{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:15:22Z","timestamp":1740147322196,"version":"3.37.3"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2018,11,26]],"date-time":"2018-11-26T00:00:00Z","timestamp":1543190400000},"content-version":"vor","delay-in-days":149,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2018,6,30]]},"abstract":"Modern information technology services largely depend on cloud infrastructures to provide their services. These cloud infrastructures are built on top of Datacenter Networks (DCNs) constructed with high-speed links, fast switching gear, and redundancy to offer better flexibility and resiliency. In this environment, network traffic includes long-lived (elephant) and short-lived (mice) flows with partitioned\/aggregated traffic patterns. Although SDN-based approaches can efficiently allocate networking resources for such flows, the overhead due to network reconfiguration can be significant. With limited capacity of Ternary Content-Addressable Memory (TCAM) deployed in an OpenFlow enabled switch, it is crucial to determine which forwarding rules should remain in the flow table and which rules should be processed by the SDN controller in case of a table-miss on the SDN switch. This is needed in order to obtain the flow entries that satisfy the goal of reducing the long-term control plane overhead introduced between the controller and the switches. To achieve this goal, we propose a machine learning technique that utilizes two variations of Reinforcement Learning (RL) algorithms\u2014the first of which is a traditional RL-based algorithm, while the other is deep reinforcement learning-based. Emulation results using the RL algorithm show around 60% improvement in reducing the long-term control plane overhead and around 14% improvement in the table-hit ratio compared to the Multiple Bloom Filters (MBF) method, given a fixed size flow table of 4KB.<\/jats:p>","DOI":"10.1145\/3281032","type":"journal-article","created":{"date-parts":[[2018,11,27]],"date-time":"2018-11-27T13:18:59Z","timestamp":1543324739000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["SDN Flow Entry Management Using Reinforcement Learning"],"prefix":"10.1145","volume":"13","author":[{"given":"Ting-Yu","family":"Mu","sequence":"first","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0903-1204","authenticated-orcid":false,"given":"Ala","family":"Al-Fuqaha","sequence":"additional","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI"}]},{"given":"Khaled","family":"Shuaib","sequence":"additional","affiliation":[{"name":"United Arab Emirates University, Al Ain - Abu Dhabi, United Arab Emirates"}]},{"given":"Farag M.","family":"Sallabi","sequence":"additional","affiliation":[{"name":"United Arab Emirates University, Al Ain - Abu Dhabi, United Arab Emirates"}]},{"given":"Junaid","family":"Qadir","sequence":"additional","affiliation":[{"name":"Information Technology University, Lahore Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2018,11,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282382"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"volume-title":"February","year":"2017","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644918"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2013.6710553"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"volume-title":"February","year":"2017","key":"e_1_2_1_8_1"},{"volume-title":"Proceedings of the 2016 IEEE NetSoft Conference and Workshops (NetSoft). IEEE","author":"Challa R.","key":"e_1_2_1_9_1"},{"volume-title":"What every practitioner must know. {Online}. Available: https:\/\/www.sdxcentral.com\/articles\/contributed\/sdn-openflow-tcam-need-to-know\/2012\/07\/","year":"2012","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620734"},{"volume-title":"Proceedings of the 10th International Conference on Network and Service Management (CNSM) and Workshop. IEEE, Rio de Janeiro. 109--117","author":"Banerjee S.","key":"e_1_2_1_12_1"},{"volume-title":"Proceedings of the 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, Kattankulathur, 1--4.","author":"Veeramani S.","key":"e_1_2_1_13_1"},{"volume-title":"Proceedings of the 2015 IFIP Networking Conference (IFIP Networking). IEEE, Toulouse, 1--9.","author":"Zhu H.","key":"e_1_2_1_14_1"},{"volume-title":"Proceedings of the 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, Shanghai, 1--8.","author":"Luo S.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.05.001"},{"volume-title":"Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE","author":"Lu M.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"X. N. Nguyen D. Saucez C. Barakat and T. Turletti. 2016. Rules placement problem in openflow networks: A survey. In IEEE Communications Surveys 8 Tutorials 18 2 1273--1286. X. N. Nguyen D. Saucez C. Barakat and T. Turletti. 2016. Rules placement problem in openflow networks: A survey. In IEEE Communications Surveys 8 Tutorials 18 2 1273--1286.","DOI":"10.1109\/COMST.2015.2506984"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/551283"},{"edition":"2","volume-title":"Machine Learning","author":"Marsland S.","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","first-page":"5602","article-title":"Playing Atari with deep reinforcement learning. ArXiv Preprint","volume":"1312","author":"Mnih V.","year":"2013","journal-title":"ArXiv"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"V. Mnih K. Kavukcuoglu D. Silver A. A. Rusu J. Veness M. G. Bellemare A. Graves M. Riedmiller A. K. Fidjeland G. Ostrovski and S. Petersen. 2015. Human-level control through deep reinforcement learning. Nature 518 7540 529--533. V. Mnih K. Kavukcuoglu D. Silver A. A. Rusu J. Veness M. G. Bellemare A. Graves M. Riedmiller A. K. Fidjeland G. Ostrovski and S. Petersen. 2015. Human-level control through deep reinforcement learning. Nature 518 7540 529--533.","DOI":"10.1038\/nature14236"},{"volume-title":"Available: https:\/\/deepmind.com\/","year":"2017","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.225"},{"key":"e_1_2_1_27_1","unstructured":"POX Controller {Online}. Available: https:\/\/github.com\/noxrepo\/pox. POX Controller {Online}. Available: https:\/\/github.com\/noxrepo\/pox."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9383-6"},{"volume-title":"Proceedings of the 2015 International Conference on Pervasive Computing (IEEE ICPC 2015). IEEE, Pune, 1--5.","author":"Desai R.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","unstructured":"J. Solanki and A. Chauhan. 2015. A reinforcement learning network based novel adaptive routing algorithm for wireless ad-hoc network. International Journal of Science Technology 8 Engineering 1 12 135--142. J. Solanki and A. Chauhan. 2015. A reinforcement learning network based novel adaptive routing algorithm for wireless ad-hoc network. International Journal of Science Technology 8 Engineering 1 12 135--142."},{"volume-title":"Proceedings of the 2016 IEEE International Conference on Services Computing (SCC). IEEE","author":"Lin S. C.","key":"e_1_2_1_31_1"},{"volume-title":"Proceedings of the International Conference on Computing, Networking and Communications (ICNC). IEEE, Silicon Valley, 257--265","author":"Wang S.","key":"e_1_2_1_32_1"}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3281032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T11:10:18Z","timestamp":1672571418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3281032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,30]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6,30]]}},"alternative-id":["10.1145\/3281032"],"URL":"https:\/\/doi.org\/10.1145\/3281032","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"type":"print","value":"1556-4665"},{"type":"electronic","value":"1556-4703"}],"subject":[],"published":{"date-parts":[[2018,6,30]]},"assertion":[{"value":"2017-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}