SlideShare a Scribd company logo
1 of 14
Download to read offline
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
368
Smart Dynamic Resource Allocation Controller in Bandwidth Slicing Based
on Spiking Neural Networks
Mohammed Mousa Rashid Al-Yasari1, Nadia Adnan Shiltagh Al-Jamali2
1
Information Institute for Postgraduate Studies (IIPS), Iraqi Commission for Computers and
Informatics (ICCI), Baghdad, Iraq, phd202020555@iips.icci.edu.iq
2
University of Baghdad, College of Engineering, Computer Engineering Department, Baghdad,
Iraq
Abstract
Software Defined Networking (SDN) is a modern network architectural model that manages
network traffic using software. SDN is a networking scenario that modifies the conventional
network design by combining all control features into a single place and making all choices
centrally. Controllers are the "brains" of SDN architecture since they are responsible for making
control decisions and routing packets at the same time. The capacity for centralized decision-
making on routing improves the performance of the network. SDN's growing functionality and
uses have led to the development of many controller systems. Every SDN controller idea or
design must prioritize the control plane since it is the most crucial part of the SDN architecture.
This paper, present Dynamic Resource Allocation based on the Spiking Neural Network
(DRASR) approach, which is responsible to distribute available resources among all slices justly
according to the type of demand. The simulation results show that the benefit of the network
throughput is about 98.8%.
1. Introduction
Because it is more controllable, dynamic, and cost-effective than traditional architecture, SDN is a
strong network architecture that is best for high-bandwidth applications that change quickly [1]. The
idea that a network's control operations should be kept distinct from its forwarding functions became
the foundation of the SDN design. This would make it simpler to directly program the network control
and abstract forwarding devices for services and network applications [2].
β€’ Easy to program: Since the control function of the forwarding device has been taken away, the
network's control operation can be directly programmed.
β€’ Agile: The network administrator can change network traffic on the fly to meet different
management needs since control is separated from the infrastructure underneath.
β€’ Centralized management: Because the network's brain (controller) is logically centralized and
appears as a single switch to the application and policy engines, it has a global view of the entire
network.
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
369
β€’ Employing dynamic SDN programs, network administrators may rapidly manage, modify, protect,
and enhance network resources with SDN.
SDN is an emerging network paradigm that enables current network architecture constraints to be
overcome; it is characterized as a foursome-pillar network architecture [3]. In a distinct data and
control plane, routing decisions are flow-based rather than destination-based, the control logic is
handled by an external entity known as the SDN Controller, and the network may be programmable
through software applications running on top of the SDN Controller. According to the examination of
the relevant literature, an attempt was made to compare the existing SDN controllers. The SDN
concept and its technical components were thoroughly analyzed in [4]. However, this assessment was
not intended to be a comparative analysis of controllers from a commercial standpoint. Referring to
aspects such as the difficulty of getting started, the Application Program Interface (APIs) that are
supported, the accessibility of documentation, and the version of Openflow, among other factors,
conducted a comparative analysis of SDN controllers based on a systematic study. Unfortunately, this
work does not do a comparative categorization of the offered controllers, nor does it emphasize the
market viewpoint, which is crucial to the acceptability of any technology [5]. Give a comparison of
SDN controllers based on characteristics however, they do not perform a market-oriented comparison,
such as programming language, documentation, modularity, and performance. This paper's primary
contribution is a comparative analysis of the existing SDN controllers and their primary
characteristics, taking into account not only functional and technical aspects, nevertheless, but market
adoption, documentation availability, and OpenFlow support are also all-important factors. To
evaluate the study, we made a comparison between the method based on Spike Response and Integrate
and fire then compared it with other techniques such as traditional neural networks.
2. SDN Architecture
Based on the prior SDN description, SDN components may be characterized as a collection of the
separate data layers, control layers, and application layers that reflect the SDN architecture, as shown
in 'figure 1', each of which has its own functionality and can interact through open standard interfaces.
These layers were then depicted using a bottom-up approach [6].
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
370
Figure 1. Fundamental SDN components
2.1 Data Plane: This plane provides a description of the forwarding devices, which include switches
and routers, in addition to a set of instructions that may be given via an application program interface
(API). SDN network devices function similarly to traditional network devices, except those packets
are forwarded based on a higher plane decision. This signifies that control is no longer delegated to an
external party and is now logically centralized. The data plane and the control plane are connected
through a standard interface (OpenFlow). In other words, open and standard interfaces are used to
build the network brain (control) and applications (conceptually). The controller may use this interface
to dynamically setup various forwarding devices. For traffic processing logic in SDN data plane
forwarding devices, an API for interacting with the controller, an abstraction layer, and a traffic
(packet) processing function will be implemented as software in virtual switches and as hardware in
physical switches [7]. The abstraction layer is made up of one or more flow tables, and its main
function is to enable the device to decide what to do with the next packet based on its contents. The
packet may be routed to a particular switch port, flooded to all ports, or dropped entirely [8]. A flow
table in an open flow switch is a data structure placed in a high-speed data plane data structure It
provides information about the forwarding and packet handling behavior of the open flow switch.
There are one or more flow entries in an open flow table, each with a number of components. A flow
table with three entries (match fields, action, and priority), as well as a counter and timer [9].
2.2 Control Plane: SDN controller, also known as Network Operating System (NOS), is the name
given to the control plane in SDN architecture. Due to the fact that the controller is connected to all
devices that perform forwarding in the bottom plane, management of the network exchange moves
from distributed to centralized [2]. The controller's primary functions are as follows:
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
371
β€’ Provide the applications plane with an abstraction view of the underlying infrastructure so they
can link with devices that use the SDN (switches, routers).
β€’ Execute the directives of the administration (load balancing, forwarding, and routing).
β€’ Command and control all the devices that make up the network's data plane [10].
Because malfunctioning nodes are linked to the controller, the controller's logical location assists in the
resolution of many distributed issues, such as quicker reactions to node or link failures. Because the
controller has a full picture of the whole network, loop avoidance is substantially easier. Depending on
the programming language used for implementation, there are several kinds of SDN controllers, such
as the pox controller, which is implemented in the Python language, the flooding light controller,
which is developed in the Java programming language, and even the NOX controller, which could use
the C programming language. They're all open-source controllers, however, there are also commercial
ones like HP and NEC [11].
2.3 SDN Application Layer is a programmable platform provided by SDN technology that enables
users to build SDN applications for routing management and resolving critical network issues.
Network applications communicate with the controller using an API known as the northbound
interface in SDN architecture. These applications' primary function is to manage traffic within network
devices by modifying flow entries via the southbound interface [12].
3. Related Work
For dispersed 5G-based SDN/NFV networks, the best workload distribution has been presented [13].
A network slicing architecture from end to end is made to enable a variety of services, including
URLLC and eMBB. Additionally, by splitting client requests in the integrated environment of SDN,
NFV, and edge computing, the network operating cost may be decreased. Network slicing was carried
out by the authors in a large-scale Internet of Things (IoT) context (long-range wide area network) in a
prior research [14]. The network is divided into three slices: the best-effort slice, the reliability-aware
slice, and the urgency and reliability-aware slice. First, one-to-many matching is used to execute
cooperative slicing, with the number of IoT devices allocated to virtual slices serving as the
determining factor. Then, using a one-to-one matching game, resources are assigned for each slice
(inter-slice resource allocation). The coalitional multigame theory generates significant computational
complexity and requires a lot of processing time.
Resource sharing and allocation in 5G slice networks are thought to be improved by packet-based data
traffic scheduling [15]. Static sharing resources (SSR) and dynamic sharing resources (DSR) are the
two operational modes that are utilised. The given capacity weight is calculated for each slice and
distributed in accordance with resource allocation. In the end, it is calculated how fairly resources are
distributed across slices. A global network controller is necessary to manage vast varieties of slices,
including popular, heavy, and sensitive slices. A slice management plan that allocates resources
according to priority has also been presented by researchers [16]. Lower priority slices are sent
through different pathways, whereas requests for high priority slices are sent along the shortest paths.
200 nodes are used for the experiments, and they are set up in a grid network architecture. In the end,
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
372
the delays of slices are reduced by up to 11–14% while the average throughput slices up to 6, 13, and
7%. The shortest route is used for flow (high priority) forwarding in the data plane. The quickest route
is not always accessible, however. Therefore, the relevant flow must be put in the controller when the
flow does not match a flow table. This causes customers with static resource allocation to have a
bandwidth shortage issue. Network slicing has been accomplished via service function chaining [17].
Every slice has its own set of service function chains that handle various types of traffic. The trade-offs
between slicing and execution runtime are then examined using a greedy-based heuristic approach.
The requisite bandwidth and latency are then achieved using an optimisation model. Network slice
mobility is not taken into account, which lowers QoS. To assign resources for each slice in a network,
a network slicing resource management (NSRM) system has been created [18]. In this research, an
LTE network is taken into account for varying slice assignments and equitable bandwidth allocation
across slices. The LTE slice controller manages all slices and deploys the controller for each slice. The
radio network resources are distributed through a virtual eNodeB via the LTE slice controller. Slice
request dynamic provisioning is really challenging. For instance, the Industry 4.0 application has to
handle huge slice requests.
4. Machine Learning and Spiking Neural Network
Much effort is put into optimizing and effectively scheduling radio and network resources, but in 5G
networks, resource allocation on the basis of the service being provided is a must-have. The increasing
number of devices and new services offered by 5G networks will add to the already massive quantity
of data traffic that operators now deal with [19]. This stream of traffic may be divided into smaller
chunks and handled separately. Since the service provider may now charge differently for each sliced
piece and even alter the pricing for each slice, the provider can strike a good balance between
company profitability and customer happiness. As a bonus, 5G network slicing enables service
providers to construct not just established but also new applications and services. It will be a "one size
fits all" solution. Each network section may operate autonomously, with its controls and policy
administrators [20].
With ML in place, we can examine any gaps in our knowledge and make any required adjustments.
Machine learning will offer a network analysis of the massive data set, which may be researched
further to adjust any given slice swiftly and cost-effectively. As shown in Figures 1-a and 1-b, SNN
may dynamically activate network automation to adjust resource allocation. Without human
involvement, SNN will be accountable for delivering and processing, and making an intelligent choice
for network resource adaption. To make the best judgments, it will also weigh some different
variables, maybe more than a single person could take into account in a short time [21].
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
373
Figure 1. Spiking Neural Network Architecture
Whenever a new slice is added to the network, SNN will analyze it in real-time to determine how well
it is doing, where it stands in comparison to other networks, what problems could arise, what sections
of the network are functioning normally, and if anything seems out of the ordinary [22]. An easy way
to see this is on a slice for a fixed wireless corporate network, where capacity may be dynamically
added in response to a sudden increase in demand thanks to automation. We could then communicate
more efficiently. This will make it easier to create new services or network slices if they become
required. With automation, we can do all of this in less time with no degradation in the performance of
an ongoing session [20]. Organizational challenges now prevent the widespread use of network
slicing. This is due to the fact that several pieces of hardware and organizations inside a service
provider's network must be interacted with in order for a single modification to be implemented [23].
5G's programmability features will make it possible to create a customized end-to-end solution for
every use case. The data rate, latency, mobility, isolation, power constraints, etc., are typical
parameters that a typical consumer might seek. If the current instance of the network slice does not
have enough resources, then a different network slice type will be made available, and the associated
network services will be activated [24].
Network slicing takes into account a wide variety of factors, such as the kind of slice, bandwidth,
throughput, latency, equipment type, portability, reliability, isolation, power, and many more [25].
Because 5G enables the collection of such large datasets, big data analytics need the use of machine
learning. One of the most important and useful ML-based applications in the wireless sector is the
detection and revival of dormant cellular cells. Other relevant and useful ML-based applications in the
wireless industry include optimizing mobile tower operations, accelerating wireless channel adoption,
facilitating targeted marketing, autonomous decision-making in IoT networks, real-time data analysis,
predictive maintenance, customer churn, sentiment analysis by social networking, fraud detection, e-
commerce, and many more [26]. Since Uber employs real-time differential pricing depending on
demand, the number of available vehicles, the weather, the time of day, and other factors, using ML in
apps that are comparable to Uber will have several advantages. Better accuracy and prediction in the
future may be achieved by using a platform built on machine learning to analyze and process massive
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
374
amounts of historical and real-time data. This is because automatically adjusts to price differences in
real-time.
5. Proposed Controller
using an SNN to calculate an unknown value for the traffic data that changes over time based on the
number of network slices. The variance (Err) between actual and desired buffer occupancy is used to
update the SNN's weights using the Back Propagation (BP) training method. Because the online
training is used to manage the estimating traffic to accommodate it, the SNN must learn the network's
behaviour and control it.
SNN has eight input nodes, a hidden number of layers, a number of neurons in each layer, and a
number of synapses (sub-connections) that are typically determined experimentally. A large number
of hidden layers slows and decreased the training process and increases network complexity. The
improvement of the non-linearity of the solution requires the adoption of a three-layered feed-forward
neural network to achieve the accomplishment of a traffic signal controller.
The structure’s sketch of SNN is shown in Fig (2) and Fig (3), the activation function of the neurons in
the hidden layer is tanh. The number of neurons in each of the three layers’ input, the hidden, and the
output layer are 8,8, and 4 respectively.
Figure 2. Structure of SNN
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
375
Input neurons of the SNN are assigned to network TR features TR(t); the number of packets arriving
at the global slice buffer.
Figure 3. Structure of SNN in detail
The number of sub-connections or synapses k in the interaction between the input and hidden layers,
as illustrated in Fig. (4), is five delayed sub-connections. To determine the number of synapses k, the
trial-and-error approach is applied.
Figure 4. Sub-connection consists of five synapses
As shown in Fig. (4), the weight of each synapse effects the spike-response function Ξ΅; denotes the
neuron's activation function. In the encoding process, the actual information TR(t) is encoded
information t_h^act computed using Eq. (1).
π‘‘β„Ž
π‘Žπ‘π‘‘
= π‘‘π‘šπ‘Žπ‘₯ βˆ’ π‘Ÿπ‘œπ‘’π‘›π‘‘ (π‘‘π‘šπ‘–π‘› +
(𝑇𝑅(𝑑)βˆ’ 𝑇𝑅min)(π‘‘π‘šπ‘Žπ‘₯βˆ’ π‘‘π‘šπ‘–π‘›)
(π‘‡π‘…π‘šπ‘Žπ‘₯βˆ’ π‘‡π‘…π‘šπ‘–π‘›)
) (1)
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
376
π‘‡π‘…π‘šπ‘Žπ‘₯ and π‘‡π‘…π‘šπ‘–π‘› that are represent the maximum and minimum values of the real input
information. The π‘‘π‘šπ‘Žπ‘₯ and π‘‘π‘šπ‘–π‘› represent the largest and minimum interval T.
The maximum and lowest values of the actual information for input are represented by the
variables π‘‡π‘…π‘šπ‘Žπ‘₯ and π‘‡π‘…π‘šπ‘–π‘›. Maximum and minimum intervals T are represented by the π‘‘π‘šπ‘Žπ‘₯
and π‘‘π‘šπ‘–π‘›.
The decoding equation derived from Eq. (1) by Eq. (2)
𝑇𝑅(𝑑𝑗) =
(π‘‘π‘šπ‘Žπ‘₯βˆ’π‘‘π‘—βˆ’ π‘‘π‘šπ‘–π‘›)(π‘‡π‘…π‘šπ‘Žπ‘₯βˆ’ π‘‡π‘…π‘šπ‘–π‘›)
(π‘‘π‘šπ‘Žπ‘₯βˆ’ π‘‘π‘šπ‘–π‘›)
+ π‘‡π‘…π‘šπ‘–π‘› (2)
The SNN algorithm operates in two modes. The first is known as feed-forward mode, in which each
neuron spikes just once at most during each time interval T when membrane potential m exceeds the
value. Starting from hidden layer I, the feed-forward mode constantly examine neuron i to see whether
it has spiked or not. The algorithm uses the next neuron i+1 when the neuron i is spiked. The
membrane potential m_i (t) is calculated by the SNN algorithm according to Eq. (3) based on input
spikes t_h^f of neuron h at input layer H .
π‘šπ‘–(𝑑) = βˆ‘ βˆ‘ π‘€β„Žπ‘–
π‘˜
𝐷
π‘˜=1
𝑁𝐻
β„Ž=1 Ι›(𝑑 βˆ’ π‘‘β„Ž
𝑓
βˆ’ π‘‘π‘˜
) (3)
The neuron i is not allowed to spike anymore through the remaining period of time interval T, when
the threshold is exceeded at a particular instant t. In the next instant t+1, the neuron i will be reset.
When the neurons in the second layer have completed, the algorithm will repeat the same procedure in
the output layer J, and the back-propagation phase will then start.
The connection weights of synapses are updated when the feed-forward mode finishes. In contrast to
feed-forward, back-propagation starts at the output layer and returns to the hidden layer. The synapses
of the hidden layer will be modified in accordance with Eq. (4), Eq.(5), and Eq.(6).
𝑀𝑖𝑗
π‘˜
(𝑑 + 1) = 𝑀𝑖𝑗
π‘˜
(𝑅) βˆ’ β–³ 𝑀𝑖𝑗
π‘˜
(𝑅) (4)
Eq.(2.14) , Eq. (3.8) and Eq. (3.9) show how the updating of synapses input layer.
β–³ π‘€β„Žπ‘–
π‘˜
(𝑅) = πœ‚. 𝛿𝑖. π‘¦β„Ž
π‘˜
(5)
π‘€β„Žπ‘–
π‘˜
(𝑑 + 1) = π‘€β„Žπ‘–
π‘˜
(𝑅) βˆ’ β–³ π‘€β„Žπ‘–
π‘˜
(𝑅) (6)
If the Root Mean Square Error (RMSE) exceeds the allowable level of error, the two phases are
repeated. The output of the SNN will be used to estimate network traffic for the next time.
the error which can be used to adjust the weights in SNN can be described in Eq. (7).
πΈπ‘Ÿπ‘Ÿ(𝑑) = 𝑇𝑅(𝑑) βˆ’ 𝐡𝐷 (7)
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
377
Figure 5. Flowchart of the proposed controller
In order guarantee balance amongst slices, the Estimated Traffic Rate γ€–π‘‡π‘…π‘’π‘ π‘‘π‘–π‘šπ‘Žπ‘‘π‘’. Controller is then
distributed among the active slices uniformly to rate in the next time. Eq. (8) explains how the rate
adjustment control operates.
𝑇𝑅𝑛𝑒𝑀(𝑆𝑙𝑖𝑐𝑒𝑖(𝑑 + 1)) =
π‘‡π‘…π‘’π‘ π‘‘π‘–π‘šπ‘Žπ‘‘π‘’
π‘›π‘’π‘šπ‘π‘’π‘Ÿ π‘œπ‘“ π‘Žπ‘π‘‘π‘–π‘£π‘’ π‘ π‘’π‘βˆ’π‘ π‘™π‘–π‘π‘’π‘ 
(8)
Where the 𝑇𝑅𝑛𝑒𝑀(𝑆𝑙𝑖𝑐𝑒𝑖(𝑑 + 1)) is the new TR for each slice, which depends on it, slice determines
the number of active sub slices in the global slice to avoid congestion in next time
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
378
6. Simulation Setup and Results
The simulation is carried out using the simulation settings specified in Table (1). To evaluate
performance in a high-traffic situation, 100 sub-slice nodes are randomly set up in simulation with
four global slices in the initial position in the coverage region. The amount of active sub slices in each
global slice varies depending on the protocol used, which creates different Traffic (TR) based on the
number of active global slices and active sub slices. The three proposed controllers are designed to
compare the simulation (DRASR which is depend on SNN spike and response, DRAIF which is
depend on SNN integrate and fire, and DRAN that depend on traditional neural network)
Table (1) Simulation parameter
Number of global slices 4 global slices
Number of sub slice 100
Number of sub slices for each
global slice
25
Initial global Buffer size 1500 packets
Initial Buffer size of each sub
slice
150 packets
Data packet size 800 bytes
Simulation time 100 msec.
6.1 Packet Loss Ratio (PLR)
Fig. (5) illustrates the PLR for the network when three approaches based on the neural network are
implemented. These approaches are compared using the PLR parameter of the same network; the
comparison also includes a network without the controller.
Figure 5. Comparison packet loss ratio of the network when three proposed approaches are used and
without
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
379
It is clarified in Fig. (5) that the PLR of the proposed approaches is better than without a controller
because the buffer controller decreases sending rate of the active sub-slice during the transmission
process in high network traffic.
It is also obvious that DRAIF controller which is depend on (SNN Integrate and Fire) performs well
but it hasn’t accuracy as DRASR. The performance DRASR is very good.
6.2 Network Throughput Ratio (NTR)
Fig. (6) represents the proportion of the received packets by the global slice over the simulation in time
in the form of a comparison between networks with proposed approaches controller and networks
without controller.
Figure 6. Comparison of NTR of the network when three proposed approaches are used and without
The network with the proposed approaches controller performs better than the network without a
controller in increasing the proportion of packets received at the global slice for all active sub-slices.
For more explanation, WRA (Without Controller), which means that the network traffic is high due to
the number of active sub slice is high too. Moreover, DRASR performs better along the simulation
time because it is designed to work with any changeable traffic rate to avoid overflow on the buffer of
the global slice.
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
380
7. Conclusion
The SDN is responsible and monitored for the entire network, and the resources are not sufficient for
all slices, a controller must be available on the network to be responsible for a fair and efficient
distribution of resources according to the requirements of each slice based on traffic features. The
results presented the efficiency of the proposed controller spike response (DRASR) compared with the
controller with the Integrate and Fire and Artificial Neural are better in network PLR and throughput.
References
[1] Li, H., Li, P., Guo, S., & Yu, S. (2014, June). Byzantine-resilient secure software-defined
networks with multiple controllers. In 2014 IEEE International Conference on
Communications (ICC) (pp. 695-700). IEEE.
[2] Bannour, F., Souihi, S., & Mellouk, A. (2017). Distributed SDN control: Survey, taxonomy,
and challenges. IEEE Communications Surveys & Tutorials, 20(1), 333-354.
[3] Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S.
(2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE,
103(1), 14-76.
[4] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T. V., & Kompella, R. (2013). Towards an
elastic distributed SDN controller. ACM SIGCOMM computer communication review,
43(4), 7-12.
[5] Khattak, Z. K., Awais, M., & Iqbal, A. (2014, December). Performance evaluation of
OpenDaylight SDN controller. In 2014 20th IEEE international conference on parallel and
distributed systems (ICPADS) (pp. 671-676). IEEE.
[6] Chekired, D. A., Khoukhi, L., & Mouftah, H. T. (2017). Decentralized cloud-SDN
architecture in smart grid: A dynamic pricing model. IEEE Transactions on Industrial
Informatics, 14(3), 1220-1231.
[7] Perrot, N., & Reynaud, T. (2016, March). Optimal placement of controllers in a resilient SDN
architecture. In 2016 12th International Conference on the Design of Reliable
Communication Networks (DRCN) (pp. 145-151). IEEE.
[8] Raghunath, K., & Krishnan, P. (2018, July). Towards a secure SDN architecture. In 2018 9th
International Conference on Computing, Communication and Networking Technologies
(ICCCNT) (pp. 1-7). IEEE.
[9] Kleinrouweler, J. W., Cabrero, S., & Cesar, P. (2016, May). Delivering stable high-quality
video: An SDN architecture with DASH assisting network elements. In Proceedings of the
7th International Conference on Multimedia Systems (pp. 1-10).
[10] Bakshi, K. (2013, March). Considerations for software defined networking (SDN):
Approaches and use cases. In 2013 IEEE Aerospace Conference (pp. 1-9). IEEE.
[11] Benzekki, K., El Fergougui, A., & Elbelrhiti Elalaoui, A. (2016). Software‐defined
networking (SDN): a survey. Security and communication networks, 9(18), 5803-5833.
[12] Li, Y., & Li, J. (2014, November). MultiClassifier: A combination of DPI and ML for
application-layer classification in SDN. In The 2014 2nd International Conference on
Systems and Informatics (ICSAI 2014) (pp. 682-686). IEEE.
UtilitasMathematica
ISSN 0315-3681 Volume 120, 2023
381
[13] L. Ma, X. Wen, L. Wang, Z. Lu and R. Knopp., An SDN/NFV based framework for
management and deployment of service based 5G core network, China Communications,
15(10) (2018) 86-98. https://doi.org/10.1109/CC.2018.8485472.
[14] S. Dawaliby, A. Bradai and Y. Pousset., Distributed network slicing in large scale IoT based
on coalitional multi-game theory, IEEE Transactions on Network and Service Management,
16(4) (2019) 1567-1580. https://doi.org/10.1109/TNSM.2019.2945254.
[15] S. A. AlQahtani., An efficient resource allocation to improve QoS of 5G slicing networks
using general processor sharing-based scheduling algorithm, International Journal of
Communication Systems, 33(4) (2020) e4250.https://doi.org/10.1002/dac.4250.
[16] K. Koutlia, R. FerrΓΊs, E. Coronado, R. Riggio, F. Casadevall, A. Umbert and J. PΓ©rez-
Romero., Design and Experimental Validation of a Software-Defined Radio Access Network
Testbed with Slicing Support, Wireless Communications and Mobile Computing, (2019) 1-
17. https://doi.org/10.1155/2019/2361352.
[17] A.J. Ramadha., Overview and implementation of the two most important candidate 5G
waveforms, Journal of Theoretical and Applied Information Technology, 97(9) (2019)
2551–2560.
[18] R. A. Addad, M. Bagaa, T. Taleb, D. L. C. Dutra and H. Flinck., Optimization model for
cross-domain network slices in 5G networks, IEEE Transactions on Mobile Computing,
19(5) (2019) 1156-1169. https://doi.org/10.1109/TMC.2019.2905599.
[19] A. S. D. Alfoudi, S. H. S. Newaz, A. Otebolaku, G. M. Lee and R. Pereira., An efficient
resource management mechanism for network slicing in a LTE network, IEEE Access, 7
(2019) 89441-89457. https://doi.org/10.1109/ACCESS.2019.2926446.
[20] Tavanaei, A., Ghodrati, M., Kheradpisheh, S. R., Masquelier, T., & Maida, A. (2019). Deep
learning in spiking neural networks. Neural networks, 111, 47-63.
[21] Wang, X., Lin, X., & Dang, X. (2020). Supervised learning in spiking neural networks: A
review of algorithms and evaluations. Neural Networks, 125, 258-280.
[22] Lobo, J. L., Del Ser, J., Bifet, A., & Kasabov, N. (2020). Spiking neural networks and online
learning: An overview and perspectives. Neural Networks, 121, 88-100.
[23] Lee, J. H., Delbruck, T., & Pfeiffer, M. (2016). Training deep spiking neural networks using
backpropagation. Frontiers in neuroscience, 10, 508.
[24] Zenke, F., & Ganguli, S. (2018). Superspike: Supervised learning in multilayer spiking
neural networks. Neural computation, 30(6), 1514-1541.
[25] Neftci, E. O., Mostafa, H., & Zenke, F. (2019). Surrogate gradient learning in spiking neural
networks: Bringing the power of gradient-based optimization to spiking neural networks.
IEEE Signal Processing Magazine, 36(6), 51-63.
[26] Bouvier, M., Valentian, A., Mesquida, T., Rummens, F., Reyboz, M., Vianello, E., &
Beigne, E. (2019). Spiking neural networks hardware implementations and challenges: A
survey. ACM Journal on Emerging Technologies in Computing Systems (JETC), 15(2), 1-
35.

More Related Content

Similar to journal in research

Web-Based User Interface for the Floodlight SDN Controller
Web-Based User Interface for the Floodlight SDN ControllerWeb-Based User Interface for the Floodlight SDN Controller
Web-Based User Interface for the Floodlight SDN ControllerEswar Publications
Β 
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringSoftware Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringQuEST Global (erstwhile NeST Software)
Β 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxrosemariebrayshaw
Β 
Software Defined Networking: A Concept and Related Issues
Software Defined Networking: A Concept and Related IssuesSoftware Defined Networking: A Concept and Related Issues
Software Defined Networking: A Concept and Related IssuesEswar Publications
Β 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfFernando Velez Varela
Β 
Software-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingSoftware-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingAnju Ann
Β 
SDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic ConceptsSDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic ConceptsEswar Publications
Β 
Survey of optimizing dynamic virtual local area network algorithm for softwar...
Survey of optimizing dynamic virtual local area network algorithm for softwar...Survey of optimizing dynamic virtual local area network algorithm for softwar...
Survey of optimizing dynamic virtual local area network algorithm for softwar...TELKOMNIKA JOURNAL
Β 
Ericsson Review: Software-Defined-Networking
Ericsson Review: Software-Defined-NetworkingEricsson Review: Software-Defined-Networking
Ericsson Review: Software-Defined-NetworkingEricsson
Β 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined NetworksShreeya Shah
Β 
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSA SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSijdpsjournal
Β 
Provide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfProvide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfarihantelehyb
Β 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow ControllerIRJET Journal
Β 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptxAsfawGedamu
Β 
OpenDayLight Load Balanced Switching
OpenDayLight Load Balanced SwitchingOpenDayLight Load Balanced Switching
OpenDayLight Load Balanced SwitchingManasaKulkarni3
Β 
Foundation of Modern Network- william stalling
Foundation of Modern Network- william stallingFoundation of Modern Network- william stalling
Foundation of Modern Network- william stallingJonathanWallace46
Β 
SDN Control Plane scalability research proposal
SDN Control Plane scalability research proposalSDN Control Plane scalability research proposal
SDN Control Plane scalability research proposalYatindra shashi
Β 
Denial of Service Attacks in Software Defined Networking - A Survey
Denial of Service Attacks in Software Defined Networking - A SurveyDenial of Service Attacks in Software Defined Networking - A Survey
Denial of Service Attacks in Software Defined Networking - A SurveyIRJET Journal
Β 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networkingsaigandham1
Β 

Similar to journal in research (20)

Web-Based User Interface for the Floodlight SDN Controller
Web-Based User Interface for the Floodlight SDN ControllerWeb-Based User Interface for the Floodlight SDN Controller
Web-Based User Interface for the Floodlight SDN Controller
Β 
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringSoftware Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic Engineering
Β 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
Β 
Report-SDN
Report-SDNReport-SDN
Report-SDN
Β 
Software Defined Networking: A Concept and Related Issues
Software Defined Networking: A Concept and Related IssuesSoftware Defined Networking: A Concept and Related Issues
Software Defined Networking: A Concept and Related Issues
Β 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Β 
Software-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingSoftware-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to Networking
Β 
SDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic ConceptsSDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic Concepts
Β 
Survey of optimizing dynamic virtual local area network algorithm for softwar...
Survey of optimizing dynamic virtual local area network algorithm for softwar...Survey of optimizing dynamic virtual local area network algorithm for softwar...
Survey of optimizing dynamic virtual local area network algorithm for softwar...
Β 
Ericsson Review: Software-Defined-Networking
Ericsson Review: Software-Defined-NetworkingEricsson Review: Software-Defined-Networking
Ericsson Review: Software-Defined-Networking
Β 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
Β 
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSA SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
Β 
Provide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfProvide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdf
Β 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
Β 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptx
Β 
OpenDayLight Load Balanced Switching
OpenDayLight Load Balanced SwitchingOpenDayLight Load Balanced Switching
OpenDayLight Load Balanced Switching
Β 
Foundation of Modern Network- william stalling
Foundation of Modern Network- william stallingFoundation of Modern Network- william stalling
Foundation of Modern Network- william stalling
Β 
SDN Control Plane scalability research proposal
SDN Control Plane scalability research proposalSDN Control Plane scalability research proposal
SDN Control Plane scalability research proposal
Β 
Denial of Service Attacks in Software Defined Networking - A Survey
Denial of Service Attacks in Software Defined Networking - A SurveyDenial of Service Attacks in Software Defined Networking - A Survey
Denial of Service Attacks in Software Defined Networking - A Survey
Β 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
Β 

More from rikaseorika

journalism research
journalism researchjournalism research
journalism researchrikaseorika
Β 
science research journal
science research journalscience research journal
science research journalrikaseorika
Β 
scopus publications
scopus publicationsscopus publications
scopus publicationsrikaseorika
Β 
research publish journal
research publish journalresearch publish journal
research publish journalrikaseorika
Β 
ugc journal
ugc journalugc journal
ugc journalrikaseorika
Β 
journalism research
journalism researchjournalism research
journalism researchrikaseorika
Β 
publishable paper
publishable paperpublishable paper
publishable paperrikaseorika
Β 
journal publication
journal publicationjournal publication
journal publicationrikaseorika
Β 
published journals
published journalspublished journals
published journalsrikaseorika
Β 
journal for research
journal for researchjournal for research
journal for researchrikaseorika
Β 
research publish journal
research publish journalresearch publish journal
research publish journalrikaseorika
Β 
mathematica journal
mathematica journalmathematica journal
mathematica journalrikaseorika
Β 
research paper publication journals
research paper publication journalsresearch paper publication journals
research paper publication journalsrikaseorika
Β 
journal for research
journal for researchjournal for research
journal for researchrikaseorika
Β 
ugc journal
ugc journalugc journal
ugc journalrikaseorika
Β 
ugc care list
ugc care listugc care list
ugc care listrikaseorika
Β 
research paper publication
research paper publicationresearch paper publication
research paper publicationrikaseorika
Β 
published journals
published journalspublished journals
published journalsrikaseorika
Β 
journalism research paper
journalism research paperjournalism research paper
journalism research paperrikaseorika
Β 
research on journaling
research on journalingresearch on journaling
research on journalingrikaseorika
Β 

More from rikaseorika (20)

journalism research
journalism researchjournalism research
journalism research
Β 
science research journal
science research journalscience research journal
science research journal
Β 
scopus publications
scopus publicationsscopus publications
scopus publications
Β 
research publish journal
research publish journalresearch publish journal
research publish journal
Β 
ugc journal
ugc journalugc journal
ugc journal
Β 
journalism research
journalism researchjournalism research
journalism research
Β 
publishable paper
publishable paperpublishable paper
publishable paper
Β 
journal publication
journal publicationjournal publication
journal publication
Β 
published journals
published journalspublished journals
published journals
Β 
journal for research
journal for researchjournal for research
journal for research
Β 
research publish journal
research publish journalresearch publish journal
research publish journal
Β 
mathematica journal
mathematica journalmathematica journal
mathematica journal
Β 
research paper publication journals
research paper publication journalsresearch paper publication journals
research paper publication journals
Β 
journal for research
journal for researchjournal for research
journal for research
Β 
ugc journal
ugc journalugc journal
ugc journal
Β 
ugc care list
ugc care listugc care list
ugc care list
Β 
research paper publication
research paper publicationresearch paper publication
research paper publication
Β 
published journals
published journalspublished journals
published journals
Β 
journalism research paper
journalism research paperjournalism research paper
journalism research paper
Β 
research on journaling
research on journalingresearch on journaling
research on journaling
Β 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
Β 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
Β 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
Β 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
Β 
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Β 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
Β 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
Β 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Β 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
Β 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Β 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
Β 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
Β 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
Β 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
Β 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
Β 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Β 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Β 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
Β 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Β 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Β 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Β 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Β 
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
Β 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
Β 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Β 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Β 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
Β 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Β 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Β 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
Β 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
Β 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Β 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Β 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Β 

journal in research

  • 1. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 368 Smart Dynamic Resource Allocation Controller in Bandwidth Slicing Based on Spiking Neural Networks Mohammed Mousa Rashid Al-Yasari1, Nadia Adnan Shiltagh Al-Jamali2 1 Information Institute for Postgraduate Studies (IIPS), Iraqi Commission for Computers and Informatics (ICCI), Baghdad, Iraq, phd202020555@iips.icci.edu.iq 2 University of Baghdad, College of Engineering, Computer Engineering Department, Baghdad, Iraq Abstract Software Defined Networking (SDN) is a modern network architectural model that manages network traffic using software. SDN is a networking scenario that modifies the conventional network design by combining all control features into a single place and making all choices centrally. Controllers are the "brains" of SDN architecture since they are responsible for making control decisions and routing packets at the same time. The capacity for centralized decision- making on routing improves the performance of the network. SDN's growing functionality and uses have led to the development of many controller systems. Every SDN controller idea or design must prioritize the control plane since it is the most crucial part of the SDN architecture. This paper, present Dynamic Resource Allocation based on the Spiking Neural Network (DRASR) approach, which is responsible to distribute available resources among all slices justly according to the type of demand. The simulation results show that the benefit of the network throughput is about 98.8%. 1. Introduction Because it is more controllable, dynamic, and cost-effective than traditional architecture, SDN is a strong network architecture that is best for high-bandwidth applications that change quickly [1]. The idea that a network's control operations should be kept distinct from its forwarding functions became the foundation of the SDN design. This would make it simpler to directly program the network control and abstract forwarding devices for services and network applications [2]. β€’ Easy to program: Since the control function of the forwarding device has been taken away, the network's control operation can be directly programmed. β€’ Agile: The network administrator can change network traffic on the fly to meet different management needs since control is separated from the infrastructure underneath. β€’ Centralized management: Because the network's brain (controller) is logically centralized and appears as a single switch to the application and policy engines, it has a global view of the entire network.
  • 2. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 369 β€’ Employing dynamic SDN programs, network administrators may rapidly manage, modify, protect, and enhance network resources with SDN. SDN is an emerging network paradigm that enables current network architecture constraints to be overcome; it is characterized as a foursome-pillar network architecture [3]. In a distinct data and control plane, routing decisions are flow-based rather than destination-based, the control logic is handled by an external entity known as the SDN Controller, and the network may be programmable through software applications running on top of the SDN Controller. According to the examination of the relevant literature, an attempt was made to compare the existing SDN controllers. The SDN concept and its technical components were thoroughly analyzed in [4]. However, this assessment was not intended to be a comparative analysis of controllers from a commercial standpoint. Referring to aspects such as the difficulty of getting started, the Application Program Interface (APIs) that are supported, the accessibility of documentation, and the version of Openflow, among other factors, conducted a comparative analysis of SDN controllers based on a systematic study. Unfortunately, this work does not do a comparative categorization of the offered controllers, nor does it emphasize the market viewpoint, which is crucial to the acceptability of any technology [5]. Give a comparison of SDN controllers based on characteristics however, they do not perform a market-oriented comparison, such as programming language, documentation, modularity, and performance. This paper's primary contribution is a comparative analysis of the existing SDN controllers and their primary characteristics, taking into account not only functional and technical aspects, nevertheless, but market adoption, documentation availability, and OpenFlow support are also all-important factors. To evaluate the study, we made a comparison between the method based on Spike Response and Integrate and fire then compared it with other techniques such as traditional neural networks. 2. SDN Architecture Based on the prior SDN description, SDN components may be characterized as a collection of the separate data layers, control layers, and application layers that reflect the SDN architecture, as shown in 'figure 1', each of which has its own functionality and can interact through open standard interfaces. These layers were then depicted using a bottom-up approach [6].
  • 3. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 370 Figure 1. Fundamental SDN components 2.1 Data Plane: This plane provides a description of the forwarding devices, which include switches and routers, in addition to a set of instructions that may be given via an application program interface (API). SDN network devices function similarly to traditional network devices, except those packets are forwarded based on a higher plane decision. This signifies that control is no longer delegated to an external party and is now logically centralized. The data plane and the control plane are connected through a standard interface (OpenFlow). In other words, open and standard interfaces are used to build the network brain (control) and applications (conceptually). The controller may use this interface to dynamically setup various forwarding devices. For traffic processing logic in SDN data plane forwarding devices, an API for interacting with the controller, an abstraction layer, and a traffic (packet) processing function will be implemented as software in virtual switches and as hardware in physical switches [7]. The abstraction layer is made up of one or more flow tables, and its main function is to enable the device to decide what to do with the next packet based on its contents. The packet may be routed to a particular switch port, flooded to all ports, or dropped entirely [8]. A flow table in an open flow switch is a data structure placed in a high-speed data plane data structure It provides information about the forwarding and packet handling behavior of the open flow switch. There are one or more flow entries in an open flow table, each with a number of components. A flow table with three entries (match fields, action, and priority), as well as a counter and timer [9]. 2.2 Control Plane: SDN controller, also known as Network Operating System (NOS), is the name given to the control plane in SDN architecture. Due to the fact that the controller is connected to all devices that perform forwarding in the bottom plane, management of the network exchange moves from distributed to centralized [2]. The controller's primary functions are as follows:
  • 4. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 371 β€’ Provide the applications plane with an abstraction view of the underlying infrastructure so they can link with devices that use the SDN (switches, routers). β€’ Execute the directives of the administration (load balancing, forwarding, and routing). β€’ Command and control all the devices that make up the network's data plane [10]. Because malfunctioning nodes are linked to the controller, the controller's logical location assists in the resolution of many distributed issues, such as quicker reactions to node or link failures. Because the controller has a full picture of the whole network, loop avoidance is substantially easier. Depending on the programming language used for implementation, there are several kinds of SDN controllers, such as the pox controller, which is implemented in the Python language, the flooding light controller, which is developed in the Java programming language, and even the NOX controller, which could use the C programming language. They're all open-source controllers, however, there are also commercial ones like HP and NEC [11]. 2.3 SDN Application Layer is a programmable platform provided by SDN technology that enables users to build SDN applications for routing management and resolving critical network issues. Network applications communicate with the controller using an API known as the northbound interface in SDN architecture. These applications' primary function is to manage traffic within network devices by modifying flow entries via the southbound interface [12]. 3. Related Work For dispersed 5G-based SDN/NFV networks, the best workload distribution has been presented [13]. A network slicing architecture from end to end is made to enable a variety of services, including URLLC and eMBB. Additionally, by splitting client requests in the integrated environment of SDN, NFV, and edge computing, the network operating cost may be decreased. Network slicing was carried out by the authors in a large-scale Internet of Things (IoT) context (long-range wide area network) in a prior research [14]. The network is divided into three slices: the best-effort slice, the reliability-aware slice, and the urgency and reliability-aware slice. First, one-to-many matching is used to execute cooperative slicing, with the number of IoT devices allocated to virtual slices serving as the determining factor. Then, using a one-to-one matching game, resources are assigned for each slice (inter-slice resource allocation). The coalitional multigame theory generates significant computational complexity and requires a lot of processing time. Resource sharing and allocation in 5G slice networks are thought to be improved by packet-based data traffic scheduling [15]. Static sharing resources (SSR) and dynamic sharing resources (DSR) are the two operational modes that are utilised. The given capacity weight is calculated for each slice and distributed in accordance with resource allocation. In the end, it is calculated how fairly resources are distributed across slices. A global network controller is necessary to manage vast varieties of slices, including popular, heavy, and sensitive slices. A slice management plan that allocates resources according to priority has also been presented by researchers [16]. Lower priority slices are sent through different pathways, whereas requests for high priority slices are sent along the shortest paths. 200 nodes are used for the experiments, and they are set up in a grid network architecture. In the end,
  • 5. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 372 the delays of slices are reduced by up to 11–14% while the average throughput slices up to 6, 13, and 7%. The shortest route is used for flow (high priority) forwarding in the data plane. The quickest route is not always accessible, however. Therefore, the relevant flow must be put in the controller when the flow does not match a flow table. This causes customers with static resource allocation to have a bandwidth shortage issue. Network slicing has been accomplished via service function chaining [17]. Every slice has its own set of service function chains that handle various types of traffic. The trade-offs between slicing and execution runtime are then examined using a greedy-based heuristic approach. The requisite bandwidth and latency are then achieved using an optimisation model. Network slice mobility is not taken into account, which lowers QoS. To assign resources for each slice in a network, a network slicing resource management (NSRM) system has been created [18]. In this research, an LTE network is taken into account for varying slice assignments and equitable bandwidth allocation across slices. The LTE slice controller manages all slices and deploys the controller for each slice. The radio network resources are distributed through a virtual eNodeB via the LTE slice controller. Slice request dynamic provisioning is really challenging. For instance, the Industry 4.0 application has to handle huge slice requests. 4. Machine Learning and Spiking Neural Network Much effort is put into optimizing and effectively scheduling radio and network resources, but in 5G networks, resource allocation on the basis of the service being provided is a must-have. The increasing number of devices and new services offered by 5G networks will add to the already massive quantity of data traffic that operators now deal with [19]. This stream of traffic may be divided into smaller chunks and handled separately. Since the service provider may now charge differently for each sliced piece and even alter the pricing for each slice, the provider can strike a good balance between company profitability and customer happiness. As a bonus, 5G network slicing enables service providers to construct not just established but also new applications and services. It will be a "one size fits all" solution. Each network section may operate autonomously, with its controls and policy administrators [20]. With ML in place, we can examine any gaps in our knowledge and make any required adjustments. Machine learning will offer a network analysis of the massive data set, which may be researched further to adjust any given slice swiftly and cost-effectively. As shown in Figures 1-a and 1-b, SNN may dynamically activate network automation to adjust resource allocation. Without human involvement, SNN will be accountable for delivering and processing, and making an intelligent choice for network resource adaption. To make the best judgments, it will also weigh some different variables, maybe more than a single person could take into account in a short time [21].
  • 6. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 373 Figure 1. Spiking Neural Network Architecture Whenever a new slice is added to the network, SNN will analyze it in real-time to determine how well it is doing, where it stands in comparison to other networks, what problems could arise, what sections of the network are functioning normally, and if anything seems out of the ordinary [22]. An easy way to see this is on a slice for a fixed wireless corporate network, where capacity may be dynamically added in response to a sudden increase in demand thanks to automation. We could then communicate more efficiently. This will make it easier to create new services or network slices if they become required. With automation, we can do all of this in less time with no degradation in the performance of an ongoing session [20]. Organizational challenges now prevent the widespread use of network slicing. This is due to the fact that several pieces of hardware and organizations inside a service provider's network must be interacted with in order for a single modification to be implemented [23]. 5G's programmability features will make it possible to create a customized end-to-end solution for every use case. The data rate, latency, mobility, isolation, power constraints, etc., are typical parameters that a typical consumer might seek. If the current instance of the network slice does not have enough resources, then a different network slice type will be made available, and the associated network services will be activated [24]. Network slicing takes into account a wide variety of factors, such as the kind of slice, bandwidth, throughput, latency, equipment type, portability, reliability, isolation, power, and many more [25]. Because 5G enables the collection of such large datasets, big data analytics need the use of machine learning. One of the most important and useful ML-based applications in the wireless sector is the detection and revival of dormant cellular cells. Other relevant and useful ML-based applications in the wireless industry include optimizing mobile tower operations, accelerating wireless channel adoption, facilitating targeted marketing, autonomous decision-making in IoT networks, real-time data analysis, predictive maintenance, customer churn, sentiment analysis by social networking, fraud detection, e- commerce, and many more [26]. Since Uber employs real-time differential pricing depending on demand, the number of available vehicles, the weather, the time of day, and other factors, using ML in apps that are comparable to Uber will have several advantages. Better accuracy and prediction in the future may be achieved by using a platform built on machine learning to analyze and process massive
  • 7. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 374 amounts of historical and real-time data. This is because automatically adjusts to price differences in real-time. 5. Proposed Controller using an SNN to calculate an unknown value for the traffic data that changes over time based on the number of network slices. The variance (Err) between actual and desired buffer occupancy is used to update the SNN's weights using the Back Propagation (BP) training method. Because the online training is used to manage the estimating traffic to accommodate it, the SNN must learn the network's behaviour and control it. SNN has eight input nodes, a hidden number of layers, a number of neurons in each layer, and a number of synapses (sub-connections) that are typically determined experimentally. A large number of hidden layers slows and decreased the training process and increases network complexity. The improvement of the non-linearity of the solution requires the adoption of a three-layered feed-forward neural network to achieve the accomplishment of a traffic signal controller. The structure’s sketch of SNN is shown in Fig (2) and Fig (3), the activation function of the neurons in the hidden layer is tanh. The number of neurons in each of the three layers’ input, the hidden, and the output layer are 8,8, and 4 respectively. Figure 2. Structure of SNN
  • 8. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 375 Input neurons of the SNN are assigned to network TR features TR(t); the number of packets arriving at the global slice buffer. Figure 3. Structure of SNN in detail The number of sub-connections or synapses k in the interaction between the input and hidden layers, as illustrated in Fig. (4), is five delayed sub-connections. To determine the number of synapses k, the trial-and-error approach is applied. Figure 4. Sub-connection consists of five synapses As shown in Fig. (4), the weight of each synapse effects the spike-response function Ξ΅; denotes the neuron's activation function. In the encoding process, the actual information TR(t) is encoded information t_h^act computed using Eq. (1). π‘‘β„Ž π‘Žπ‘π‘‘ = π‘‘π‘šπ‘Žπ‘₯ βˆ’ π‘Ÿπ‘œπ‘’π‘›π‘‘ (π‘‘π‘šπ‘–π‘› + (𝑇𝑅(𝑑)βˆ’ 𝑇𝑅min)(π‘‘π‘šπ‘Žπ‘₯βˆ’ π‘‘π‘šπ‘–π‘›) (π‘‡π‘…π‘šπ‘Žπ‘₯βˆ’ π‘‡π‘…π‘šπ‘–π‘›) ) (1)
  • 9. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 376 π‘‡π‘…π‘šπ‘Žπ‘₯ and π‘‡π‘…π‘šπ‘–π‘› that are represent the maximum and minimum values of the real input information. The π‘‘π‘šπ‘Žπ‘₯ and π‘‘π‘šπ‘–π‘› represent the largest and minimum interval T. The maximum and lowest values of the actual information for input are represented by the variables π‘‡π‘…π‘šπ‘Žπ‘₯ and π‘‡π‘…π‘šπ‘–π‘›. Maximum and minimum intervals T are represented by the π‘‘π‘šπ‘Žπ‘₯ and π‘‘π‘šπ‘–π‘›. The decoding equation derived from Eq. (1) by Eq. (2) 𝑇𝑅(𝑑𝑗) = (π‘‘π‘šπ‘Žπ‘₯βˆ’π‘‘π‘—βˆ’ π‘‘π‘šπ‘–π‘›)(π‘‡π‘…π‘šπ‘Žπ‘₯βˆ’ π‘‡π‘…π‘šπ‘–π‘›) (π‘‘π‘šπ‘Žπ‘₯βˆ’ π‘‘π‘šπ‘–π‘›) + π‘‡π‘…π‘šπ‘–π‘› (2) The SNN algorithm operates in two modes. The first is known as feed-forward mode, in which each neuron spikes just once at most during each time interval T when membrane potential m exceeds the value. Starting from hidden layer I, the feed-forward mode constantly examine neuron i to see whether it has spiked or not. The algorithm uses the next neuron i+1 when the neuron i is spiked. The membrane potential m_i (t) is calculated by the SNN algorithm according to Eq. (3) based on input spikes t_h^f of neuron h at input layer H . π‘šπ‘–(𝑑) = βˆ‘ βˆ‘ π‘€β„Žπ‘– π‘˜ 𝐷 π‘˜=1 𝑁𝐻 β„Ž=1 Ι›(𝑑 βˆ’ π‘‘β„Ž 𝑓 βˆ’ π‘‘π‘˜ ) (3) The neuron i is not allowed to spike anymore through the remaining period of time interval T, when the threshold is exceeded at a particular instant t. In the next instant t+1, the neuron i will be reset. When the neurons in the second layer have completed, the algorithm will repeat the same procedure in the output layer J, and the back-propagation phase will then start. The connection weights of synapses are updated when the feed-forward mode finishes. In contrast to feed-forward, back-propagation starts at the output layer and returns to the hidden layer. The synapses of the hidden layer will be modified in accordance with Eq. (4), Eq.(5), and Eq.(6). 𝑀𝑖𝑗 π‘˜ (𝑑 + 1) = 𝑀𝑖𝑗 π‘˜ (𝑅) βˆ’ β–³ 𝑀𝑖𝑗 π‘˜ (𝑅) (4) Eq.(2.14) , Eq. (3.8) and Eq. (3.9) show how the updating of synapses input layer. β–³ π‘€β„Žπ‘– π‘˜ (𝑅) = πœ‚. 𝛿𝑖. π‘¦β„Ž π‘˜ (5) π‘€β„Žπ‘– π‘˜ (𝑑 + 1) = π‘€β„Žπ‘– π‘˜ (𝑅) βˆ’ β–³ π‘€β„Žπ‘– π‘˜ (𝑅) (6) If the Root Mean Square Error (RMSE) exceeds the allowable level of error, the two phases are repeated. The output of the SNN will be used to estimate network traffic for the next time. the error which can be used to adjust the weights in SNN can be described in Eq. (7). πΈπ‘Ÿπ‘Ÿ(𝑑) = 𝑇𝑅(𝑑) βˆ’ 𝐡𝐷 (7)
  • 10. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 377 Figure 5. Flowchart of the proposed controller In order guarantee balance amongst slices, the Estimated Traffic Rate γ€–π‘‡π‘…π‘’π‘ π‘‘π‘–π‘šπ‘Žπ‘‘π‘’. Controller is then distributed among the active slices uniformly to rate in the next time. Eq. (8) explains how the rate adjustment control operates. 𝑇𝑅𝑛𝑒𝑀(𝑆𝑙𝑖𝑐𝑒𝑖(𝑑 + 1)) = π‘‡π‘…π‘’π‘ π‘‘π‘–π‘šπ‘Žπ‘‘π‘’ π‘›π‘’π‘šπ‘π‘’π‘Ÿ π‘œπ‘“ π‘Žπ‘π‘‘π‘–π‘£π‘’ π‘ π‘’π‘βˆ’π‘ π‘™π‘–π‘π‘’π‘  (8) Where the 𝑇𝑅𝑛𝑒𝑀(𝑆𝑙𝑖𝑐𝑒𝑖(𝑑 + 1)) is the new TR for each slice, which depends on it, slice determines the number of active sub slices in the global slice to avoid congestion in next time
  • 11. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 378 6. Simulation Setup and Results The simulation is carried out using the simulation settings specified in Table (1). To evaluate performance in a high-traffic situation, 100 sub-slice nodes are randomly set up in simulation with four global slices in the initial position in the coverage region. The amount of active sub slices in each global slice varies depending on the protocol used, which creates different Traffic (TR) based on the number of active global slices and active sub slices. The three proposed controllers are designed to compare the simulation (DRASR which is depend on SNN spike and response, DRAIF which is depend on SNN integrate and fire, and DRAN that depend on traditional neural network) Table (1) Simulation parameter Number of global slices 4 global slices Number of sub slice 100 Number of sub slices for each global slice 25 Initial global Buffer size 1500 packets Initial Buffer size of each sub slice 150 packets Data packet size 800 bytes Simulation time 100 msec. 6.1 Packet Loss Ratio (PLR) Fig. (5) illustrates the PLR for the network when three approaches based on the neural network are implemented. These approaches are compared using the PLR parameter of the same network; the comparison also includes a network without the controller. Figure 5. Comparison packet loss ratio of the network when three proposed approaches are used and without
  • 12. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 379 It is clarified in Fig. (5) that the PLR of the proposed approaches is better than without a controller because the buffer controller decreases sending rate of the active sub-slice during the transmission process in high network traffic. It is also obvious that DRAIF controller which is depend on (SNN Integrate and Fire) performs well but it hasn’t accuracy as DRASR. The performance DRASR is very good. 6.2 Network Throughput Ratio (NTR) Fig. (6) represents the proportion of the received packets by the global slice over the simulation in time in the form of a comparison between networks with proposed approaches controller and networks without controller. Figure 6. Comparison of NTR of the network when three proposed approaches are used and without The network with the proposed approaches controller performs better than the network without a controller in increasing the proportion of packets received at the global slice for all active sub-slices. For more explanation, WRA (Without Controller), which means that the network traffic is high due to the number of active sub slice is high too. Moreover, DRASR performs better along the simulation time because it is designed to work with any changeable traffic rate to avoid overflow on the buffer of the global slice.
  • 13. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 380 7. Conclusion The SDN is responsible and monitored for the entire network, and the resources are not sufficient for all slices, a controller must be available on the network to be responsible for a fair and efficient distribution of resources according to the requirements of each slice based on traffic features. The results presented the efficiency of the proposed controller spike response (DRASR) compared with the controller with the Integrate and Fire and Artificial Neural are better in network PLR and throughput. References [1] Li, H., Li, P., Guo, S., & Yu, S. (2014, June). Byzantine-resilient secure software-defined networks with multiple controllers. In 2014 IEEE International Conference on Communications (ICC) (pp. 695-700). IEEE. [2] Bannour, F., Souihi, S., & Mellouk, A. (2017). Distributed SDN control: Survey, taxonomy, and challenges. IEEE Communications Surveys & Tutorials, 20(1), 333-354. [3] Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14-76. [4] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T. V., & Kompella, R. (2013). Towards an elastic distributed SDN controller. ACM SIGCOMM computer communication review, 43(4), 7-12. [5] Khattak, Z. K., Awais, M., & Iqbal, A. (2014, December). Performance evaluation of OpenDaylight SDN controller. In 2014 20th IEEE international conference on parallel and distributed systems (ICPADS) (pp. 671-676). IEEE. [6] Chekired, D. A., Khoukhi, L., & Mouftah, H. T. (2017). Decentralized cloud-SDN architecture in smart grid: A dynamic pricing model. IEEE Transactions on Industrial Informatics, 14(3), 1220-1231. [7] Perrot, N., & Reynaud, T. (2016, March). Optimal placement of controllers in a resilient SDN architecture. In 2016 12th International Conference on the Design of Reliable Communication Networks (DRCN) (pp. 145-151). IEEE. [8] Raghunath, K., & Krishnan, P. (2018, July). Towards a secure SDN architecture. In 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-7). IEEE. [9] Kleinrouweler, J. W., Cabrero, S., & Cesar, P. (2016, May). Delivering stable high-quality video: An SDN architecture with DASH assisting network elements. In Proceedings of the 7th International Conference on Multimedia Systems (pp. 1-10). [10] Bakshi, K. (2013, March). Considerations for software defined networking (SDN): Approaches and use cases. In 2013 IEEE Aerospace Conference (pp. 1-9). IEEE. [11] Benzekki, K., El Fergougui, A., & Elbelrhiti Elalaoui, A. (2016). Software‐defined networking (SDN): a survey. Security and communication networks, 9(18), 5803-5833. [12] Li, Y., & Li, J. (2014, November). MultiClassifier: A combination of DPI and ML for application-layer classification in SDN. In The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014) (pp. 682-686). IEEE.
  • 14. UtilitasMathematica ISSN 0315-3681 Volume 120, 2023 381 [13] L. Ma, X. Wen, L. Wang, Z. Lu and R. Knopp., An SDN/NFV based framework for management and deployment of service based 5G core network, China Communications, 15(10) (2018) 86-98. https://doi.org/10.1109/CC.2018.8485472. [14] S. Dawaliby, A. Bradai and Y. Pousset., Distributed network slicing in large scale IoT based on coalitional multi-game theory, IEEE Transactions on Network and Service Management, 16(4) (2019) 1567-1580. https://doi.org/10.1109/TNSM.2019.2945254. [15] S. A. AlQahtani., An efficient resource allocation to improve QoS of 5G slicing networks using general processor sharing-based scheduling algorithm, International Journal of Communication Systems, 33(4) (2020) e4250.https://doi.org/10.1002/dac.4250. [16] K. Koutlia, R. FerrΓΊs, E. Coronado, R. Riggio, F. Casadevall, A. Umbert and J. PΓ©rez- Romero., Design and Experimental Validation of a Software-Defined Radio Access Network Testbed with Slicing Support, Wireless Communications and Mobile Computing, (2019) 1- 17. https://doi.org/10.1155/2019/2361352. [17] A.J. Ramadha., Overview and implementation of the two most important candidate 5G waveforms, Journal of Theoretical and Applied Information Technology, 97(9) (2019) 2551–2560. [18] R. A. Addad, M. Bagaa, T. Taleb, D. L. C. Dutra and H. Flinck., Optimization model for cross-domain network slices in 5G networks, IEEE Transactions on Mobile Computing, 19(5) (2019) 1156-1169. https://doi.org/10.1109/TMC.2019.2905599. [19] A. S. D. Alfoudi, S. H. S. Newaz, A. Otebolaku, G. M. Lee and R. Pereira., An efficient resource management mechanism for network slicing in a LTE network, IEEE Access, 7 (2019) 89441-89457. https://doi.org/10.1109/ACCESS.2019.2926446. [20] Tavanaei, A., Ghodrati, M., Kheradpisheh, S. R., Masquelier, T., & Maida, A. (2019). Deep learning in spiking neural networks. Neural networks, 111, 47-63. [21] Wang, X., Lin, X., & Dang, X. (2020). Supervised learning in spiking neural networks: A review of algorithms and evaluations. Neural Networks, 125, 258-280. [22] Lobo, J. L., Del Ser, J., Bifet, A., & Kasabov, N. (2020). Spiking neural networks and online learning: An overview and perspectives. Neural Networks, 121, 88-100. [23] Lee, J. H., Delbruck, T., & Pfeiffer, M. (2016). Training deep spiking neural networks using backpropagation. Frontiers in neuroscience, 10, 508. [24] Zenke, F., & Ganguli, S. (2018). Superspike: Supervised learning in multilayer spiking neural networks. Neural computation, 30(6), 1514-1541. [25] Neftci, E. O., Mostafa, H., & Zenke, F. (2019). Surrogate gradient learning in spiking neural networks: Bringing the power of gradient-based optimization to spiking neural networks. IEEE Signal Processing Magazine, 36(6), 51-63. [26] Bouvier, M., Valentian, A., Mesquida, T., Rummens, F., Reyboz, M., Vianello, E., & Beigne, E. (2019). Spiking neural networks hardware implementations and challenges: A survey. ACM Journal on Emerging Technologies in Computing Systems (JETC), 15(2), 1- 35.