Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3132114.3132125acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Mining Historical Data towards Interference Management in Wireless SDNs

Published: 21 November 2017 Publication History

Abstract

WiFi networks often seek to reduce interference through network planning, macroscopic self-organization (e.g. channel switching) or network management. In this paper, we explore the use of historical data to automatically predict traffic bottlenecks and make rapid decisions in a wireless (WiFi-like) network on a smaller scale. This is now possible with software defined networks (SDN), whose controllers can have a global view of traffic flows in a network. Models such as classification trees can be used to quickly make decisions on how to manage network resources based on the quality needs, service level agreement or other criteria provided by a network administrator. The objective of this paper is to use data generated by simulation tools to see if such classification models can be developed and to evaluate their efficacy. For this purpose, extensive simulation data was collected and data mining techniques were then used to develop QoS prediction trees. Such trees can predict the maximum delay that results due to specific traffic situations with specific parameters. We evaluated these decision/classification trees by placing them in an SDN controller. OpenFlow cannot directly provide the necessary information for managing wireless networks so we used POX messenger to set up an agent on each AP for adjusting the network. Finally we explored the possibility of updating the tree using feedback that the controller receives from hosts. Our results show that such trees are effective and can be used to manage the network and decrease maximum packet delay.

References

[1]
Adnan Akhunzada, Ejaz Ahmed, Abdullah Gani, Muhammad Khurram Khan, Muhammad Imran, and Sghaier Guizani. 2015. Securing software defined networks: taxonomy, requirements, and open issues. IEEE Communications Magazine 53, 4 (2015), 36--44.
[2]
the University of Waikato Albert Bifet. 2012. Regression. (2012). http://www.cs. waikato.ac.nz/?abifet/523/Regression-Slides.pdf
[3]
Gaurav Ambekar, Tushar Chikane, Shiben Sheth, Abhilasha Sable, and Kranti Ghag. 2015. Anticipation of winning probability in poker using data mining. In Computer, Communication and Control (IC4), 2015 International Conference on. IEEE, 1--6.
[4]
Manu Bansal, Jeffrey Mehlman, Sachin Katti, and Philip Levis. 2012. Openradio: a programmable wireless dataplane. In Proceedings of the first workshop on Hot topics in software defined networks. ACM, 109--114.
[5]
Petros Belsis, Dimitris Vassis, Stefanos Gritzalis, and Christos Skourlas. 2009. W-ehr: a wireless distributed framework for secure dissemination of electronic healthcare records. In Systems, Signals and Image Processing, 2009. IWSSIP 2009. 16th International Conference on. IEEE, 1--4.
[6]
Lakshmi Devasena C. 2014. Comparative Analysis of Random Forest, REP Tree and J48 Classifiers for Credit Risk Prediction. International Journal of Computer Applications (0975 -8887), International Conference on Communication, Computing and Information Technology (ICCCMIT-2014) (2014).
[7]
Lakshmi Devasena C. 2015. Article: Comparative Analysis of Random Forest, REP Tree and J48 Classifiers for Credit Risk Prediction. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014, 3 (March 2015), 30--36. Full text available.
[8]
Min-Cheng Chan, Chien Chen, Jun-Xian Huang, Ted Kuo, Li-Hsing Yen, and Chien-Chao Tseng. 2014. OpenNet: A simulator for software-defined wireless local area network. In Wireless Communications and Networking Conference (WCNC), 2014 IEEE. IEEE, 3332--3336.
[9]
Ronald H. Coase. 2013. The federal communications commission. The Journal of Law and Economics 56, 4 (2013), 879--915.
[10]
Bálint Daróczy, Péter Vaderna, and Andra's Benczúr. 2015. Machine learning based session drop prediction in LTE networks and its SON aspects. In Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st. IEEE, 1--5.
[11]
Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu. 2011. They can hear your heartbeats: non-invasive security for implantable medical devices. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 2--13.
[12]
Mihaela Göndör and Vasile Paul Bresfelean. 2012. REPTree and M5P for measuring fiscal policy influences on the Romanian Capital Market during 2003--2010. International Journal of Mathematics and Computers in Stimulation 6, 4 (2012), 378--386.
[13]
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H Witten. 2009. The WEKA data mining software: an update. ACM SIGKDD explorations newsletter 11, 1 (2009), 10--18.
[14]
Tom Henderson. 2015. ns3::Log Distance Propagation Loss Model. (2015). https://www.nsnam.org/docs/release/3.22/doxygen/classns3 1 1 log distance propagation loss model.html
[15]
Tom Henderson. 2015. ns3::Nist Error Rate Model. (2015). https://www.nsnam. org/docs/release/3.22/doxygen/classns3 1 1 nist error rate model.html
[16]
Maryam Karimi and M. Ahmadzadeh. 2014. Mining RoboCup Log Files to Predict Own and Opponent Action. International Journal of Advanced Research in Computer Science (IJARCS) 5, 6 (2014), 27--32.
[17]
Kin K. Leung. 2002. Power control by interference prediction for broadband wireless packet networks. IEEE Transactions on Wireless Communications 1, 2 (2002), 256--265.
[18]
Tze-Ping Low and Jangwook Moon. 2015. Interference Modulation Order Detection with Supervised Learning for LTE Interference Cancellation. In Vehicular Technology Conference (VTC Fall), 2015 IEEE 82nd. IEEE, 1--5.
[19]
Murphy McCauley. 2017. POX Wiki. (2017). https://openflow.stanford.edu/ display/ONL/POX+Wiki
[20]
G. Neri, R.C.S. Morling, G.D. Cain, E. Faldella, M. Longhi-Gelati, T. Salmon-Cinotti, and P. Natali. 1984. Mininet: A local area network for real-time instrumentation applications. Computer Networks (1976) 8, 2 (1984), 107--131.
[21]
Guangyu Pei and Thomas R. Henderson. 2010. Validation of OFDM error rate model in ns-3. Boeing Research Technology (2010), 1--15.
[22]
Narasimha Prasad, Kishor Kumar Reddy, and Ramya Tulasi Nirjogi. 2014. A Novel Approach for Seismic Signal Magnitude Detection Using Haar Wavelet. In Intelligent Systems, Modelling and Simulation (ISMS), 2014 5th International Conference on. IEEE, 324--329.
[23]
John R. Quinlan et al. 1992. Learning with continuous classes. In 5th Australian joint conference on artificial intelligence, Vol. 92. Singapore, 343--348.
[24]
Manickam Ramasamy, Shanthi Selvaraj, and M. Mayilvaganan. 2015. An empirical analysis of decision tree algorithms: Modeling hepatitis data. In Engineering and Technology (ICETECH), 2015 IEEE International Conference on. IEEE, 1--4.
[25]
George F. Riley and Thomas R. Henderson. 2010. The ns-3 network simulator. In Modeling and Tools for Network Simulation. Springer, 15--34.
[26]
Zahra Ronaghi, Edward B. Duffy, and David M Kwartowitz. 2015. Toward realtime remote processing of laparoscopic video. Journal of Medical Imaging 2, 4 (2015), 045002--045002.
[27]
Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, and Manijeh Keshtgary. 2014. A survey on SDN, the future of networking. Journal of Advanced Computer Science & Technology 3, 2 (2014), 232.
[28]
Salvatore Sanfilippo. 2016. hping3(8) - Linux man page. (2016). http://linux.die. net/man/8/hping3
[29]
Julius Schulz-Zander, P. Lalith Suresh, Nadi Sarrar, Anja Feldmann, Thomas Hühn, and Ruben Merz. 2014. Programmatic Orchestration of WiFi Networks. In USENIX Annual Technical Conference. 347--358.
[30]
Mayank Taneja, Kavyanshi Garg, Archana Purwar, and Samarth Sharma. 2015. Prediction of click frauds in mobile advertising. In Contemporary Computing (IC3), 2015 Eighth International Conference on. IEEE, 162--166.
[31]
Moazzam Islam Tiwana, Berna Sayrac, and Zwi Altman. 2010. Statistical learning in automated troubleshooting: Application to LTE interference mitigation. IEEE Transactions on Vehicular Technology 59, 7 (2010), 3651--3656.
[32]
University of Michigan Z. Morley Mao. 2010. Network Service Model. (2010). http: //www.eecs.umich.edu/courses/eecs489/w10/winter10/lectures/lecture16.pdf
[33]
Yongheng Zhao and Yanxia Zhang. 2008. Comparison of decision tree methods for finding active objects. Advances in Space Research 41, 12 (2008), 1955--1959.

Cited By

View all
  • (2021)Software Defined Ambit of Data Integrity for the Internet of Things2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid)10.1109/CCGrid51090.2021.00089(737-745)Online publication date: May-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
Q2SWinet '17: Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks
November 2017
130 pages
ISBN:9781450351652
DOI:10.1145/3132114
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. classification tree
  2. resource management
  3. sdn
  4. wifi

Qualifiers

  • Research-article

Conference

MSWiM '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 46 of 131 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Software Defined Ambit of Data Integrity for the Internet of Things2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid)10.1109/CCGrid51090.2021.00089(737-745)Online publication date: May-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media