Professional Documents
Culture Documents
Journalism Research Paper
Journalism Research Paper
Journalism Research Paper
Abstract
Software Defined Networking (SDN) is a modern network architectural model that manages
network traffic using software. SDN is a networking scenario that modifies the conventional
network design by combining all control features into a single place and making all choices
centrally. Controllers are the "brains" of SDN architecture since they are responsible for making
control decisions and routing packets at the same time. The capacity for centralized decision-
making on routing improves the performance of the network. SDN's growing functionality and
uses have led to the development of many controller systems. Every SDN controller idea or
design must prioritize the control plane since it is the most crucial part of the SDN architecture.
This paper, present Dynamic Resource Allocation based on the Spiking Neural Network
(DRASR) approach, which is responsible to distribute available resources among all slices justly
according to the type of demand. The simulation results show that the benefit of the network
throughput is about 98.8%.
1. Introduction
Because it is more controllable, dynamic, and cost-effective than traditional architecture, SDN is a
strong network architecture that is best for high-bandwidth applications that change quickly [1]. The
idea that a network's control operations should be kept distinct from its forwarding functions became
the foundation of the SDN design. This would make it simpler to directly program the network control
and abstract forwarding devices for services and network applications [2].
• Easy to program: Since the control function of the forwarding device has been taken away, the
network's control operation can be directly programmed.
• Agile: The network administrator can change network traffic on the fly to meet different
management needs since control is separated from the infrastructure underneath.
• Centralized management: Because the network's brain (controller) is logically centralized and
appears as a single switch to the application and policy engines, it has a global view of the entire
network.
368
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
• Employing dynamic SDN programs, network administrators may rapidly manage, modify, protect,
and enhance network resources with SDN.
SDN is an emerging network paradigm that enables current network architecture constraints to be
overcome; it is characterized as a foursome-pillar network architecture [3]. In a distinct data and
control plane, routing decisions are flow-based rather than destination-based, the control logic is
handled by an external entity known as the SDN Controller, and the network may be programmable
through software applications running on top of the SDN Controller. According to the examination of
the relevant literature, an attempt was made to compare the existing SDN controllers. The SDN
concept and its technical components were thoroughly analyzed in [4]. However, this assessment was
not intended to be a comparative analysis of controllers from a commercial standpoint. Referring to
aspects such as the difficulty of getting started, the Application Program Interface (APIs) that are
supported, the accessibility of documentation, and the version of Openflow, among other factors,
conducted a comparative analysis of SDN controllers based on a systematic study. Unfortunately, this
work does not do a comparative categorization of the offered controllers, nor does it emphasize the
market viewpoint, which is crucial to the acceptability of any technology [5]. Give a comparison of
SDN controllers based on characteristics however, they do not perform a market-oriented comparison,
such as programming language, documentation, modularity, and performance. This paper's primary
contribution is a comparative analysis of the existing SDN controllers and their primary
characteristics, taking into account not only functional and technical aspects, nevertheless, but market
adoption, documentation availability, and OpenFlow support are also all-important factors. To
evaluate the study, we made a comparison between the method based on Spike Response and Integrate
and fire then compared it with other techniques such as traditional neural networks.
2. SDN Architecture
Based on the prior SDN description, SDN components may be characterized as a collection of the
separate data layers, control layers, and application layers that reflect the SDN architecture, as shown
in 'figure 1', each of which has its own functionality and can interact through open standard interfaces.
These layers were then depicted using a bottom-up approach [6].
369
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
• Provide the applications plane with an abstraction view of the underlying infrastructure so they
can link with devices that use the SDN (switches, routers).
• Execute the directives of the administration (load balancing, forwarding, and routing).
• Command and control all the devices that make up the network's data plane [10].
Because malfunctioning nodes are linked to the controller, the controller's logical location assists in the
resolution of many distributed issues, such as quicker reactions to node or link failures. Because the
controller has a full picture of the whole network, loop avoidance is substantially easier. Depending on
the programming language used for implementation, there are several kinds of SDN controllers, such
as the pox controller, which is implemented in the Python language, the flooding light controller,
which is developed in the Java programming language, and even the NOX controller, which could use
the C programming language. They're all open-source controllers, however, there are also commercial
ones like HP and NEC [11].
2.3 SDN Application Layer is a programmable platform provided by SDN technology that enables
users to build SDN applications for routing management and resolving critical network issues.
Network applications communicate with the controller using an API known as the northbound
interface in SDN architecture. These applications' primary function is to manage traffic within network
devices by modifying flow entries via the southbound interface [12].
3. Related Work
For dispersed 5G-based SDN/NFV networks, the best workload distribution has been presented [13].
A network slicing architecture from end to end is made to enable a variety of services, including
URLLC and eMBB. Additionally, by splitting client requests in the integrated environment of SDN,
NFV, and edge computing, the network operating cost may be decreased. Network slicing was carried
out by the authors in a large-scale Internet of Things (IoT) context (long-range wide area network) in a
prior research [14]. The network is divided into three slices: the best-effort slice, the reliability-aware
slice, and the urgency and reliability-aware slice. First, one-to-many matching is used to execute
cooperative slicing, with the number of IoT devices allocated to virtual slices serving as the
determining factor. Then, using a one-to-one matching game, resources are assigned for each slice
(inter-slice resource allocation). The coalitional multigame theory generates significant computational
complexity and requires a lot of processing time.
Resource sharing and allocation in 5G slice networks are thought to be improved by packet-based data
traffic scheduling [15]. Static sharing resources (SSR) and dynamic sharing resources (DSR) are the
two operational modes that are utilised. The given capacity weight is calculated for each slice and
distributed in accordance with resource allocation. In the end, it is calculated how fairly resources are
distributed across slices. A global network controller is necessary to manage vast varieties of slices,
including popular, heavy, and sensitive slices. A slice management plan that allocates resources
according to priority has also been presented by researchers [16]. Lower priority slices are sent
through different pathways, whereas requests for high priority slices are sent along the shortest paths.
200 nodes are used for the experiments, and they are set up in a grid network architecture. In the end,
371
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
the delays of slices are reduced by up to 11–14% while the average throughput slices up to 6, 13, and
7%. The shortest route is used for flow (high priority) forwarding in the data plane. The quickest route
is not always accessible, however. Therefore, the relevant flow must be put in the controller when the
flow does not match a flow table. This causes customers with static resource allocation to have a
bandwidth shortage issue. Network slicing has been accomplished via service function chaining [17].
Every slice has its own set of service function chains that handle various types of traffic. The trade-offs
between slicing and execution runtime are then examined using a greedy-based heuristic approach.
The requisite bandwidth and latency are then achieved using an optimisation model. Network slice
mobility is not taken into account, which lowers QoS. To assign resources for each slice in a network,
a network slicing resource management (NSRM) system has been created [18]. In this research, an
LTE network is taken into account for varying slice assignments and equitable bandwidth allocation
across slices. The LTE slice controller manages all slices and deploys the controller for each slice. The
radio network resources are distributed through a virtual eNodeB via the LTE slice controller. Slice
request dynamic provisioning is really challenging. For instance, the Industry 4.0 application has to
handle huge slice requests.
372
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
amounts of historical and real-time data. This is because automatically adjusts to price differences in
real-time.
5. Proposed Controller
using an SNN to calculate an unknown value for the traffic data that changes over time based on the
number of network slices. The variance (Err) between actual and desired buffer occupancy is used to
update the SNN's weights using the Back Propagation (BP) training method. Because the online
training is used to manage the estimating traffic to accommodate it, the SNN must learn the network's
behaviour and control it.
SNN has eight input nodes, a hidden number of layers, a number of neurons in each layer, and a
number of synapses (sub-connections) that are typically determined experimentally. A large number
of hidden layers slows and decreased the training process and increases network complexity. The
improvement of the non-linearity of the solution requires the adoption of a three-layered feed-forward
neural network to achieve the accomplishment of a traffic signal controller.
The structure’s sketch of SNN is shown in Fig (2) and Fig (3), the activation function of the neurons in
the hidden layer is tanh. The number of neurons in each of the three layers’ input, the hidden, and the
output layer are 8,8, and 4 respectively.
374
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
Input neurons of the SNN are assigned to network TR features TR(t); the number of packets arriving
at the global slice buffer.
375
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
𝑇𝑅𝑚𝑎𝑥 and 𝑇𝑅𝑚𝑖𝑛 that are represent the maximum and minimum values of the real input
information. The 𝑡𝑚𝑎𝑥 and 𝑡𝑚𝑖𝑛 represent the largest and minimum interval T.
The maximum and lowest values of the actual information for input are represented by the
variables 𝑇𝑅𝑚𝑎𝑥 and 𝑇𝑅𝑚𝑖𝑛 . Maximum and minimum intervals T are represented by the 𝑡𝑚𝑎𝑥
and 𝑡𝑚𝑖𝑛 .
The SNN algorithm operates in two modes. The first is known as feed-forward mode, in which each
neuron spikes just once at most during each time interval T when membrane potential m exceeds the
value. Starting from hidden layer I, the feed-forward mode constantly examine neuron i to see whether
it has spiked or not. The algorithm uses the next neuron i+1 when the neuron i is spiked. The
membrane potential m_i (t) is calculated by the SNN algorithm according to Eq. (3) based on input
spikes t_h^f of neuron h at input layer H .
𝑘 𝑓
𝑚𝑖 (𝑡) = ∑𝑁𝐻 𝐷 𝑘
ℎ=1 ∑𝑘=1 𝑤ℎ𝑖 ɛ(𝑡 − 𝑡ℎ − 𝑑 ) (3)
The neuron i is not allowed to spike anymore through the remaining period of time interval T, when
the threshold is exceeded at a particular instant t. In the next instant t+1, the neuron i will be reset.
When the neurons in the second layer have completed, the algorithm will repeat the same procedure in
the output layer J, and the back-propagation phase will then start.
The connection weights of synapses are updated when the feed-forward mode finishes. In contrast to
feed-forward, back-propagation starts at the output layer and returns to the hidden layer. The synapses
of the hidden layer will be modified in accordance with Eq. (4), Eq.(5), and Eq.(6).
Eq.(2.14) , Eq. (3.8) and Eq. (3.9) show how the updating of synapses input layer.
𝑘
△ 𝑤ℎ𝑖 (𝑅) = 𝜂. 𝛿𝑖 . 𝑦ℎ𝑘 (5)
𝑘 𝑘 𝑘
𝑤ℎ𝑖 (𝑡 + 1) = 𝑤ℎ𝑖 (𝑅) − △ 𝑤ℎ𝑖 (𝑅) (6)
If the Root Mean Square Error (RMSE) exceeds the allowable level of error, the two phases are
repeated. The output of the SNN will be used to estimate network traffic for the next time.
the error which can be used to adjust the weights in SNN can be described in Eq. (7).
𝐸𝑟𝑟(𝑡) = 𝑇𝑅(𝑡) − 𝐵𝐷 (7)
376
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
In order guarantee balance amongst slices, the Estimated Traffic Rate 〖𝑇𝑅𝑒𝑠𝑡𝑖𝑚𝑎𝑡𝑒 . Controller is then
distributed among the active slices uniformly to rate in the next time. Eq. (8) explains how the rate
adjustment control operates.
𝑇𝑅𝑒𝑠𝑡𝑖𝑚𝑎𝑡𝑒
𝑇𝑅𝑛𝑒𝑤 (𝑆𝑙𝑖𝑐𝑒𝑖 (𝑡 + 1)) = 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑐𝑡𝑖𝑣𝑒 𝑠𝑢𝑏−𝑠𝑙𝑖𝑐𝑒𝑠
(8)
Where the 𝑇𝑅𝑛𝑒𝑤 (𝑆𝑙𝑖𝑐𝑒𝑖 (𝑡 + 1)) is the new TR for each slice, which depends on it, slice determines
the number of active sub slices in the global slice to avoid congestion in next time
377
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
Figure 5. Comparison packet loss ratio of the network when three proposed approaches are used and
without
378
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
It is clarified in Fig. (5) that the PLR of the proposed approaches is better than without a controller
because the buffer controller decreases sending rate of the active sub-slice during the transmission
process in high network traffic.
It is also obvious that DRAIF controller which is depend on (SNN Integrate and Fire) performs well
but it hasn’t accuracy as DRASR. The performance DRASR is very good.
6.2 Network Throughput Ratio (NTR)
Fig. (6) represents the proportion of the received packets by the global slice over the simulation in time
in the form of a comparison between networks with proposed approaches controller and networks
without controller.
Figure 6. Comparison of NTR of the network when three proposed approaches are used and without
The network with the proposed approaches controller performs better than the network without a
controller in increasing the proportion of packets received at the global slice for all active sub-slices.
For more explanation, WRA (Without Controller), which means that the network traffic is high due to
the number of active sub slice is high too. Moreover, DRASR performs better along the simulation
time because it is designed to work with any changeable traffic rate to avoid overflow on the buffer of
the global slice.
379
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
7. Conclusion
The SDN is responsible and monitored for the entire network, and the resources are not sufficient for
all slices, a controller must be available on the network to be responsible for a fair and efficient
distribution of resources according to the requirements of each slice based on traffic features. The
results presented the efficiency of the proposed controller spike response (DRASR) compared with the
controller with the Integrate and Fire and Artificial Neural are better in network PLR and throughput.
References
[1] Li, H., Li, P., Guo, S., & Yu, S. (2014, June). Byzantine-resilient secure software-defined
networks with multiple controllers. In 2014 IEEE International Conference on
Communications (ICC) (pp. 695-700). IEEE.
[2] Bannour, F., Souihi, S., & Mellouk, A. (2017). Distributed SDN control: Survey, taxonomy,
and challenges. IEEE Communications Surveys & Tutorials, 20(1), 333-354.
[3] Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S.
(2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE,
103(1), 14-76.
[4] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T. V., & Kompella, R. (2013). Towards an
elastic distributed SDN controller. ACM SIGCOMM computer communication review,
43(4), 7-12.
[5] Khattak, Z. K., Awais, M., & Iqbal, A. (2014, December). Performance evaluation of
OpenDaylight SDN controller. In 2014 20th IEEE international conference on parallel and
distributed systems (ICPADS) (pp. 671-676). IEEE.
[6] Chekired, D. A., Khoukhi, L., & Mouftah, H. T. (2017). Decentralized cloud-SDN
architecture in smart grid: A dynamic pricing model. IEEE Transactions on Industrial
Informatics, 14(3), 1220-1231.
[7] Perrot, N., & Reynaud, T. (2016, March). Optimal placement of controllers in a resilient SDN
architecture. In 2016 12th International Conference on the Design of Reliable
Communication Networks (DRCN) (pp. 145-151). IEEE.
[8] Raghunath, K., & Krishnan, P. (2018, July). Towards a secure SDN architecture. In 2018 9th
International Conference on Computing, Communication and Networking Technologies
(ICCCNT) (pp. 1-7). IEEE.
[9] Kleinrouweler, J. W., Cabrero, S., & Cesar, P. (2016, May). Delivering stable high-quality
video: An SDN architecture with DASH assisting network elements. In Proceedings of the
7th International Conference on Multimedia Systems (pp. 1-10).
[10] Bakshi, K. (2013, March). Considerations for software defined networking (SDN):
Approaches and use cases. In 2013 IEEE Aerospace Conference (pp. 1-9). IEEE.
[11] Benzekki, K., El Fergougui, A., & Elbelrhiti Elalaoui, A. (2016). Software‐defined
networking (SDN): a survey. Security and communication networks, 9(18), 5803-5833.
[12] Li, Y., & Li, J. (2014, November). MultiClassifier: A combination of DPI and ML for
application-layer classification in SDN. In The 2014 2nd International Conference on
Systems and Informatics (ICSAI 2014) (pp. 682-686). IEEE.
380
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
[13] L. Ma, X. Wen, L. Wang, Z. Lu and R. Knopp., An SDN/NFV based framework for
management and deployment of service based 5G core network, China Communications,
15(10) (2018) 86-98. https://doi.org/10.1109/CC.2018.8485472.
[14] S. Dawaliby, A. Bradai and Y. Pousset., Distributed network slicing in large scale IoT based
on coalitional multi-game theory, IEEE Transactions on Network and Service Management,
16(4) (2019) 1567-1580. https://doi.org/10.1109/TNSM.2019.2945254.
[15] S. A. AlQahtani., An efficient resource allocation to improve QoS of 5G slicing networks
using general processor sharing-based scheduling algorithm, International Journal of
Communication Systems, 33(4) (2020) e4250.https://doi.org/10.1002/dac.4250.
[16] K. Koutlia, R. Ferrús, E. Coronado, R. Riggio, F. Casadevall, A. Umbert and J. Pérez-
Romero., Design and Experimental Validation of a Software-Defined Radio Access Network
Testbed with Slicing Support, Wireless Communications and Mobile Computing, (2019) 1-
17. https://doi.org/10.1155/2019/2361352.
[17] A.J. Ramadha., Overview and implementation of the two most important candidate 5G
waveforms, Journal of Theoretical and Applied Information Technology, 97(9) (2019)
2551–2560.
[18] R. A. Addad, M. Bagaa, T. Taleb, D. L. C. Dutra and H. Flinck., Optimization model for
cross-domain network slices in 5G networks, IEEE Transactions on Mobile Computing,
19(5) (2019) 1156-1169. https://doi.org/10.1109/TMC.2019.2905599.
[19] A. S. D. Alfoudi, S. H. S. Newaz, A. Otebolaku, G. M. Lee and R. Pereira., An efficient
resource management mechanism for network slicing in a LTE network, IEEE Access, 7
(2019) 89441-89457. https://doi.org/10.1109/ACCESS.2019.2926446.
[20] Tavanaei, A., Ghodrati, M., Kheradpisheh, S. R., Masquelier, T., & Maida, A. (2019). Deep
learning in spiking neural networks. Neural networks, 111, 47-63.
[21] Wang, X., Lin, X., & Dang, X. (2020). Supervised learning in spiking neural networks: A
review of algorithms and evaluations. Neural Networks, 125, 258-280.
[22] Lobo, J. L., Del Ser, J., Bifet, A., & Kasabov, N. (2020). Spiking neural networks and online
learning: An overview and perspectives. Neural Networks, 121, 88-100.
[23] Lee, J. H., Delbruck, T., & Pfeiffer, M. (2016). Training deep spiking neural networks using
backpropagation. Frontiers in neuroscience, 10, 508.
[24] Zenke, F., & Ganguli, S. (2018). Superspike: Supervised learning in multilayer spiking
neural networks. Neural computation, 30(6), 1514-1541.
[25] Neftci, E. O., Mostafa, H., & Zenke, F. (2019). Surrogate gradient learning in spiking neural
networks: Bringing the power of gradient-based optimization to spiking neural networks.
IEEE Signal Processing Magazine, 36(6), 51-63.
[26] Bouvier, M., Valentian, A., Mesquida, T., Rummens, F., Reyboz, M., Vianello, E., &
Beigne, E. (2019). Spiking neural networks hardware implementations and challenges: A
survey. ACM Journal on Emerging Technologies in Computing Systems (JETC), 15(2), 1-
35.
381