine learning
• How these two fit into networking world?
• Random Neural Network
• Reinforcement learning
• Paper review: O. Brun, L. Wang, and E. Gelenbe, “Big data for Autonomic
Intercontinental Overlays”, IEEE Journal on Selected Areas in Communications, vol. 34,
no. 3, March 2016.
2
Big data
3http://www.ibmbigdatahub.com/infographic/four-vs-big-data
Machine learning
• Network today is producing large amount of data.
• What to do with the collected data?
• Network performance enhancement
• Smarter routing decision
• Network management and planning
• Network automation
• Analytics and automation of this huge amount of data depends largely on data analytics and
machine learning techniques.
4
Random Neural Network (RNN)
• When a biophysical neuron is excited, it transmits a train of signals, called spikes (firing of
signals), along its axon to either excite or inhibit the receiving neurons.
• The combined effect of excitatory (positive) and inhibitory (negative) inputs change the potential
level of the receiving neuron and determine whether it will become excited.
• Neurons in RNN interact by exchanging positive and negative spiking signals with certain
probability.
• RNN model is used in pattern recognition, classification, image processing, combinatorial
optimization and communication systems.
5
Timotheou S. The random neural network: a survey. The computer journal. 2010 Mar 1;53(3):251-67.
Excitatory = causing, or constituting excitation
Inhibitory = suppress or restrain an impulse
Reinforcement learning
The basic reinforcement learning model consists of:
• Set of environment and agent states S
• Set of agent actions A
• Policies of transitioning from states to actions
• Rules that determine reward (or punishment) of a transition (G and R)
6
Sutton RS, Barto AG. Reinforcement learning: An introduction. Cambridge: MIT press; 1998 Mar 1.
Paper review
O. Brun, L. Wang, and E. Gelenbe, “Big data for Autonomic
Intercontinental Overlays”, IEEE Journal on Selected Areas in
Communications, vol. 34, no. 3, March 2016.
7
Introduction
• Multihop intercontinental network that uses IP to communicate between nodes.
• IP routing often results in sub-optimal paths with respect to metrics such as end-to-end round trip
delay.
• QoS of such routes can be optimized using the collected network statistics.
• Objective: Select route to provide better QoS than IP.
• Machine learning based scheme to exploit large scale data collected from communicating node
pairs.
8
(Big) Data collection
• ICMP-based ping to collects round-trip delay data at the overlay nodes, every two minutes
• 24 hours with 20 overlay nodes: collect up to some 2.7 × 10^5 data points per day.
9
10
Routing overlay
11
Routing overlay
• Routing overlay is a method to improve performance without changing underlying network.
• Overlay network is formed by software routers deployed over the Internet.
• Operates by monitoring the quality of Internet paths (latency, bandwidth, loss rate) between
overlay nodes.
• When primary path becomes unavailable or suffers from congestion, re-routes packets along an
alternate path.
• Routing overlays can be used to quickly recover from path outages, and also improve QoS of
data flows.
• This approach makes it possible to override the routes determined by Internet protocols and to
route traffic based on metrics directly related to the performance needs of the application.
12
Self-healing and self-optimising routing overlay
• SMART overlay network is formed by software
agents that are deployed at VMs.
• On each VM, a Transmission (TA) and Reception
Agent(RA) run together with various Applications
or tasks.
• Each VM’s software router is the Proxy that
monitors the quality of the overlay paths towards
other destinations, selects the best paths, and
forwards the packets over these paths.
• TA receives the packets that are being sent to other
Applications at other sites.
• RA receives packets from the local Proxy,
decapsulate and delivers them to the appropriate
Application in the VM.
• TA, RA and Proxy enables the control of path of
packets through the network, without the
applications being aware that their data flows
are routed by the overlay.
13
Proxy: details
• Monitoring Agent: monitors the quality of the
Internet paths between the local cloud and the other
clouds.
• Routing Agent: drives the monitoring agent and uses the
data it collects to discover an optimal path.
• Forwarding Agent: forwards each incoming packet
to its destination on the path it was instructed to use by
Routing agent.
• Source routing: Routing table of source proxy describes
the complete path between overlay proxies to be followed
by a packet to reach its destination, while the path
between proxies is determined by the conventional IP
protocol.
14
Packet forwarding process
• SMART header contains the sequence of intermediate proxies.
15
Random Neural Network (RNN)
• At each time interval, the algorithm chooses a subset of paths to probe, and measures the sum of
edge delays in the probed paths.
• The algorithm then sends its packet over the minimum latency path among those it has probed.
• Each neuron in RNN represents a path from source to destination.
• RNN helps to select K paths to destination out of N paths.
• State of n connected neurons are represented by a vector k(t) = [k1(t), k2(t), . . . , kn(t)], where ki(t)
is a non-negative integer valued random variable representing the “potential” of the i-th neuron
being excited at time t.
16
Random Neural Network
• A neuron i of the RNN is said to be excited
whenever ki(t) > 0, in which case it can fire and
send signals at an average rate ri
17
Timotheou S. The random neural network: a survey. The computer journal. 2010 Mar 1;53(3):251-67.
Qi <- Ki(t)
ri
From out of network
To out of network
From other neurons
To other neurons
Positive signal received = higher probability of firing
Neg. signal received = higher probability of not firing
Reinforcement learning
• “Guide” RNN to choose better paths by:
• “Reward” neurons representing good paths.
• “Punish” neurons representing bad paths.
18
1. Increasing probability
of it’s “firing”
2. Reducing probability
of others “firing”
1. Decrease probability
of it’s “firing”
2. Increasing probability
of others “firing”
G = minimum delay
Higher delay = lower reward
Algorithm
19
2. Select neurons with highest probability at time tl
3. Calculate rewards. where G = minimize delay
4. p* is the best path
7. Good path: reward the neuron!
10.Increase positive weights going into the neuron
11. Increase negative weights leading to
other neurons
Algorithm(continued..)
20
13. Bad path: punish the neuron!
16. Increase negative weights going into the neuron
17. Increase positive weights leading to other neurons
(give other paths a higher chance of being selected)
22. Re-normalize w to avoid ever increasing weights
26. Update decision threshold T.
β ∈ (0, 1) is used to introduce forgetfulness.
Higher β will give more importance lesson learned
from previous events.
Results(1)
21
Results(2)
22
Results(3)
23
Summary
• Increasing amount of data collected from networks can help to
improve performance.
• Machine learning tools are useful to analyze and learn from
these huge data.
• Usefulness of other interesting machine/deep learning tools are
yet to be explored in Network research.
24
Thanks!
Comments: krahman@ucdavis.edu
http://www.linkedin.com/in/kmsabidurrahman/
25

Contenu connexe

Tendances

Protocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor NetworkProtocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor Network
Saatviga Sudhahar
 
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Pete Burnap
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
ijsrd.com
 
Kautz based wireless sensor and actuator
Kautz based wireless sensor and actuatorKautz based wireless sensor and actuator
Kautz based wireless sensor and actuator
Arun Raja
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
praveen369
 
CoryCookFinalProject535
CoryCookFinalProject535CoryCookFinalProject535
CoryCookFinalProject535
Cory Cook
 
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellitesDesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
Brenden Hogan
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
IJCNCJournal
 

Tendances (19)

Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Protocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor NetworkProtocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor Network
 
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNCOMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
 
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 
Kautz based wireless sensor and actuator
Kautz based wireless sensor and actuatorKautz based wireless sensor and actuator
Kautz based wireless sensor and actuator
 
Dynamic adaptation balman
Dynamic adaptation balmanDynamic adaptation balman
Dynamic adaptation balman
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
 
Energy in Wireless Sensor Network
Energy in Wireless Sensor NetworkEnergy in Wireless Sensor Network
Energy in Wireless Sensor Network
 
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
 
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
Netscan and Networx for Management Bandwidth and Traffic with Simple RoutingNetscan and Networx for Management Bandwidth and Traffic with Simple Routing
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
 
CoryCookFinalProject535
CoryCookFinalProject535CoryCookFinalProject535
CoryCookFinalProject535
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
 
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellitesDesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
 
network mining and representation learning
network mining and representation learningnetwork mining and representation learning
network mining and representation learning
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
 

En vedette

Bus30104 intro to biz final project sept 2015
Bus30104 intro to biz final project   sept 2015Bus30104 intro to biz final project   sept 2015
Bus30104 intro to biz final project sept 2015
apongmalik
 
SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.
SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.
SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.
Marly Rodriguez
 

En vedette (13)

Resume Dec_2016-V
Resume Dec_2016-VResume Dec_2016-V
Resume Dec_2016-V
 
Telecom report press release
Telecom report press releaseTelecom report press release
Telecom report press release
 
NBTCiTech58
NBTCiTech58NBTCiTech58
NBTCiTech58
 
About Data From A Machine Learning Perspective
About Data From A Machine Learning PerspectiveAbout Data From A Machine Learning Perspective
About Data From A Machine Learning Perspective
 
Football Camps For Elite Gamespeed
Football Camps For Elite GamespeedFootball Camps For Elite Gamespeed
Football Camps For Elite Gamespeed
 
Differential privacy and applications to location privacy
Differential privacy and applications to location privacyDifferential privacy and applications to location privacy
Differential privacy and applications to location privacy
 
Weight loss diets
Weight loss dietsWeight loss diets
Weight loss diets
 
Elg assignment 2
Elg assignment 2Elg assignment 2
Elg assignment 2
 
Bus30104 intro to biz final project sept 2015
Bus30104 intro to biz final project   sept 2015Bus30104 intro to biz final project   sept 2015
Bus30104 intro to biz final project sept 2015
 
Cnc final assignment
Cnc final assignmentCnc final assignment
Cnc final assignment
 
Machine Learning on Big Data
Machine Learning on Big DataMachine Learning on Big Data
Machine Learning on Big Data
 
SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.
SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.
SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.
 
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
 

Similaire à Big data and machine learning for network research problems

Network Intrusion Detection Dean Final, actual version
Network Intrusion Detection Dean Final, actual versionNetwork Intrusion Detection Dean Final, actual version
Network Intrusion Detection Dean Final, actual version
Tianye Song
 
Routing protocol for effective interoperability
Routing protocol for effective interoperabilityRouting protocol for effective interoperability
Routing protocol for effective interoperability
venkateshphd15
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
revathiyadavb
 

Similaire à Big data and machine learning for network research problems (20)

WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Network Intrusion Detection Dean Final, actual version
Network Intrusion Detection Dean Final, actual versionNetwork Intrusion Detection Dean Final, actual version
Network Intrusion Detection Dean Final, actual version
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using aco
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Routing protocol for effective interoperability
Routing protocol for effective interoperabilityRouting protocol for effective interoperability
Routing protocol for effective interoperability
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Networking_and_Data_communication.pptx
Networking_and_Data_communication.pptxNetworking_and_Data_communication.pptx
Networking_and_Data_communication.pptx
 
2009.08 grid peer-slides
2009.08 grid peer-slides2009.08 grid peer-slides
2009.08 grid peer-slides
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 

Plus de Sabidur Rahman

Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...
Sabidur Rahman
 

Plus de Sabidur Rahman (15)

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologies
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networks
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport Network
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewed
 
Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learning
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithms
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: Worms
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Dernier (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 

Big data and machine learning for network research problems

  • 1. Big data and machine learning for network research problems Sabidur Rahman Friday Group Meeting December 22, 2016 krahman@ucdavis.edu http://www.linkedin.com/in/kmsabidurrahman/
  • 2. Agenda • Big data and machine learning • How these two fit into networking world? • Random Neural Network • Reinforcement learning • Paper review: O. Brun, L. Wang, and E. Gelenbe, “Big data for Autonomic Intercontinental Overlays”, IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, March 2016. 2
  • 4. Machine learning • Network today is producing large amount of data. • What to do with the collected data? • Network performance enhancement • Smarter routing decision • Network management and planning • Network automation • Analytics and automation of this huge amount of data depends largely on data analytics and machine learning techniques. 4
  • 5. Random Neural Network (RNN) • When a biophysical neuron is excited, it transmits a train of signals, called spikes (firing of signals), along its axon to either excite or inhibit the receiving neurons. • The combined effect of excitatory (positive) and inhibitory (negative) inputs change the potential level of the receiving neuron and determine whether it will become excited. • Neurons in RNN interact by exchanging positive and negative spiking signals with certain probability. • RNN model is used in pattern recognition, classification, image processing, combinatorial optimization and communication systems. 5 Timotheou S. The random neural network: a survey. The computer journal. 2010 Mar 1;53(3):251-67. Excitatory = causing, or constituting excitation Inhibitory = suppress or restrain an impulse
  • 6. Reinforcement learning The basic reinforcement learning model consists of: • Set of environment and agent states S • Set of agent actions A • Policies of transitioning from states to actions • Rules that determine reward (or punishment) of a transition (G and R) 6 Sutton RS, Barto AG. Reinforcement learning: An introduction. Cambridge: MIT press; 1998 Mar 1.
  • 7. Paper review O. Brun, L. Wang, and E. Gelenbe, “Big data for Autonomic Intercontinental Overlays”, IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, March 2016. 7
  • 8. Introduction • Multihop intercontinental network that uses IP to communicate between nodes. • IP routing often results in sub-optimal paths with respect to metrics such as end-to-end round trip delay. • QoS of such routes can be optimized using the collected network statistics. • Objective: Select route to provide better QoS than IP. • Machine learning based scheme to exploit large scale data collected from communicating node pairs. 8
  • 9. (Big) Data collection • ICMP-based ping to collects round-trip delay data at the overlay nodes, every two minutes • 24 hours with 20 overlay nodes: collect up to some 2.7 × 10^5 data points per day. 9
  • 10. 10
  • 12. Routing overlay • Routing overlay is a method to improve performance without changing underlying network. • Overlay network is formed by software routers deployed over the Internet. • Operates by monitoring the quality of Internet paths (latency, bandwidth, loss rate) between overlay nodes. • When primary path becomes unavailable or suffers from congestion, re-routes packets along an alternate path. • Routing overlays can be used to quickly recover from path outages, and also improve QoS of data flows. • This approach makes it possible to override the routes determined by Internet protocols and to route traffic based on metrics directly related to the performance needs of the application. 12
  • 13. Self-healing and self-optimising routing overlay • SMART overlay network is formed by software agents that are deployed at VMs. • On each VM, a Transmission (TA) and Reception Agent(RA) run together with various Applications or tasks. • Each VM’s software router is the Proxy that monitors the quality of the overlay paths towards other destinations, selects the best paths, and forwards the packets over these paths. • TA receives the packets that are being sent to other Applications at other sites. • RA receives packets from the local Proxy, decapsulate and delivers them to the appropriate Application in the VM. • TA, RA and Proxy enables the control of path of packets through the network, without the applications being aware that their data flows are routed by the overlay. 13
  • 14. Proxy: details • Monitoring Agent: monitors the quality of the Internet paths between the local cloud and the other clouds. • Routing Agent: drives the monitoring agent and uses the data it collects to discover an optimal path. • Forwarding Agent: forwards each incoming packet to its destination on the path it was instructed to use by Routing agent. • Source routing: Routing table of source proxy describes the complete path between overlay proxies to be followed by a packet to reach its destination, while the path between proxies is determined by the conventional IP protocol. 14
  • 15. Packet forwarding process • SMART header contains the sequence of intermediate proxies. 15
  • 16. Random Neural Network (RNN) • At each time interval, the algorithm chooses a subset of paths to probe, and measures the sum of edge delays in the probed paths. • The algorithm then sends its packet over the minimum latency path among those it has probed. • Each neuron in RNN represents a path from source to destination. • RNN helps to select K paths to destination out of N paths. • State of n connected neurons are represented by a vector k(t) = [k1(t), k2(t), . . . , kn(t)], where ki(t) is a non-negative integer valued random variable representing the “potential” of the i-th neuron being excited at time t. 16
  • 17. Random Neural Network • A neuron i of the RNN is said to be excited whenever ki(t) > 0, in which case it can fire and send signals at an average rate ri 17 Timotheou S. The random neural network: a survey. The computer journal. 2010 Mar 1;53(3):251-67. Qi <- Ki(t) ri From out of network To out of network From other neurons To other neurons Positive signal received = higher probability of firing Neg. signal received = higher probability of not firing
  • 18. Reinforcement learning • “Guide” RNN to choose better paths by: • “Reward” neurons representing good paths. • “Punish” neurons representing bad paths. 18 1. Increasing probability of it’s “firing” 2. Reducing probability of others “firing” 1. Decrease probability of it’s “firing” 2. Increasing probability of others “firing” G = minimum delay Higher delay = lower reward
  • 19. Algorithm 19 2. Select neurons with highest probability at time tl 3. Calculate rewards. where G = minimize delay 4. p* is the best path 7. Good path: reward the neuron! 10.Increase positive weights going into the neuron 11. Increase negative weights leading to other neurons
  • 20. Algorithm(continued..) 20 13. Bad path: punish the neuron! 16. Increase negative weights going into the neuron 17. Increase positive weights leading to other neurons (give other paths a higher chance of being selected) 22. Re-normalize w to avoid ever increasing weights 26. Update decision threshold T. β ∈ (0, 1) is used to introduce forgetfulness. Higher β will give more importance lesson learned from previous events.
  • 24. Summary • Increasing amount of data collected from networks can help to improve performance. • Machine learning tools are useful to analyze and learn from these huge data. • Usefulness of other interesting machine/deep learning tools are yet to be explored in Network research. 24