<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development and Research of an Adaptive Tra c Routing Algorithm Based on a Neural Network Approach for a Cloud System Oriented on Processing Big Data?</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Orenburg State University</institution>
          ,
          <addr-line>Orenburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>98</fpage>
      <lpage>111</lpage>
      <abstract>
        <p>Today, to create modern systems designed to process Big Data in real time, it is necessary to develop scalable solutions based on the adaptive computing infrastructure, capable of providing prompt and e cient service of incoming requests, as well as storing information obtained from many sources. A signi cant di erence in the paradigm of working with Big data is the lack of a clear data storage structure, as well as the heterogeneity of information, ows coming from di erent sources with high intensity and in large volumes. The scienti c problem, the solution of which is the present study, is to increase the e ciency of routing using modern virtualization technologies and machine learning methods for managing information ows. Solving this problem will allow implementing a data analysis system that can adapt to changes in information ows of high intensity due to self-organization of computing resources, self-learning, algorithmic solutions based on arti cial intelligence.</p>
      </abstract>
      <kwd-group>
        <kwd>Virtual network function</kwd>
        <kwd>Big Data</kwd>
        <kwd>Software-de ned network</kwd>
        <kwd>Cloud computing</kwd>
        <kwd>Neural network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>In recent years, the amount of data that needs to be processed and analyzed
grows exponentially. Modern technologies used for data processing require the
storage of Big Data. For example, for the application of methods of machine
learning or neural networks, it is necessary to ensure the storage of reference
samples. Thus, a lot of data that were previously considered useless, not stored
for long and not processed in automated order now have a high value. Searching
for hidden patterns, trends, emissions, automatic analysis of correlations with
data from completely di erent formats and origin helps solve many problems
in more simple and quick ways. But the amount of data supplied for analysis,
even by a small set of sensors or a server, can be calculated in terabytes per day.
Most companies do not have the resources either for real-time analysis or for
their long-term storage. One of the possible solutions to overcome this problem
is the use of cloud computing technologies.</p>
      <p>
        As a rule, cloud systems are located on the basis of data centers. Such data
centers have signi cant amounts of computing, network and software resources,
allowing to scale cloud solutions for processing Big data [
        <xref ref-type="bibr" rid="ref1 ref14">1, 14</xref>
        ].
      </p>
      <p>Basically, large providers use ready-made solutions for deploying a software
and hardware platform for cloud computing. The most popular are the systems
for managing cloud resources OpenNebula, OpenStack, CloudStack, Doku, etc.
However, existing solutions for the deployment of cloud systems are universal.
This does not allow to take into account a number of features of working with
large data. The key disadvantages of cloud systems when working with Big Data
are:</p>
      <p>- the lack of the possibility of parallelizing the operation of the network
(alternative routing and switching of communication channels);
- a large amount of consumed memory and calculations for one analysis cycle.</p>
      <p>These shortcomings do not allow e cient processing of Big data by
specialized services deployed on the basis of an arbitrarily chosen cloud computing
infrastructure.</p>
      <p>
        To solve these problems, providers provide users with ready-made sets of
cloud services in BigData-as-a-Service format. As a rule, BigData-as-a-Service
includes a Hadoop / Spark cluster with storage on HDFS / Hive / Gluster, as
well as NoSQL-services like Redis / MongoDB. However, as the practice of
using such services shows, end-users use the service not only to calculate statistics
or retrieve data. BigData-as-a-Service is often used to build models aimed at
predicting data changes or their automatic classi cation. Such algorithms are
di cult to implement on the Hadoop platform. This is due to the fact that the
execution time of the model in Hadoop can be comparable with the usual
processing on one computing node. Processing data in the cycles Map and Reduce
each time initiates access to the le system. Spark also uses a full mesh network
architecture and pre-build RDD tables that require additional samples [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Such
features do not allow creating e ective hybrid structures from private and
public components. In most cases, the customers of the BigData-as-a-Service service
already have everything they need in the internal storage and does not have the
desire or the ability to upload them to the cloud for analysis each time.
      </p>
      <p>On the other hand, even large servers with more than 60 cores and terabytes
of RAM cannot accommodate the entire amount of data required for processing.
For these purposes, as a rule, cluster storage technologies are used. However,
this approach is not always applicable to existing methods of analysis and
processing of large data (for example, for neural network applications). Distributed
execution of neural networks involves great di culties in synchronizing the
layers when the layer is divided into sections. Intermediate storage should have
a special logic of work, high performance, as well as a small delay in terms of
communication over the network.</p>
      <p>To solve the identi ed problems, this study proposes the use of approaches
that optimize the network infrastructure for the intensive tra c ows that arise
during the analysis and processing of Big data. The solution of this task is
based on the principles of self-management and virtualization of the resources
of the heterogeneous infrastructure of the data center. The proposed solution is
based on the hybrid application of software-con gurable components for adaptive
routing of data streams, using the functionality of two breakthrough technologies
software-de ned network (SDN) and virtual network functions (VNF).</p>
      <p>
        Today, SDN is the most popular and e ective approach to the
organization of the network for the provision of services on the basis of data centers.
The use of this technology is due to a number of advantages. First of all, SDN
greatly simpli es the design and operation of the network, since it allows
centralized intelligent control at the controller level. Secondly, SDN allows network
administrators to quickly con gure and optimize network resources based on an
aggregated set of data collected in a single location. Thirdly, the use of SDN
allows providing protection by dynamically analyzing data ows circulating in a
virtual data center [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Another technology which used to organize a network based on virtual data
centers is the technology of network function virtualization (NFV). Technology
NFV o ers a new way of designing, deploying network services based on the
cloud systems. Virtualization of network functions allows separating network
functions, such as NAT, Routers, and Switches from the hardware level [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In
addition, it allows you to consolidate all the network components necessary to
support virtualized infrastructure at the software level. In addition, it allows
you to consolidate all the network components necessary to support virtualized
infrastructure at the software level.
      </p>
      <p>The problem of organizing adaptive routing for Big data ows can be solved
by formalizing an optimization task to maximize the satisfaction of QoS
requirements. The scienti c novelty of the task is that at the moment there are
no e ective algorithmic solutions for automatically providing adaptive routing
within the allocated network resources for processing Big data.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Problem Formulation</title>
      <p>As part of this study, an approach combining adaptive routing in processing Big
data ows and providing QoS (including minimum guaranteed throughput and
maximum guaranteed delay) is proposed.</p>
      <p>Let G (t) = (V; E), be an oriented multigraph describing the current topology
of the virtual network at some time t. The set of its vertices V is the union of
the set of nodes representing the set V = (vN ode; N F V; vStg), where vN ode
virtual computing nodes that process Big data, N F V - virtual network devices
(switches, routers, etc.), as well as vStg - virtual data stores in which the data
for analysis are directly placed.</p>
      <p>Each arc e 2 E, corresponds to some network connection between the vertices
Start (e) 2 V and Stop (e) 2 V . There can be several parallel arcs between the
two vertices, for example, parallel connections between routers. This provides a
variety of alternative routes for data transmission and QoS parameters.</p>
      <p>On the set of arcs E two functions are given:
1.Lspeed : E ! R+ [ f0g - a mapping characterizing the current capacity of
each arc at time t.</p>
      <p>2.Ldelay : E ! R+ [ f0g - The maximum guaranteed delay.</p>
      <p>Then each service working in the cloud system and dealing with large data
processing has its own mechanism for organizing the communication interaction
of tra c ows, which can be represented as the next oriented graph
G0 = (V 0; L)
(1)
where V 0 - a set of virtual nodes on which the components of a service that
processes Big data are deployed, L - arcs pointing to data ows between virtual
computing nodes, network devices, and a storage system.</p>
      <p>To ensure the quality of service in the cloud network, the tasks on the set of
arcs L are three functions:</p>
      <p>1.lsmpiened : L ! R+ [ f0g - The minimum guaranteed throughput of data ows
corresponding to this arc.</p>
      <p>2.ldmealaxy : L ! R+ [ f0g - The maximum guaranteed delay.</p>
      <p>3.ldaevlgay : L ! R+ [ f0g - estimate the average delay that occurs when
processing data ow packets on ports of network devices.</p>
      <p>Then the QoS routing and provisioning algorithm must construct a function
: L ! P ath (G (t)) such that each data ow l 2 L, is associated with its
transmission path r leading from the vertex Start (l) to Stop (l). Here, as P ath (G (t)),
the set of routes between any pairs of vertices in the graph of topology G (t),
which is actual at time t, is indicated. The function can be described as a
vector R = r1; : : : ; rjLj , where ri = (li) is the route for the data ows.</p>
      <p>Also, we introduce an additional notation, let : E ! 2l be a function that
maps each network connection e 2 E to a set of data ows l 2 L for which the
corresponding routes pass through e, that is, (e) = fl 2 Ljr = &amp;e 2 rg.</p>
      <p>Obviously, the vector R must contain routes that satisfy the following QoS
constraints:</p>
      <p>1. The bandwidth of each route ri, taking into account the e ect of other
data ows, should not be less than the guaranteed throughput for the ows
8
&gt;
&gt;
li : 8ri me2irni X &lt;Lspeed
e2ri &gt;&gt;:</p>
      <p>X lsmpiened (l)
l2 fl(ieg)
&gt;
&gt;
;
lsmpiened (li)</p>
      <p>2. The total delay of each route ri, taking into account the in uence of other
data ows, should not be greater than the guaranteed delay for the ow
li : 8ri
8
&gt;
X &gt;&lt;ldaevlgay (e) +
2. ri must start at the vertex corresponding to the beginning of arc li and
end in the vertex corresponding to the end of li, i.e.:</p>
      <p>8ri; Start (ei;1) = Start (li) &amp;Stop (ei;ni ) = Stop (li) :
3. ri must not pass several times through the same vertex, i.e.:</p>
      <p>8ri8j; k = 1; nj ; j 6= k ) Start (ei;j ) 6= Stop (ei;k) :</p>
      <p>Thus, for e ective organization of adaptive tra c routing when processing
Big data ows, it is necessary to solve two tasks:</p>
      <p>- automate the construction of rules for routing tra c, based on data based
on data on the current state of the network and the services that are running
and the processes running in them;</p>
      <p>- optimize the rules for routing tra c to ensure the quality of service in the
virtual network.</p>
      <p>To solve the rst task, it is necessary to perform classi cations of network
tra c passing through the corporate network. To solve the second problem, we
use the iterative method, in which we distinguish two main stages. At the rst
stage, we will perform the clustering of the rules obtained as a result of solving
the rst task, and the subsequent deducing of the rules from the clusters. At the
second stage, to solve the second problem, we apply the algorithm of con ict-free
optimization of the list of routing rules.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Model for Constructing Rules for Adaptive Tra</title>
    </sec>
    <sec id="sec-4">
      <title>Routing c</title>
      <p>To implement the presented plan, it is necessary rst of all to determine the
model of routing rules used to provide the functioning of a virtual network of a
cloud system built for processing Big data.</p>
      <p>A routing rule is usually a string consisting of certain characteristics of a
network connection. Within the framework of the study, the following
characteristics were chosen from a variety of characteristics describing network
connections: the IP address of the destination network, the network mask, the IP
address of the next router, the output interface, and the metric characterizing
the priority of using the route. When selecting these characteristics, the routing
rule will generally look like:
&lt; dst ip; net mask; gateway; interf ace; metric &gt;
(2)
where: dst ip - IP address of the destination network; net mask - network
mask; gateway - IP address of the next router; interf ace - output interface;
metric - the metric that characterizes the priority of using a route in the routing
table.</p>
      <p>To analyze the demand for communication channels and improve routing
e ciency, services that collect statistical information are deployed on virtual
network nodes. The list of records about the packets passing through virtual
network nodes is represented by the form of the set of the following form:</p>
      <p>R = frkg ; k = 1; n
where n - is the length of the list of records stored on the virtual network
node that provides the operation of the cloud platform.</p>
      <p>Let's de ne areas of admissible values for elements of the given vector, namely
characteristics of tra c on which collection of statistics of use of communication
channels in a network of the software-de ned infrastructure will be carried out.
They are represented as a list of lines of the form (2). Each such line is represented
as a vector of the form:</p>
      <p>rk = frk1; rk2; rk3; rk4; rk5g ;
where: k - number in the list of tra c rules; rk1 -{ IP address of the
destination network;rk2 -{ network mask; rk3 -{ IP address of the next router; rk4
- output interface; rk5 -{ the metric that characterizes the priority of using a
route in the routing table.
(3)
(4)
3.1</p>
      <p>Algorithm for Deriving Routing Adaptive Rules from Clusters
After reducing the input data to the required form, we formulate the statement
of the problem. Given a lot of records about the tra c passing through the
virtual network in the form of a set of the type (4), it is required to build a set
of non-con icting rules R = frig ; i = 1; m; m ! min.</p>
      <p>This work assumes the solution of the problem by the iterative method in
two stages. The rst step is the construction of the initial list of rules R1 by
classifying the set X into two classes. The second step consists of making of
the set Ropt by clustering the set R1 with the subsequent deduction of the rules
from the clusters, that is, the construction of the set R2 with the subsequent
optimization of this set by the algorithm of con ict-free optimization, that is,
the construction of the set Ropt.</p>
      <p>There are many di erent methods for solving this problem. In the framework
of this study, we will use the classi cation based on the neural network. This is
due to the fact that classi cation is a classic task for neural network methods.
The most applicable for solving such a problem is a multi-layered perceptron type
architecture. The number of neurons in the input layer is calculated depending
on the input data. In this case, the size of the input layer of the neural network
will be 99 neurons. It takes 32 bits to write an IP address, and 16 bits to write
ports, the number of protocols considered is 7, therefore, 3 bits are required to
write them. To train the selected neural network model, we will use the algorithm
for backpropagation of the error.
3.2</p>
      <sec id="sec-4-1">
        <title>Classi cation of Adaptive Routing Rules</title>
        <p>One of the problems with processing Big data is the constant access to a speci c
resource for obtaining data for analysis. As a result of such activity, there is
a rapid growth of tra c and as a result of the load on the processor and the
increase in the amount of memory consumed on the virtual network nodes
involved in organizing the route. This leads to a drop in performance of the cloud
network as a whole. In order to reduce computing, it is necessary to solve the
task of compiling a list of rules without losing the characteristics responsible for
the performance of the network and the cloud system itself. For these purposes,
it makes sense to break routing rules into clusters in order to derive new,
generalized rules from them. Let's formulate the mathematical formulation of the
rules of rewall clustering tasks.</p>
        <p>Let there be given a set of rules R = frig; i = 1; m. It is required to compose
a sample partition into disjoint subsets called clusters in such a way that each
subset consists of objects that are close in some metric. It is necessary to compose
a clustering function f (r) : R ! Y , that assigns to each element of the set R an
element of the set Y = Y1; Y2; : : : Ym - the set of cluster numbers.</p>
        <p>An important aspect in solving the clustering problem is the choice of the
distance function, or metric. The metric is a measure of proximity, which is
algorithms. As part of the study, the Euclidean distance was taken as the metric
by the following characteristics: the source and destination IP addresses, the
corresponding ports, the protocol by which the connection is made and the
decision on the admissibility of the connection. Thus, the formula for the distance
function has the following form:</p>
        <p>D (r1; r2) =
q
a (r1;2 + r2;2)2 + b (r1;3 + r2;3)2;
(5)</p>
        <p>This function was used with empirically selected parameters a = 0; 55, b =
0; 55.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Clustering of Adaptive Routing Rules</title>
        <p>The next step is to remove the rules from the clustered list of rules. Input data
will be a list of rules, broken into clusters Rkl. The output of the algorithm
is expected to list the generalized rules Ropt. In the framework of this study,
an algorithm was developed. The list of clusters is denoted by u. Then for all
clusters from u, we have:</p>
        <p>Input: Clustered rule list Rk;l, list of clusters u.</p>
        <p>Output: Generalized list of rules Ropt.
1 ri;1 = min (rk;1) =mask = 32 log2 (max (rk;1)
2 ri;2 = min (rk;2) =mask = 32 log2 (max (rk;2)
3 ri;3 = fr1;3; : : : ; rk;3g;
4 ri;4 = fr1;4; : : : ; rk;4g;
5 ri;5 = fr1;5; : : : ; rk;5g.
min (rk;1));
min (rk;2));</p>
        <p>Algorithm 1: Clustering of adaptive routing rules
3.4</p>
        <p>Algorithm for Optimizing the List of Rules by Ranking Sorting
An important parameter for the list of routing rules, in addition to the breadth
of resource coverage and the size of the list, is also the arrangement of rules. To
ensure the quality of service on the network, it is necessary to apply a sorting
of the list of rules in order to place the least loaded routes in the top of the list.
To solve this problem, the following algorithm was developed. Let's describe it.</p>
        <p>Input: - A set R of tra c headers, passing through a virtual network device;
- Non-con icting list of rules R = fRig ; i = 1; n;
1 Step 1: To assign each rule and each element of the set R, the weight by
formula wi = kki , where ki - the number of tra c passes by the rule i; k
total number of packets passing through the network.
2 Step 2:
3 if wn &gt; w then go to Step 3;
4 else go to Step 5;
5 Step 3: Create a rule Rn 1, according to the current ow.
6 Step 4: Sort the set R by its value, place the most popular rule on the last
place, assigning the corresponding metric go to Step 2.
7 Step 5: End.</p>
        <p>Algorithm 2: Algorithm for optimizing the list of rules by ranking
sorting</p>
        <p>This algorithm does not reduce the size of the routing list, but allows you to
make a more optimal list of rules.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Experimental Results</title>
      <p>Based on the proposed solution, the module implemented adaptive routing for a
software-con gurable network. The software is implemented as a virtual network
function based on the Open Platform for NFV (OPNFV), assembled as a Docker
container.</p>
      <p>Comparative analysis was carried out by comparing the results of traditional
routing methods for a software-de ned network and a developed software
module. Before the experiment, the developed software module was trained, and a
comparable set of rules for traditional routing methods was developed, which
allows for a correct comparison of the compared means. Within the framework
of the study, work was evaluated under di erent loads for two key indicators:
response time in the network; load the central processor on the NFV Router.</p>
      <p>For carrying out of the load, test of scenarios. It includes 4 OpenFlow switches
(2 HP 3500yl, 2 Netgear GSM7200), 8 computing nodes (32Gb RAM, 4 cores),
1 server (32Gb RAM, 8 cores) with OpenFlow controller and 1 server (32Gb
RAM, 4 cores) for monitoring function. As a selected fat tree topology with
three levels. Routers are connected with the speed of 1000 Mbit / s, and the
computers are connected to the third level. In this infrastructure was prepared
100 virtual machines. Also we include one node that controls the data ows.
We select random ve virtual machines (service host). Load is created using a
specially designed tool - hping3. It allows you to generate packets of a certain
type in certain directions, which makes possible on di erent values of the number
of packets, and as a consequence. The experiment consists in the sequential
measurement of the indicators with a consecutive increase in the intensity of
tra c ows in single-load frames in the range from 20 to 350 Mbit / s.</p>
      <p>Response time is one of the key parameters when analyzing network
performance and network resources. It shows how much time passes from the moment
the request is sent by the user until the service responds to the request. In
accordance with the experiment rules, the response time from the network was
removed.</p>
      <p>The list of routing rules formed by the built module under load, including
avalanche, gives a response time di erence of up to 20%, which indicates the
e ectiveness of the approach developed in the work.</p>
      <p>The load on the CPU of the virtual network device is an important parameter
in ensuring the quality of service in the network supporting large data processing.
This is an indication of whether the device is loaded, or ine ciently used. Based
on the obtained results, we have that an optimized set of rules built using the
approach considered in the study, has a reduced load on the rewall processor.
5</p>
    </sec>
    <sec id="sec-6">
      <title>Discussion</title>
      <p>The study of the problems of route optimization and maintenance of quality
of service in data transmission networks involved many scientists from di erent
countries.</p>
      <p>
        For example, authors of the publication [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] proposed a solution for
reducing the control tra c generated, as a rule, in the absence of a suitable routing
rule. Researchers use the bu er id function of the OpenFlow protocol, designed
speci cally to identify individual bu ered packets inside the switch. Thus, the
OpenFlow controller can only send the rst packet from the stream to the
controller and bu ered the remaining packets until the controller responds or a
timeout occurs. The results of the conducted studies demonstrate the reduction
of the control tra c.
      </p>
      <p>
        In work [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] of Turkish scientists, a joint mechanism for selecting a server
and a route for SDN networks is proposed, which takes into account the current
and previous statistics of the use of network resources for each incoming stream.
The presented mechanism periodically automatically updates the network state
metric of the routing protocol in order to achieve load balancing in the network.
The proven concept is implemented using the Mininet emulator.
      </p>
      <p>
        To de ne rules for routing network tra c and ensuring quality of service,
we need to determine what types of tra c are present in a particular network.
To this goal, a number of researchers proposed approaches based on the
classication of tra c [
        <xref ref-type="bibr" rid="ref7 ref9">7, 9</xref>
        ]. Classi cation of network tra c plays a signi cant role
in the eld of network management. This is due to the fact that on the basis
of classi ers, packet lters are used that perform application identi cation. Also
on the basis of classi cation determine the relevance of network resources. The
information obtained is used not only to control the routing of tra c, but also
in the algorithms of automated intrusion detection systems.
      </p>
      <p>
        In a joint study of scientists Park J., Tyan H.-R., and Kuo C.-C., a new
scheme for classifying network tra c is proposed. The proposed approach does
not take into account the features of asymmetric routing and errors in modern
measuring instruments. To address these issues, the authors propose a two-stage,
scalable classi cation of tra c. At the rst stage, the functions for classi cation
are selected. At the second stage, the authors propose to use the method of
reducing the dimension of the classi ed sample. This will reduce resource intensity
and increase productivity [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Using multipart modi cation of the TCP (multipath TCP, MPTCP)
protocol in the data centers provides an increase in application performance. The
publication of Turkish scientists is devoted to the description of the architecture
using MPTCP based on PCS with the aim of guaranteeing customer service in
the issues of streaming video [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The number of MPTCP sub ows and their
routes based on the mixed integer linear programming model. The conducted
experiments show an increase in throughput and a decrease in the duration of
failures in the transmission of the video stream.
      </p>
      <p>
        Amin Vahdat and its colleagues present design and experience with Google
Cloud Platform's network virtualization stack. Authors solutions take into
account a variety of factors including performance isolation among customer virtual
networks, scalability, rapid provisioning of large numbers of virtual hosts,
bandwidth, and latency. But they do not take into account the loud on the network
devices and QoS requirements in the network [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        The researchers Lemeshko et al. in its works prepare the tensor model of
QoS-routing, where an accounting of the network state. They reduce the
QoSrouting problem to the solution of the optimization problem associated with
di erentiated maximization the probability of timely delivery of packet ows in
the network having a di erent service priority [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. But these approaches do not
take into account the dynamic characteristics of tra c between network devices.
      </p>
      <p>
        In the other work by Shuangyin Ren et al. prepared solution for
End-toEnd QoS guarantee algorithm for tra c routing based on deterministic network
calculus. They realized algorithm in Mininet with Open vSwitch as forwarding
switch and Ryu as the remote controller. The main idea of the solution is to run
Hierarchical Token Bucket queuing discipline to manage bandwidth resource.
The main problem with this solution is the lack of consideration of the load on
the communication channels at various times [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>The analysis of scienti c sources on the topic of the study has shown that:
a) so far, there are no e ective algorithmic solutions for planning tra c
routing, application-oriented accounting topology of the computer system, and
QoS requirements in communication tasks schemes;</p>
      <p>b) the existing methods of data ow routing can be enhanced by taking into
account the QoS requirements, but the need for fast solutions to analyze the
current state of links in the network.</p>
      <p>This demonstrates the novelty of the solutions o ered by the project. Thus,
the development of new methods and algorithms to improve the e ciency of
adaptive tra c routing in the cloud system infrastructure for Big data analysis
is a crucial task.
6</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>The survey reviewed existing solutions in the eld of network routing. The
architecture of the neural network was selected to achieve this goal, namely, a hybrid
arti cial neural network consisting of two networks, namely a classi er based
on a multilayer perceptron and a clustered based on the Kohonen network, the
existing approaches, and algorithms for solving the problem of providing
adaptive routing in the virtual network. In the framework of the study, a model for
describing the rules for adaptive routing was developed, and on the basis of
these model algorithms for automatically constructing and optimizing the list
of routing rules were developed. In the projected architecture, an algorithm of
con ict-free optimization was implemented, which produces the nal
optimization by ranking and deducing the most frequently used routes, which allows
improving the quality of service in the network. The algorithms and methods
considered were implemented as a virtual network function for a software-de ned
network.</p>
      <p>During the tests, it was revealed that the approach proposed by this study
gives an increase in two key parameters, namely, response time, on average by
20%, with an increase in load and load of the central process of the shielding
device, by an average of 4.5% load growth. Thus, the developed approach is
e ective for solving practical problems.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bolodurina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parfenov</surname>
            <given-names>D.:</given-names>
          </string-name>
          <article-title>The development and study of the methods and algorithms for the classi cation of data ows of cloud applications in the network of the virtual data center</article-title>
          .
          <source>International Journal of Computer Networks and Communications</source>
          <volume>210</volume>
          (
          <issue>2</issue>
          ),
          <volume>15</volume>
          {
          <fpage>22</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Pashkov</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shalimov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smeliansky</surname>
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Controller failover for SDN enterprise networks</article-title>
          .
          <source>In: Proceedings on 2014 International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC)</source>
          , pp.
          <volume>1</volume>
          {
          <issue>2</issue>
          . IEEE Press, Moscow, Russia (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Qu</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Assi</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shaban</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khabbaz</surname>
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Reliability-aware service provisioning in NFV-enabled enterprise datacenter networks</article-title>
          .
          <source>In: Proceedings on 12th International Conference on Network and Service Management (CNSM)</source>
          , pp.
          <volume>153</volume>
          {
          <fpage>159</fpage>
          . IEEE Press, Montreal, QC, Canada (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Ahmed</given-names>
            <surname>Oussous</surname>
          </string-name>
          et al.:
          <article-title>Big Data technologies: A survey</article-title>
          .
          <source>Journal of King</source>
          Saud University - Computer and Information Sciences,
          <volume>1</volume>
          {
          <fpage>18</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Atli</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <string-name>
            <surname>-V</surname>
          </string-name>
          . et al.:
          <article-title>Protecting SDN controller with per- ow bu ering inside OpenFlow switches</article-title>
          .
          <source>In: Proceedings on 2017 Black Sea Conference on Communications and Networking (BlackSeaCom)</source>
          , pp.
          <volume>1</volume>
          {
          <issue>5</issue>
          . IEEE Press, Istanbul, Turkey (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Aky ld z H</surname>
          </string-name>
          .
          <article-title>-</article-title>
          <string-name>
            <surname>A</surname>
          </string-name>
          . et al.:
          <article-title>Joint server and route selection in SDN networks</article-title>
          .
          <source>In: Proceedings on 2017 Black Sea Conference on Communications and Networking (BlackSeaCom)</source>
          , pp.
          <volume>1</volume>
          {
          <issue>5</issue>
          . IEEE Press, Istanbul, Turkey (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dainotti</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pescape</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kimberly</surname>
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Issues and future directions in tra c classi cation</article-title>
          .
          <source>Network IEEE</source>
          <volume>226</volume>
          (
          <issue>1</issue>
          ),
          <volume>35</volume>
          {
          <fpage>40</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Callado</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamienski</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes S</surname>
          </string-name>
          .-N.,
          <string-name>
            <surname>Sadok</surname>
            <given-names>D.:</given-names>
          </string-name>
          <article-title>A survey on internet tra c identi cation and classi cation</article-title>
          .
          <source>IEEE Comm. Surveys and Tutorials</source>
          <volume>211</volume>
          (
          <issue>3</issue>
          ),
          <volume>37</volume>
          {
          <fpage>52</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Park</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyan H.-R.</surname>
          </string-name>
          , and Kuo C.-C.:
          <article-title>Internet tra c classi cation for scalable QoS provision</article-title>
          .
          <source>In: Proceedings on IEEE International Conference on Multimedia and Expo</source>
          , pp.
          <volume>1221</volume>
          {
          <fpage>1224</fpage>
          . IEEE Press, Toronto, Ont.,
          <string-name>
            <surname>Canada</surname>
          </string-name>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Herguner</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalan R</surname>
          </string-name>
          .-S.,
          <string-name>
            <surname>Cetinkaya</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sayit</surname>
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Towards QoS-aware routing for DASH utilizing MPTCP over SDN</article-title>
          .
          <source>In: Proceedings on 2017 IEEE Conference on Network Function Virtualization and Software De ned Networks (NFV-SDN)</source>
          , pp.
          <volume>1</volume>
          {
          <issue>6</issue>
          . IEEE Press, Berlin, Germany (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Dalton</surname>
            <given-names>M.</given-names>
          </string-name>
          et al.:
          <article-title>Andromeda: performance, isolation, and velocity at scale in cloud network virtualization</article-title>
          .
          <source>In: Proceedings on 15th USENIX Symposium on Networked Systems Design and Implementation</source>
          , pp.
          <volume>373</volume>
          {
          <fpage>387</fpage>
          ., USENIX Association, Renton, WA (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lemeshko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yeremenko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hailan</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <string-name>
            <surname>-M.:</surname>
          </string-name>
          <article-title>Design of QoS-routing scheme under the timely delivery constraint</article-title>
          .
          <source>In: Proceedings on 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)</source>
          , pp.
          <volume>97</volume>
          {
          <fpage>99</fpage>
          . IEEE Press, Lviv, Ukraine (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Shuangyin</surname>
            <given-names>Ren</given-names>
          </string-name>
          , Wenhua Dou,
          <article-title>Yu Wang: A deterministic network calculus enabled QoS routing on software de ned network</article-title>
          .
          <source>In: Proceedings on IEEE 9th International Conference on Communication Software and Networks (ICCSN)</source>
          , pp.
          <volume>1</volume>
          {
          <issue>5</issue>
          . IEEE Press, Guangzhou, China (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Parfenov</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bolodurina</surname>
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Methods and algorithms optimization of adaptive trafc control in the virtual data centerIn:</article-title>
          <source>Proceedings on 2017 International Siberian Conference on Control and Communications (SIBCON</source>
          <year>2017</year>
          ), pp.
          <volume>1</volume>
          {
          <issue>6</issue>
          . IEEE Press, Astana, Kazakhstan (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>