2021
DOI: 10.1007/s10922-021-09627-3
|View full text |Cite
|
Sign up to set email alerts
|

Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 49 publications
0
5
0
Order By: Relevance
“…When h p t+1 > 0, the size of the local data required to be uploaded to the cloud platform by the access node at the next moment may be set as (10). (10) When h p t+1 ≤ 0, the size of local data required to be uploaded to the cloud platform by the access node at the next moment may be set as k p t+1 = 0.…”
Section: B Traffic Prediction Based On Edge Cloud Collaboration With ...mentioning
confidence: 99%
See 2 more Smart Citations
“…When h p t+1 > 0, the size of the local data required to be uploaded to the cloud platform by the access node at the next moment may be set as (10). (10) When h p t+1 ≤ 0, the size of local data required to be uploaded to the cloud platform by the access node at the next moment may be set as k p t+1 = 0.…”
Section: B Traffic Prediction Based On Edge Cloud Collaboration With ...mentioning
confidence: 99%
“…When h p t+1 > 0, the size of the local data required to be uploaded to the cloud platform by the access node at the next moment may be set as (10). (10) When h p t+1 ≤ 0, the size of local data required to be uploaded to the cloud platform by the access node at the next moment may be set as k p t+1 = 0. In this case, the parameter issuing module may further send alarm information to the access node p and establish a standby link, so as to divert the traffic accessing the node p to other access nodes as much as possible.…”
Section: B Traffic Prediction Based On Edge Cloud Collaboration With ...mentioning
confidence: 99%
See 1 more Smart Citation
“…The second occurs when an OpenFlow request has been created, containing an ID with information stored in the packet header. Thus, packets can collide with another bound interface, causing the blocking of services [9].…”
Section: Potential Attacks In the Sdnmentioning
confidence: 99%
“…The switch employs the OpenFlow [13] protocol to gather connection information across the network to regulate the arriving flows. As the growing technology to address the limits of 5G networks [14], the integration of 5G with SDN [15] is being observed. SDN [16] is a new network design that is often regarded as the primary answer to a variety of problems in older networks.…”
Section: Introductionmentioning
confidence: 99%