Next Article in Journal
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
Next Article in Special Issue
On the Time to Buffer Overflow in a Queueing Model with a General Independent Input Stream and Power-Saving Mechanism Based on Working Vacations
Previous Article in Journal
Use of Long Short-Term Memory for Remaining Useful Life and Degradation Assessment Prediction of Dental Air Turbine Handpiece in Milling Process
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Supervised Learning of Neural Networks for Active Queue Management in the Internet

1
Faculty of Automatic Control, Electronics and Computer Science, Department of Distributed Systems and Informatic Devices, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
2
Institute of Theoretical and Applied Informatics Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(15), 4979; https://doi.org/10.3390/s21154979
Submission received: 12 June 2021 / Revised: 11 July 2021 / Accepted: 15 July 2021 / Published: 22 July 2021
(This article belongs to the Special Issue Mathematical Modelling and Analysis in Sensors Networks)

Abstract

:
The paper examines the AQM mechanism based on neural networks. The active queue management allows packets to be dropped from the router’s queue before the buffer is full. The aim of the work is to use machine learning to create a model that copies the behavior of the AQM P I α mechanism. We create training samples taking into account the self-similarity of network traffic. The model uses fractional Gaussian noise as a source. The quantitative analysis is based on simulation. During the tests, we analyzed the length of the queue, the number of rejected packets and waiting times in the queues. The proposed mechanism shows the usefulness of the Active Queue Management mechanism based on Neural Networks.

1. Introduction

Cisco predicts that by 2022, the Internet traffic will increase to 77 exabytes per month due to the rapid development of mobile technologies. The mobile data transfer will increase sevenfold compared to 2017, with an average annual growth of 46% [1]. The rapid increase in the number of Internet users as well as the transmission of multimedia content of increasing quality force the continuous development of data transmission mechanisms.
Wide area networks have their origins in the 1970s and were created for the American army. Thus, the most important aspect of the network based on a distributed architecture was to deliver reliable transmission of data and low connection costs. Unfortunately, the design assumptions proposed at the beginning turned out to be insufficient over the years.
Initially, IP routers handled packets according to the FIFO (First In First Out) rule (the first incoming packet in the queue is the first one to be served) [2]. For such scheduling, packets are dropped when the queue length exceeds the maximum length which results in the retransmission of a large number of packets in a short period of time. For such a network model, it is very difficult to control transmission throughput, delay and packet dropping [3].
To solve this problem, the Internet Engineering Task Force (IETF) proposed Active Queue Management (AQM) mechanisms [4]. These mechanisms preemptively drop packets before queue overflow occurs. In addition, the rejection of a packet should force the sender to reduce the transmission speed, which is provided by TCP congestion window mechanism [5]. The AQM algorithms used with TCP can enhance the efficiency of network transmission [4].
One of the first active queue management algorithm—Random Early Detection (RED) [6]—was proposed in 1993 by Sally Floyd and Van Jacobson. This mechanism estimates the packet dropping probability, which depends on the queue length. Despite the advantages of the RED algorithm, it also has some limitations. One of them is the problem of adjusting parameters to varying network traffic. Furthermore, the efficiency of the RED mechanism is closely related to the current network conditions [7]. There are many improvements and modifications of the classic RED algorithm [8,9,10,11,12,13] but none of them fully solves these problems. Performance of all RED family algorithms depends on coefficients of the dropping packet probability function. These coefficients should differ depending on the parameters of traffic such as intensity, burstiness or long-term dependence [14]. Article [15] presents the algorithm of finding the optimal parameters using the Hooke-Jeeves optimizing method. One of the newest solutions combines AQM mechanisms with a well-known method adopted from the theory of Automatic Control-PI controller. In this context, the information obtained from a classic PI controller is used as a packet dropping function [16,17,18]. The article [19] highlights the advantages of the PIE (Proportional Integral Enhanced Controller) algorithm. The authors state that mechanism easily adapts to varying transmission conditions and turned out to be a compromise between the degree of queue utilization and transmission delays.
The literature states that non-integer order controllers may have better performance than classic integer order ones. The first implementation of the fractional order PI controller used in queue management was presented in [20]. Our previous articles [21] investigate the performance of a fractional order PI controller ( P I α ) utilized as an Internet traffic controller.
Increase in popularity of machine learning methods may enable the creation of a more efficient AQM mechanism. Artificial Neural Networks (ANNs) are a powerful tool with high ability to recognize patterns, even in the case of incomplete and partially distorted training data [22]. One of their applications is time series processing and analysis, which is applied in many different fields. To process time-series data with Artificial Neural Networks, different types of network layers can be used, namely Recurrent layers (including Long-Short Term Memory (LSTM) layers and Gated Recurrent Unit (GRU) Layers) and 1D Convolutional Neural Networks (CNNs). Here, CNNs can be used as a fast alternative to recurrent layers [22]. Paper [23] proposes the CNN model for processing data from time series and forecasting prices in financial markets. In a different work, [24], CNNs were used to discover the network attacks, namely Distributed Denial of Service (DDoS) attacks. Additionally, our previous work [25] uses ANNs to examine the self-similar properties of the network traffic expressed by the Hurst parameter H. This approach also uses Convolutional Neural Networks. The promising results obtained in this work prompted us to create an efficient adaptive algorithm of Active Queue Management based on Convolutional Neural Networks.
Mechanisms that select AQM parameters based on the decisions of neural networks have been proposed in the literature [26,27]. Nevertheless, these methods are based on reinforcement learning. This paradigm relies on trial-and-error to make a specific decision in each iteration of the algorithm. The neural network receives feedback (i.e., queue length) after each step, which is then used to evaluate the previously made decision. Based on this feedback, the ANN changes its weights to optimize the accuracy of the decision-making process [28]. Thus, the configuration of the neural network varies depending on the current queue occupancy.
Our contribution. The aim of the work is to propose an algorithm for Active Queue Management based on supervised learning paradigm. We use a previously trained Convolutional Network to manage the queue. The ANN is trained based on the data obtained in simulations. We observe the impact on the behavior of the AQM mechanism based on the P I α controller. In experiments we change the intensity and degree of self-similarity of network sources and observe behavior of the controller. The samples contain the sequence of incoming packets and the probability of packet dropping. The model trained this way is used as a new AQM mechanism. This paper presents its influence on the Internet transmission.
The remainder of the paper is organized as follows: Section 2 describes the current state of the art in this field. Section 3 presents the theoretical background. Section 4 is a description of the structure of the Artificial Neural Network, the data and the experimental methods used to obtain the results for this research. In Section 5 there is a description of the results of the conducted experiments. Section 6 concludes our research.

2. Related Works

There are many works regarding new AQM algorithms. These mechanisms are compared with existing solutions in terms of transmission parameters such as total number of dropped packets, average queue length, or transmission delays. In the article [7] passive and active queue management mechanisms were compared. Other works focus only on the comparison of the AQM mechanisms [6,29]. The topics of research in network and computer system performance evaluation also include works considering the impact of self-similarity of network traffic on transmission efficiency [10].
Additionally, the fractional order PI controller [30] is used for the Active Queue Management. This research is still under development, and its mechanisms have also been subjected to an analysis of the effect of the degree of self-similarity and long-term dependence of the traffic [31].
A separate group includes studies that have used neural networks to improve the queue management mechanism in TCP networks. The article [32] proposed the AQM mechanism based on reinforcement learning—Q-learning RED. The authors of [33] proposed an ANB-AQM mechanism, in which a back-propagation algorithm was used to train the neural networks to make decisions about accepting or rejecting packets. Article [34] proposes a neural network model, which modifies the REM algorithm, called the Fuzzy Neuron REM (FNREM) mechanism. This mechanism modifies the value of the proportional integral of the REM algorithm, by using the value of the proportional-integral derivative neuron as an indicator of overload.
ANNs were also used to create a new algorithm—Adaptive Neuron Proportional Integral Differential (ANPID) [35]. This mechanism used a single neuron to tune the PID controller coefficients. The authors of [36] presented the results based on the simulation and the real tests in the Linux Kernel, which resulted in the presentation of another adaptive modification of the PID controller using neural networks—the GRPID mechanism.
In article [37] authors presented an improved PID AQM/TCP system based on the network built using the Long Short-Term Memory (LSTM) layers (a specific type of a recurrent layer). It allows to predict queue length in the next step. They used Root Mean Square Error (RMSE) as a loss function. LSTM layers were also used to predict the occurrence of transmission overloads [38].
The research presented in XuIeee is an example of an attempt to use unsupervised learning to create a more efficient AQM mechanism. For that purpose, the Hebbian Learning rule is used and a new adaptive PHAQM algorithm is presented.
Bisoy and Pattnaik [39] used feed-forward neural network to create an AQM mechanism, namely FFNN-AQM. The network consisted of two input neurons, three neurons in a single hidden layer and the single output neuron.
Zhou et al. [40] also presented an adaptive AQM mechanism based on a single neuron whose weights were selected using reinforcement learning rules. The application of reinforcement learning was also used in [41] to build a mechanism to reduce transmission delays.
There are many works on the topic of AQMs based on neural networks. However, in these works, in contrast to our approach, the neural networks were mainly created using reinforcement learning. In addition, the research results did not consider the analysis of the effect of traffic self-similarity and long-term dependence on transmission efficiency.

3. Theoretical Background

Self-similarity is widely observed in nature, but the term itself was introduced by Mandelbrot in 1960s and it generally means that the portion of the whole object can be considered an image of the whole in a reduced scale. The object is self-similar, when it exhibits the same statistical properties independently of the scale. Mandelbrot described it on the example of the scaled coastlines, which also exhibited self-similarity. This property can also be used in the case of time-series analysis. The degree of self-similarity in this case determines whether Long-Range Dependence (LRD) and Short-Range Dependence (SRD) occur in data. These relationships were observed as early as the middle of the twentieth century, when Sir H. E. Hurst described the occurrence of long-range dependence based on the value of water level fluctuations in the Nile River. Although the terms of self-similarity and LRD are sometimes used interchangeably, they are not the same [42].
A continuous-time series Y ( t ) is exactly self-similar when the following condition is satisfied:
Y ( t ) = d a H Y ( a t ) ,
for t 0 , a 0 and 0 < H < 1 . It results in the statistical invariability in different time scales. H is usually used to denote the Hurst exponent/parameter, which expresses the degree of self-similarity. The parameter can take values from range ( 0 ; 1 ) , and specific values represent:
  • H ( 0 ; 0.5 ) : negative correlation—the LRD does not occur (the SRD occurs).
  • H = 0.5 : no correlation.
  • H ( 0.5 ; 1 ) : positive correlation—the LRD occurs.
It was first proven in [43] that actual network traffic exhibits self-similarity. This work provided the motivation for numerous studies that demonstrated the significant impact of self-similarity on TCP transmissions [44], or to confirm its occurrence in Wide Area Networks (WANs) [45]. Self-similarity results in performance degradations, such as mean queue length enlargement and the increase in packet loss probability [42]. The topic of self-similarity is still relevant in the literature and found its application in e.g., DoS attack detection (e.g., [46]). Our previous works were also related to this topic. They regarded determining the degree of traffic self-similarity expressed by the Hurst parameter and also using data obtained from the IITiS data traffic traces to examine self-similar properties [25]. Self-similarity significantly impacts queue occupancy and transmission performance [47]. For that reason, the samples generated for the purpose of this article are characterized by different degrees of self-similarity.
Artificial Neural Networks have found application in many different domains, e.g., image classification, natural language processing, signal processing etc. Additionally, Deep Learning approaches have become a solution to many problems due to their better ability to extract patterns than shallow learning [48]. The versatility of neural networks has resulted in them also being frequently used in the network traffic domain for tasks including attack detection [49,50], traffic generation [51] and classification of the traffic type [52].
Network traffic and its features are often represented as a time series. To process time-series data with Artificial Neural Networks, different types of networks (e.g., Autoencoders) and layers can be used, namely Recurrent layers (including Long-Short Term Memory (LSTM) layers and Gated Recurrent Unit (GRU) Layers) and 1D Convolutional Neural Networks.
Autoencoders can be built using different types of layers, e.g., Dense Layers or Convolutional layers. The goal of this type of network is to compress input data and then reconstruct it on output [53]. It can be used for the purpose of data denoising, but also anomaly detection. When the neural network is not able to reconstruct the input data well, it suggests that the sample can be anomalous [53].
LSTM layers are often used for the purpose of time-series data processing. Single LSTM units solve the gradient vanishing and exploding issues typical for simple Recurrent Layers and are able to propagate gradients over a long period of time [54]. The key characteristic of this type of layer is that they store the internal state, which enables them to ’remember’ the past information [52]. Due to that their internal ’memory’ is longer than in the traditional recurrent units.
The alternative for LSTM layers is a GRU layer. It is very similar to LSTM layer, also stores the Long-Time memory of the past information, which is vital for time-series processing. Nevertheless, it is simpler to implement and compute than the LSTM layer, thus more efficient [55].
Additionally, convolutional layers can be used to process time-series data. In this case, time has to be treated as a spatial dimension [22]. In fact, it is an efficient alternative to recurrent layers. In a Convolutional Neural Network, transformed time-series data are processed in turns using convolutional and pooling layers. As a result deep, more abstract representations are generated on the basis of raw data. Processing ends with a classifier part (Multi-Layer Perceptron), which consists of dense layers.

4. Data Preparation and Neural Networks Training Process

In this paper, we used artificial neural network models to develop an active queue management mechanism. The neural networks were trained to mimic the operation of the AQM based on the fractional order P I α controller mechanism. The training data were generated based on simulation data, and a detailed description of the learning model is given in this section.
The neural network model was based on four convolutional layers and two dense layers. After each convolutional layer, the data were normalized and the results were averaged. Additionally, a dropout layer was placed to prevent over-fitting to the learning data. Python and Keras libraries were used to implement the model. The conceptual structure of the model used in this paper is presented in Figure 1. To design this model structure we relied on the experience of our earlier work [25], where the degree of self-similarity of network traffic was classified using Convolutional Neural Networks expressed by Hurst parameter.
In order to prepare the training set for the proposed neural network model, network simulations were performed, reflecting the queueing behavior of a fractional order controller P I α . The values of the fractional order P I α controller parameters have been presented in the Table 1. These values were determined based on our previous work [26]. The results of these articles have shown that the choice of controller parameters significantly affects the queue length control properties. The process of choosing proper AQM/PI controller parameters is non-trivial. It has a significant impact on the packet dropping function (i.e., for an integral order α it can strengthen and accelerate the response of a controller). Properly selected AQM parameters should allow us to obtain adaptation to the changing transmission conditions and desired queue behavior. We discussed the influence of these parameters on queue behavior in papers [15]. The controller parameters were chosen in such a manner that controller P I α 1 was the weakest controller, and controller P I α 3 was the strongest one, which implies a large number of packet rejections and ease of maintaining the desired queue length.
To obtain training data for an AQM model based on Convolutional Networks, network simulations were performed using the AQM mechanism. For this purpose, the discrete event simulator SimPy (written in Python) was used. This software is available under the MIT License and has been used in our previous works regarding the evaluation of AQMs [21,26].
Our simulation model was a discrete model of a G / M / 1 / N queue. The simulation time was divided into discrete time intervals of length d t . Arrival of a packet was generated (or not) in a given time slot by a traffic source. The source of traffic was self-similar and based on Fractional Gaussian Noise (FGN) process. The advantages of such a source have been described previously in the articles [10,15,25].
All experiments considered different degrees of traffic self-similarity expressed using Hurst parameter. In experiments the Hurst parameter changed between H = 0.5 (no correlation) and H = 0.9 (high degree of LRD).
The input intensity coefficient was set to a constant value λ = 0.5 . Thus, the simulation packet source always had a constant intensity. Parameter μ represents the time of packet processing and dispatching (probability of taking a packet from the queue). Different values of this coefficient were used in the experiments. The parameter μ took values between μ = 0.5 (moderately stressed system) to μ = 0.15 (highly stressed system). This choice of simulation parameters allowed us to observe all properties of the AQM mechanism.
In our experiments, we considered different numbers of items from queue occupancy history taken into consideration in the samples used to train Convolutional Networks. For simplicity, we refer to this number of samples as ’CNN History’. This length corresponded to the number of time slots in the simulation model that were used as training data for the network. For example C N N = 200 refers to 200 * d t time intervals taken into consideration. Throughout this time, we observed the behavior of the AQM queue.
Thus, the training data consisted of:
  • Learning features:
    (a)
    The last n items from the queue’s occupancy history (CNN History).
    (b)
    History of packet rejections in n last queue states
    where n [ 20 ; 100 ; 200 ; 300 ; 400 ; 500 ; 1000 ] .
  • Classes:
    (a)
    11 labels that mapped the probability of packet rejection to the current transmission conditions, according to the principle shown in Table 2.
Therefore, we considered different lengths of queue occupancy history, because from the perspective of the router, which is a low resource device, minimizing the length of the history would be beneficial. In our study, we tried to determine the minimum acceptable length of n last items of the queue’s occupancy history.
For each probability interval, one million one-dimensional learning records were prepared. Therefore, the training set consisted of 11 million records. They contained transmission information such as the length of the queue in each consecutive time slot, the number of dropped packets, and the value of the P I α controller’s packet rejection probability function. We present the process of data preparation in Figure 2. This amount of data seemed to be sufficient in comparison with the cardinality of data reported in the literature [56].
Input data prepared in such a manner were used in the process of supervised learning of the neural network models. In order to train the model and minimize the cost function, the optimizer Adaptive Moment Estimation (Adam) was used with the following parameters:
η = 10 3 , β 1 = 0.9 , β 2 = 0.999
where: η is the learning rate, β 1 is the exponential decay rate for the first moment estimates and β 2 is the exponential decay rate for the second moment estimates. The Adam optimizer is expressed by the equation [57]:
v t = β 1 v t 1 + ( 1 β 1 ) g t s t = β 2 s t 1 + ( 1 β 2 ) g t
where v is the first moment, which resembles momentum that records the past normalized gradient, s is the second moment and g denotes the gradient descent.
In both the four convolutional layers and the two dense layers, ReLU was used as the activation function and Sigmoid/Softmax functions were used to determine the activation of the output layer. Categorical cross-entropy was used as a cost function. Figure 1 shows the conceptual structure of a neural network model used for the purpose of active queue management mechanism.
We limited the training process to 10 epochs. This value was sufficient, since the values start to stabilize after only 5–6 epochs, as confirmed by the results in Table 3, Table 4 and Table 5. We also compare the accuracy of the model, when Softmax activation function (Table 3) and Sigmoid activation function (Table 4) were used in the output layer. Higher results were obtained for the Sigmoid function.
In the case of Softmax function (Table 3), the minimum accuracy was 32.3%, and the maximum 58.9%. For the models in which we applied the Sigmoid activation function for the last layer the minimum accuracy was 48.77% (for the network trained on the data from the P I α 3 controller, where the CNN History = 20 ), and the maximum 89.46% (for the network trained on the data from the P I α 3 controller, where the CNN History = 1000 ). Taking all the results into consideration, the best results were obtained for the CNN History 500 , and the worst for the CNN History < 100 (Table 4).
In the case of the model trained on data representing the behavior of three controllers simultaneously and the use of the Sigmoid activation function of the output layer, the maximum accuracy was 72.1% for the CNN History 500 (see Table 5).

5. Evaluation of the Neural Network-Based AQM

This section presents the behavior of the trained neural network (as assumed in Section 4 and evaluates its effectiveness as an AQM mechanism. This evaluation was performed using previously described simulation mechanisms. During the study, we evaluated the number of packets dropped from the queue and the average queue occupancy. We compared the effectiveness of the neural network-based AQM mechanism with the results of the P I α controller-based AQM mechanism. We used the network traffic with different degrees of self-similarity during the experiments.
To increase the readability of the paper, we present only two extreme cases - the results obtained for a non-self-similar traffic ( H = 0.5 ) and for a traffic with high degree of LRD ( H = 0.9 ).
The intensity of the packet source in the simulation was assumed to be ( l a m b d a = 0.5 ). On the other hand, the packet service time in a system was set to a constant value ( μ = 0.25 ) in order to obtain a heavily loaded system.
In our experiments, we evaluated four separate neural network models. The first three neural networks were trained with the data obtained from controllers P I α 1 , P I α 2 , and P I α 3 . The fourth model was trained with data regarding all of these controllers. In the first phase of the experiment, we considered two neural network models (see Figure 1): the first one with Softmax, and the second one with Sigmoid activation function of the last layer.
A comparison of Table 3 and Table 4 shows that although Softmax function is more commonly used in the literature as an activation function of the output layer of the neural network for multiclass classification, Sigmoid function performs better in our case. In the worst case, in which the network obtained accuracy of 32.31%, changing the activation function to Sigmoid resulted in significant accuracy increase (65.65%). Additionally, in the best obtained case accuracy changed from 58.90% to 86.65%. Figure 3 and Figure 4 show average queue lengths for AQM mechanism based on neural network. Detailed results are compared on Table 6 and Table 7 for Sigmoid function and on Table 8 and Table 9 for Softmax function. Both presented networks imitate the behavior of the first controller— P I α (see Table 1). Comparing the number of discarded packets and the average queue sizes, we find that they are similar regardless of the chosen network activation function in the last layer. As Hurst increases, the number of dropped packets decreases slightly in the case of Sigmoid function (<1%).
Taking into consideration higher accuracy obtained using Sigmoid function, we chose this function to be used in further experiments.
Figure 3 compares the behavior of two AQM mechanisms: P I α 1 controller and the CNN-based AQM trained on the data reflecting the behavior of this controller.
For the CNN model, different lengths of the last n elements of the queue occupancy history (input to the neural network) were considered. Regardless of the value of n, the resulting queue length distributions are similar to the queue length distribution of the P I α 1 controller. For Poisson traffic (non-self-similar traffic, H = 0.5 ), the average queue length oscillates between 166 and 176 packets (see Table 6). For highly self-similar traffic (parameter H = 0.9 ), the average queue length was between 139 and 147 (see Table 7). In this case, all the Convolutional Neural Network models (with different numbers of CNN History) obtained larger values of the average queue length, with fewer packets dropped, than the P I α 1 mechanism.
Figure 5 presents the results for stronger AQM mechanism P I α 2 . The detailed results of dropped packets numbers and queue lengths are presented in Table 10 and Table 11. Because of the fact that the P I α 2 controller was stronger than the one presented above, the obtained average queue lengths were smaller.
Figure 6 compares the last pair of controllers: controller P I α 3 , with the corresponding models based on Convolutional Neural Networks. The results prove that this controller is the strongest one. The AQM mechanism increased considerably the number of dropped packets and decreased the obtained queue lengths. In the case of traffic without LRD (see Table 12, for parameter H = 0.5 ) the average queue occupancy oscillateds between 116 and 139 packets, and in the case of traffic characterized by a high degree of LRD (see Table 13, for parameter H = 0.9 ) between 94 and 121 packets.
It should be noted that for all three CNN-based AQM models, a more efficient AQM model was obtained compared to the controllers that were used to create the test data. Even for the model that obtained the smallest accuracy during the learning process (48.77%, see Table 4), based on non-integer controller data of order P I α 3 , for CNN History < 100 , the obtained average queue length was larger than for the base mechanism P I α 3 . This situation occurred both for traffic without LRD (see Table 12) and for traffic characterized by a high degree of LRD (see Table 13).
In the next simulation step, we evaluated the AQM-CNN mechanism whose learning data were generated from the behavior of all three P I α controllers. Figure 7 shows the queue distribution, and Figure 8 shows the changes in queue occupancy over time. Details of the number of packets dropped and the resulting average queue occupancy are presented in Table 14 for the traffic without LRD and in Table 15, for traffic with a high degree of LRD.
The results show that when the number of last n elements of queue occupancy history taken as a CNN input is too small (CNN History < 100 ), then, independent of the degree of self-similarity of the traffic, the number of dropped packets, and the average queue length, approximates the results obtained using the sets of controllers P I α 2 and P I α 3 (see Table 10, Table 11, Table 12 and Table 13).
On the other hand, when the considered number of last n queue occupancy history elements is larger (CNN History 100 ), the obtained average queue length increases by 46 packets for traffic without LRD (Table 14, for H = 0.5 ), or by 32 packets, for traffic characterized by a high degree of LRD (see Table 15, for H = 0.9 ). This means that the resulting queue distribution matches the one of the original and the most efficient controller P I α 1 (Figure 3).
This feature indicates that for the AQM model based on Convolutional Networks, as the number of story elements used increases, the ability of the mechanism to adapt to current Internet transmission conditions also improves.

6. Conclusions

The paper presents a new Active Queue Management mechanism based on Convolutional Neural Networks and supervised learning.
To train the Convolutional Networks used in the experiments, data obtained through simulation have been used. The training data of the CNN model reflect the behavior of the AQM mechanism, based on a fractional order controller P I α .
In our experiments, we took into account the effect of the degree of traffic self-similarity and long-term dependence on the performance of the proposed mechanism.
We also considered the effect of the number of last n elements of the queue occupancy history, used as input of the neural network, on the efficiency of the proposed mechanism. The best results were obtained for CNN History = 500. The minimum length of CNN History for which results are still acceptable is 100.
In the experiments, neural networks with different number of convolutional layers and different optimizers and cost functions were considered to build the AQM model. After comparing the results obtained with different activation functions, the results have shown that the most efficient model used Sigmoid activation function in the output layer, therefore we chose this function for further experiments. The decisions made in this work were also influenced by our previous work regarding traffic classification in terms of the degree of self-similarity [25].
The most efficient AQM obtained in our study was based on the Convolutional Neural Network model, trained using the data reflecting the behavior of all three P I α controllers jointly.
The results confirmed that the model based on Convolutional Neural Networks can effectively reproduce the results of the classical AQM algorithm and effectively manage the data transmission. Such a model maintains the assumed average number of packets in the queue and reduces the total number of dropped packets, independent of the degree of traffic self-similarity.
It seems that the proposed mechanism exhibits some advantages over previously proposed mechanisms encountered in the literature. Our previous study [26] demonstrated that the reinforcement learning methods are well suited for maintaining the assumed queue size. However, in computer networks, the process of controlling packet traffic is more complex. The objective is to maximize the transmission efficiency. This efficiency is characterized by: throughput, delay, and possible retransmissions. Efficiency of AQM mechanisms is influenced by self-similarity of network traffic. The higher the Hurst parameter value is, the greater problems with correct packet management occur. The proposed solution addresses this problem much more effectively. The biggest disadvantage of this solution is greater computational and memory complexity of solutions based on Convolutional Neural Networks. This complexity may affect the difficulty of implementing this solution in real routers.
In our previous study [58], we used a Linux-based computer as a router. In that study, we used a special router implementation based on a special forwarding mechanism (based on the iptables mechanism), which delivered all packets to the user program implementing AQM. This solution greatly simplifies the research model. Unfortunately, the tests have shown that forwarding packets from kernel space to userspace requires a significant amount of time and is not optimal. In the target solutions the whole implementation should be realized in the kernel of the system. The implementation may be a great challenge on routers with low hardware resources. In such solutions instead of multiplication operations bit shifting is used, which causes calculation errors. For CNN calculations these errors may be too high. However, it seems that the computational power of routers will increase in the future. We want to devote a separate article to the problems of implementing AQMs in real routers.

Author Contributions

Conceptualization, J.S. and A.D.; methodology, J.S.; software, J.S.; investigation, A.D., J.S. and S.M.; validation, J.D., D.M.; project administration, J.S.; formal analysis, J.D. and K.F.; data curation, J.S. and D.M.; funding acquisition, J.S.; writing—original draft preparation, J.S., J.D., A.D. and K.F.; writing—review and editing, J.S., J.D.; visualization, J.S., D.M. and S.M.; supervision, A.D. All authors have read and agreed to the published version of the manuscript.

Funding

Publication supported by Own Schoolarship Fund of the Silesian University of Technology in year 2019/2020, grant number: 22/FSW18/0003-03/2019.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Index, C.V.N. Global Mobile Data Traffic Forecast Update, 2017–2022; White Paper; Cisco Press: Indianapolis, IN, USA, 2019. [Google Scholar]
  2. Lakshman, T.V.; Madhow, U. The performance of TCP/IP for networks with high bandwidth-delay products and random loss. IEEE/ACM Trans. Netw. 1997, 5, 336–350. [Google Scholar] [CrossRef]
  3. Hema, R.M.; Murugesan, G.; Jude, M.J.A.; Diniesh, V.C.; Sree Arthi, D.; Malini, S. Active queue versus passive queue—An experimental analysis on multi-hop wireless networks. In Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 5–7 January 2017; pp. 1–5. [Google Scholar] [CrossRef]
  4. Braden, B.; Clark, D.; Crowcroft, J.; Davie, B.; Deering, S.; Estrin, D.; Floyd, S.; Jacobson, V.; Minshall, G.; Partridge, C.; et al. Recommendations on Queue Management and Congestion Avoidance in the Internet. RFC 1998, 2309, 1–17. [Google Scholar]
  5. Wu, H.; Feng, Z.; Guo, C.; Zhang, Y. ICTCP: Incast Congestion Control for TCP in Data-Center Networks. IEEE/ACM Trans. Netw. 2013, 21, 345–358. [Google Scholar] [CrossRef]
  6. Floyd, S.; Jacobson, V. Random Early Detection gateways for congestion avoidance. IEEE/ACM Trans. Netw. 1993, 1, 397–413. [Google Scholar] [CrossRef]
  7. Xue, L. Simulation of Network Congestion Control Based on RED Technology. In Proceedings of the 2013 International Conference on Computational and Information Sciences, Shiyan, Hubai, China, 21–23 June 2013; pp. 1497–1500. [Google Scholar]
  8. Bhatnagar, S.; Patro, R. A proof of convergence of the B-RED and P-RED algorithms for random early detection. IEEE Commun. Lett. 2009, 13, 809–811. [Google Scholar] [CrossRef]
  9. Ho, H.J.; Lin, W.M. AURED—Autonomous Random Early Detection for TCP Congestion Control. In Proceedings of the 3rd International Conference on Systems and Networks Communications Malta, Sliema, Malta, 26–31 October 2008. [Google Scholar]
  10. Domańska, J.; Augustyn, D.; Domański, A. The choice of optimal 3-rd order polynomial packet dropping function for NLRED in the presence of self-similar traffic. Bull. Pol. Acad. Sci. Tech. Sci. 2012, 60, 779–786. [Google Scholar] [CrossRef]
  11. Kachhad, K.; Lathigara, A. ModRED: Modified RED an Efficient Congestion Control Algorithm for Wireless Network. Int. Res. J. Eng. Technol. (IRJET) 2018, 5, 1879–1884. [Google Scholar]
  12. Hamdi, M.M.; Rashid, S.A.; Ismail, M.; Altahrawi, M.A.; Mansor, M.F.; AbuFoul, M.K. Performance Evaluation of Active Queue Management Algorithms in Large Network. In Proceedings of the 2018 IEEE 4th International Symposium on Telecommunication Technologies (ISTT), Selangor, Malaysia, 26–28 November 2018; pp. 1–6. [Google Scholar] [CrossRef]
  13. Liu, Z.; Sun, J.; Hu, S.; Hu, X. An Adaptive AQM Algorithm Based on a Novel Information Compression Model. IEEE Access 2018, 6, 31180–31190. [Google Scholar] [CrossRef]
  14. Tan, L.; Zhang, W.; Peng, G.; Chen, G. Stability of TCP/RED systems in AQM routers. IEEE Trans. Autom. Control 2006, 51, 1393–1398. [Google Scholar] [CrossRef]
  15. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J.; Marek, D.; Szyguła, J. The Influence of the Traffic Self-similarity on the Choice of the Non-integer Order PIα Controller Parameters. In Communications in Computer and Information Science; Springer International Publishing: Berlin/Heidelberg, Germany, 2018; Volume 935, pp. 76–83. [Google Scholar] [CrossRef]
  16. Melchor-Aquilar, D.; Castillo-Tores, V. Stability Analysis of Proportional-Integral AQM Controllers Supporting TCP Flows. Comput. Sist. 2007, 10, 401–414. [Google Scholar] [CrossRef]
  17. Ustebay, D.; Ozbay, H. Switching Resilient PI Controllers for Active Queue Management of TCP Flows. In Proceedings of the 2007 IEEE International Conference on Networking, Sensing and Control, London, UK, 15–17 April 2007; pp. 574–578. [Google Scholar] [CrossRef]
  18. Melchor-Aquilar, D.; Niculescu, S. Computing non-fragile PI controllers for delay models of TCP/AQM networks. Int. J. Control. 2009, 82, 2249–2259. [Google Scholar] [CrossRef]
  19. Grazia, C.A.; Patriciello, N.; Klapez, M.; Casoni, M. Which AQM fits IoT better? In Proceedings of the IEEE 3rd International Forum on Research and Technologies for Society and Industry (RTSI), Modena, Italy, 11–13 September 2017; pp. 1–6. [Google Scholar] [CrossRef]
  20. Krajewski, W.; Viaro, U. On robust fractional order PI controller for TCP packet flow. In Proceedings of the BOS Conference: Systems and Operational Research, Warsaw, Poland, 24–26 September 2014. [Google Scholar]
  21. Marek, D.; Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Szyguła, J. Combined diffusion approximation–simulation model of AQM’s transient behavior. Comput. Commun. 2021, 166, 40–48. [Google Scholar] [CrossRef]
  22. Chollet, F. Deep Learning with Python; Manning: Berkeley, CA, USA, 2017. [Google Scholar]
  23. Chen, J.; Chen, W.; Huang, C.; Huang, S.; Chen, A. Financial Time-Series Data Analysis Using Deep Convolutional Neural Networks. In Proceedings of the 7th International Conference on Cloud Computing and Big Data (CCBD), Macau, China, 16–18 November 2016; pp. 87–92. [Google Scholar] [CrossRef]
  24. Jia, W.; Liu, Y.; Liu, Y.; Wang, J. Detection Mechanism Against DDoS Attacks based on Convolutional Neural Network in SINET. In Proceedings of the IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing China, 12–14 June 2020; Volume 1, pp. 1144–1148. [Google Scholar] [CrossRef]
  25. Filus, K.; Domański, A.; Domańska, J.; Marek, D.; Szyguła, J. Long-Range Dependent Traffic Classification with Convolutional Neural Networks Based on Hurst Exponent Analysis. Entropy 2020, 22, 1159. [Google Scholar] [CrossRef] [PubMed]
  26. Szyguła, J.; Domański, A.; Domańska, J.; Czachórski, T.; Marek, D.; Klamka, J. AQM Mechanism with Neuron Tuning Parameters. In Intelligent Information and Database Systems; Springer International Publishing: Berlin/Heidelberg, Germany, 2020; pp. 299–311. [Google Scholar]
  27. Sun, J.; Zukerman, M. An Adaptive Neuron AQM for a Stable Internet. In NETWORKING. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet; Springer: Berlin/Heidelberg, Germany, 2007; Volume 4479, pp. 844–854. [Google Scholar] [CrossRef] [Green Version]
  28. Busoniu, L.; Babuska, R.; De Schutter, B. A Comprehensive Survey of Multiagent Reinforcement Learning. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2008, 38, 156–172. [Google Scholar] [CrossRef] [Green Version]
  29. Hamadneh, N.; Obiedat, M.; Qawasmeh, A.; Bsoul, M. HRED, An Active Queue Management Approach For The NS2 Simulator. Recent Patents Comput. Sci. 2018, 12. [Google Scholar] [CrossRef]
  30. Krajewski, W.; Viaro, U. Fractional order PI controllers for TCP packet flow ensuring given modulus margins. Control Cybern. 2014, 43, 493–505. [Google Scholar]
  31. Domanski, A.; Domanska, J.; Czachórski, T.; Klamka, J. The use of a non-integer order PI controller with an active queue management mechanism. Int. J. Appl. Math. Comput. Sci. 2016, 26, 777–789. [Google Scholar] [CrossRef] [Green Version]
  32. Su, Y.; Huang, L.; Feng, C. QRED: A Q-Learning-based active queue management scheme. J. Internet Technol. 2018, 19, 1169–1178. [Google Scholar] [CrossRef]
  33. Bisoy, S.K.; Pandey, P.K.; Pati, B. Design of an active queue management technique based on neural networks for congestion control. In Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, Odisha, India, 17–20 December 2017; pp. 1–6. [Google Scholar]
  34. Wang, H.; Chen, J.; Liao, C.; Tian, Z. An Artificial Intelligence Approach to Price Design for Improving AQM Performance. In Proceedings of the 2011 IEEE Global Telecommunications Conference—GLOBECOM 2011, Houston, TX, USA, 5–9 December 2011; pp. 1–5. [Google Scholar]
  35. Xiao, P.; Tian, Y. Design of a Robust Active Queue Management Algorithm Based on Adaptive Neuron Pid. In Proceedings of the 2006 International Conference on Machine Learning and Cybernetics, Dalian, China, 13–16 August 2006; pp. 308–313. [Google Scholar]
  36. Meng, Z.; Qiao, J.; Zhang, L. Design and Implementation: Adaptive Active Queue Management Algorithm Based on Neural Network. In Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, Yunnan, China, 15–16 November 2014; pp. 104–108. [Google Scholar] [CrossRef]
  37. Hu, M.; Mukaidani, H. Nonlinear Model Predictive Congestion Control Based on LSTM for Active Queue Management in TCP Network. In Proceedings of the 12th Asian Control Conference (ASCC), Kitakyushu-shi, Japan, 9–12 June 2019; pp. 710–715. [Google Scholar]
  38. Gomez, C.A.; Wang, X.; Shami, A. Intelligent Active Queue Management Using Explicit Congestion Notification. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  39. Bisoy, S.K.; Pattnaik, P.K. An AQM Controller Based on Feed-Forward Neural Networks for Stable Internet. Arab. J. Sci. Eng. 2018, 3993–4004. [Google Scholar] [CrossRef]
  40. Zhou, C.; Di, D.; Chen, Q.; Guo, J. An Adaptive AQM Algorithm Based on Neuron Reinforcement Learning. In Proceedings of the IEEE International Conference on Control and Automation, Christchurch, New Zealand, 9–11 December 2009; pp. 1342–1346. [Google Scholar]
  41. Jin, W.; Gu, R.; Ji, Y.; Dong, T.; Yin, J.; Liu, Z. Dynamic traffic aware active queue management using deep reinforcement learning. Electron. Lett. 2019, 55. [Google Scholar] [CrossRef]
  42. Domańska, J.; Domański, A.; Czachórski, T. Estimating the Intensity of Long-Range Dependence in Real and Synthetic Traffic Traces. In Computer Networks; Springer International Publishing: Berlin/Heidelberg, Germany, 2015; Volume 522, pp. 11–22. [Google Scholar] [CrossRef]
  43. Willinger, W.; Leland, W.; Taqqu, M. On the self-similar nature of traffic. IEEE/ACM Trans. Netw. 1994. [Google Scholar] [CrossRef] [Green Version]
  44. Paxson, V.; Floyd, S. Wide area traffic: The failure of Poisson modeling. IEEE/ACM Trans. Netw. 1995, 3, 226–244. [Google Scholar] [CrossRef] [Green Version]
  45. Feldmann, A.; Gilbert, A.C.; Willinger, W.; Kurtz, T.G. The Changing Nature of Network Traffic: Scaling Phenomena. SIGCOMM Comput. Commun. Rev. 1998, 28, 5–29. [Google Scholar] [CrossRef]
  46. Li, Z.; Xing, W.; Khamaiseh, S.; Xu, D. Detecting saturation attacks based on self-similarity of OpenFlow traffic. IEEE Trans. Netw. Serv. Manag. 2019, 17, 607–621. [Google Scholar] [CrossRef]
  47. Willinger, W.; Taqqu, M.S.; Wilson, D.V. Lessons from “On the Self-Similar Nature of Ethernet Traffic”. SIGCOMM Comput. Commun. Rev. 2019, 49, 56–62. [Google Scholar] [CrossRef]
  48. Yin, C.; Zhu, Y.; Fei, J.; He, X. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 2017, 5, 21954–21961. [Google Scholar] [CrossRef]
  49. Kravchik, M.; Shabtai, A. Efficient cyber attack detection in industrial control systems using lightweight neural networks and pca. IEEE Trans. Dependable Secur. Comput. 2021. [Google Scholar] [CrossRef]
  50. Jiang, F.; Fu, Y.; Gupta, B.B.; Liang, Y.; Rho, S.; Lou, F.; Meng, F.; Tian, Z. Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans. Sustain. Comput. 2018, 5, 204–212. [Google Scholar] [CrossRef]
  51. Ring, M.; Schlör, D.; Landes, D.; Hotho, A. Flow-based network traffic generation using generative adversarial networks. Comput. Secur. 2019, 82, 156–172. [Google Scholar] [CrossRef] [Green Version]
  52. D’Angelo, G.; Palmieri, F. Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction. J. Netw. Comput. Appl. 2021, 173, 102890. [Google Scholar] [CrossRef]
  53. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [Google Scholar] [CrossRef] [Green Version]
  54. Li, J.; Liu, C.; Gong, Y. Layer trajectory LSTM. arXiv 2018. arXiv:1808.09522. [Google Scholar]
  55. Fu, R.; Zhang, Z.; Li, L. Using LSTM and GRU neural network methods for traffic flow prediction. In Proceedings of the 2016 31st Youth Academic Annual Conference of Chinese Association of Automation (YAC), Wuhan, China, 11–13 November 2016; IEEE: Red Hook, NY, USA, 2016; pp. 324–328. [Google Scholar] [CrossRef]
  56. Zhou, B.; Lapedriza, A.; Khosla, A.; Oliva, A.; Torralba, A. Places: A 10 Million Image Database for Scene Recognition. IEEE Trans. Pattern Anal. Mach. Intell. 2018, 40, 1452–1464. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  57. Optimisation Algorithm—Adaptive Moment Estimation(Adam). Available online: https://towardsdatascience.com/optimisation-algorithm-adaptive-moment-estimation-adam-92144d75e232 (accessed on 12 June 2021).
  58. Domańska, J.; Domański, A. AQM in Linux based routers—Comparing with analytical and simulation results. In Proceedings of the 5th International Conference: Internet in the Information Society, Theoretical and Applied Informatics, Heraklion, Greece, 22–24 July 2008; Volume 20, pp. 277–292. [Google Scholar]
Figure 1. The conceptual structure of a Convolutional Neural Network based classifier used to model an Active Queue Management mechanism.
Figure 1. The conceptual structure of a Convolutional Neural Network based classifier used to model an Active Queue Management mechanism.
Sensors 21 04979 g001
Figure 2. Training data preprocessing process.
Figure 2. Training data preprocessing process.
Sensors 21 04979 g002
Figure 3. Distribution of queue length obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 , H = 0.5 (left), H = 0.9 (right).
Figure 3. Distribution of queue length obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 , H = 0.5 (left), H = 0.9 (right).
Sensors 21 04979 g003
Figure 4. Distribution of queue length obtained for CNN model with the last layer activation function Softmax, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 , H = 0.5 (left), H = 0.9 (right).
Figure 4. Distribution of queue length obtained for CNN model with the last layer activation function Softmax, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 , H = 0.5 (left), H = 0.9 (right).
Sensors 21 04979 g004
Figure 5. Distribution of queue length obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 2 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.5 , H = 0.5 (left), H = 0.9 (right).
Figure 5. Distribution of queue length obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 2 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.5 , H = 0.5 (left), H = 0.9 (right).
Sensors 21 04979 g005
Figure 6. Distribution of queue length obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 3 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.6 , H = 0.5 (left), H = 0.9 (right).
Figure 6. Distribution of queue length obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 3 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.6 , H = 0.5 (left), H = 0.9 (right).
Sensors 21 04979 g006
Figure 7. Distribution of queue length obtained for CNN controller trained using data regarding three P I α controllers, H = 0.5 (left), H = 0.9 (right).
Figure 7. Distribution of queue length obtained for CNN controller trained using data regarding three P I α controllers, H = 0.5 (left), H = 0.9 (right).
Sensors 21 04979 g007
Figure 8. Queue occupancy obtained for CNN controller trained using data regarding three P I α controllers, with CNN History = 500 , H = 0.5 (left), H = 0.9 (right).
Figure 8. Queue occupancy obtained for CNN controller trained using data regarding three P I α controllers, with CNN History = 500 , H = 0.5 (left), H = 0.9 (right).
Sensors 21 04979 g008
Table 1. The P I α controller parameters.
Table 1. The P I α controller parameters.
K P K I α
P I α 1 0.00010.0004−0.4
P I α 2 0.00010.0004−0.5
P I α 3 0.00010.0004−0.6
Table 2. Decision class labels representing ranges of probabilities of packet being dropped.
Table 2. Decision class labels representing ranges of probabilities of packet being dropped.
Decision ClassProbability Interval [%]
1[0;5)
2[5;15)
3[15;25)
4[25;35)
5[35;45)
6[45;55)
7[55;65)
8[65;75)
9[75;85)
10[85;95)
11[95;100]
Table 3. The accuracy measurements for testing the CNN model trained on data regarding three P I α 1 , P I α 2 and P I α 3 controllers, n last items in queue occupancy history taken into consideration (we used Softmax function as an activation function of the last layer).
Table 3. The accuracy measurements for testing the CNN model trained on data regarding three P I α 1 , P I α 2 and P I α 3 controllers, n last items in queue occupancy history taken into consideration (we used Softmax function as an activation function of the last layer).
Softmax
n History Length
201002003004005001000
CNN by behavior PI α 1 5 epochs52.2754.4854.5056.6758.4058.8151.59
6 epochs52.3654.8854.6856.7058.4258.8451.72
10 epochs52.4055.5054.8356.7458.4758.9051.82
CNN by behavior PI α 2 5 epochs48.3747.2340.2941.9943.6844.0643.94
6 epochs48.4547.6140.3242.0643.7444.0644.00
10 epochs48.5448.4240.3142.3043.7844.2444.04
CNN by behavior PI α 3 5 epochs47.0741.8333.8032.3032.9233.7938.45
6 epochs47.1842.0933.8132.3132.9333.8238.44
10 epochs47.4142.6234.1832.3232.9233.8338.50
Table 4. The accuracy measurements for test data for a neural network model trained with data representing the behavior of P I α 1 , P I α 2 and P I α 3 controllers, n last items in queue occupancy history taken into consideration (we used Sigmoid function as an activation function of the last layer).
Table 4. The accuracy measurements for test data for a neural network model trained with data representing the behavior of P I α 1 , P I α 2 and P I α 3 controllers, n last items in queue occupancy history taken into consideration (we used Sigmoid function as an activation function of the last layer).
Sigmoid
n Last Items in Queue Occupancy History
201002003004005001000
CNN by behavior PI α 1 5 epochs55.9873.9580.7683.6785.2286.1588.46
6 epochs56.0474.0680.8883.8085.3986.3188.74
10 epochs56.1674.3881.1984.1385.6986.6489.46
CNN by behavior PI α 2 5 epochs50.3470.7075.9476.9277.0377.2083.71
6 epochs50.3870.8376.0877.0677.1877.3284.04
10 epochs50.5371.1376.4077.3677.5777.7984.81
CNN by behavior PI α 3 5 epochs48.7767.1667.5465.6564.3964.0477.46
6 epochs48.8267.2967.7065.8364.5764.2477.76
10 epochs49.0667.6068.0366.2364.9964.6878.68
Table 5. The accuracy measurements for test data for a neural network model trained with data representing the behavior of three controllers simultaneously, given n recent queue occupancy history elements.
Table 5. The accuracy measurements for test data for a neural network model trained with data representing the behavior of three controllers simultaneously, given n recent queue occupancy history elements.
Sigmoid
n Last Items in Queue Occupancy History
201002003004005001000
CNN by behavior 3 PI α 5 epochs49.5267.0368.5568.4868.4068.4270.98
6 epochs49.5867.1267.7068.6568.6068.6171.30
10 epochs49.7467.3468.9969.0369.1569.2172.10
Table 6. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 and H = 0.5 .
Table 6. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 and H = 0.5 .
AQMPacket DroppedAverage Queue Length
P I α 1 249,878168.98
CNN History = 20251,198172.97
CNN History = 100248,936176.45
CNN History = 200250,063175.69
CNN History = 300249,510166.87
CNN History = 400250,104166.23
CNN History = 500250,800174.31
CNN History = 1000249,561173.33
Table 7. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 and H = 0.9 .
Table 7. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 and H = 0.9 .
AQMPacket DroppedAverage Queue Length
P I α 1 263,387139.16
CNN History = 20261,678145.66
CNN History = 100262,304145.81
CNN History = 200262,518147.22
CNN History = 300262,935139.28
CNN History = 400263,872140.89
CNN History = 500263,440142.22
CNN History = 1000263,654143.14
Table 8. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Softmax, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 and H = 0.5 .
Table 8. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Softmax, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 and H = 0.5 .
AQMPacket DroppedAverage Queue Length
P I α 1 249,878168.98
CNN History = 100250,038182.21
CNN History = 300250,455164.06
CNN History = 500250,017174.73
Table 9. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Softmax, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 and H = 0.9 .
Table 9. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Softmax, trained using data regarding P I α 1 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.4 and H = 0.9 .
AQMPacket DroppedAverage Queue Length
P I α 1 263,387139.16
CNN History = 100261,271148.89
CNN History = 300263,609134.64
CNN History = 500264,569145.64
Table 10. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 2 controller parameters: K P = 0.0001 , K I = 0.0004 , α = 0.5 and H = 0.5 .
Table 10. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 2 controller parameters: K P = 0.0001 , K I = 0.0004 , α = 0.5 and H = 0.5 .
AQMPacket DroppedAverage Queue Length
P I α 2 250,314134.72
CNN History = 20249,610135.27
CNN History = 100250,657140.37
CNN History = 200249,633137.95
CNN History = 300249,752142.29
CNN History = 400248,852134.86
CNN History = 500249,960138.85
CNN History = 1000249,744129.60
Table 11. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 2 controller parameters: K P = 0.0001 , K I = 0.0004 , α = 0.5 and H = 0.9 .
Table 11. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 2 controller parameters: K P = 0.0001 , K I = 0.0004 , α = 0.5 and H = 0.9 .
AQMPacket DroppedAverage Queue Length
P I α 2 264,819109.37
CNN History = 20263,014117.57
CNN History = 100264,135112.98
CNN History = 200264,217115.69
CNN History = 300264,668116.24
CNN History = 400265,538110.05
CNN History = 500264,533112.47
CNN History = 1000265,839105.25
Table 12. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 3 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.6 and H = 0.5 .
Table 12. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 3 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.6 and H = 0.5 .
AQMPacket DroppedAverage Queue Length
P I α 3 250,840117.53
CNN History = 20251,892139.26
CNN History = 100250,362136.35
CNN History = 200248,878117.67
CNN History = 300250,533116.40
CNN History = 400250,011118.85
CNN History = 500250,166118.67
CNN History = 1000249,801118.20
Table 13. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 3 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.6 and H = 0.9 .
Table 13. Detailed results of queue occupancy obtained for CNN model with the last layer activation function Sigmoid, trained using data regarding P I α 3 controller and parameters: K P = 0.0001 , K I = 0.0004 , α = 0.6 and H = 0.9 .
AQMPacket DroppedAverage Queue Length
P I α 3 265,70795.13
CNN History = 20265,737121.19
CNN History = 100263,952110.79
CNN History = 200265,38397.28
CNN History = 300266,29594.09
CNN History = 400266,36695.79
CNN History = 500265,59297.31
CNN History = 1000266,18496.90
Table 14. Detailed results of queue occupancy results obtained for CNN model trained using data regarding three P I α controllers and H = 0.5 .
Table 14. Detailed results of queue occupancy results obtained for CNN model trained using data regarding three P I α controllers and H = 0.5 .
AQMPacket DroppedAverage Queue Length
CNN 3 History = 20249,727128.75
CNN 3 History = 100249,988174.64
CNN 3 History = 200250,583164.87
CNN 3 History = 300249,907169.98
CNN 3 History = 400249,593173.41
CNN 3 History = 500250,157138.08
CNN 3 History = 1000249,334170.46
Table 15. Detailed results of queue occupancy results obtained for CNN model trained using data regarding three P I α controllers and H = 0.9 .
Table 15. Detailed results of queue occupancy results obtained for CNN model trained using data regarding three P I α controllers and H = 0.9 .
AQMPacket DroppedAverage Queue Length
CNN 3 History = 20262,841120.94
CNN 3 History = 100263,859152.15
CNN 3 History = 200262,298137.21
CNN 3 History = 300263,205131.49
CNN 3 History = 400263,818129.81
CNN 3 History = 500263,872127.37
CNN 3 History = 1000263,554138.32
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Szyguła, J.; Domański, A.; Domańska, J.; Marek, D.; Filus, K.; Mendla, S. Supervised Learning of Neural Networks for Active Queue Management in the Internet. Sensors 2021, 21, 4979. https://doi.org/10.3390/s21154979

AMA Style

Szyguła J, Domański A, Domańska J, Marek D, Filus K, Mendla S. Supervised Learning of Neural Networks for Active Queue Management in the Internet. Sensors. 2021; 21(15):4979. https://doi.org/10.3390/s21154979

Chicago/Turabian Style

Szyguła, Jakub, Adam Domański, Joanna Domańska, Dariusz Marek, Katarzyna Filus, and Szymon Mendla. 2021. "Supervised Learning of Neural Networks for Active Queue Management in the Internet" Sensors 21, no. 15: 4979. https://doi.org/10.3390/s21154979

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop