SlideShare a Scribd company logo
Big data and machine learning
for network research problems
Sabidur Rahman
Friday Group Meeting
December 22, 2016
krahman@ucdavis.edu
http://www.linkedin.com/in/kmsabidurrahman/
Agenda
• Big data and machine learning
• How these two fit into networking world?
• Random Neural Network
• Reinforcement learning
• Paper review: O. Brun, L. Wang, and E. Gelenbe, “Big data for Autonomic
Intercontinental Overlays”, IEEE Journal on Selected Areas in Communications, vol. 34,
no. 3, March 2016.
2
Big data
3http://www.ibmbigdatahub.com/infographic/four-vs-big-data
Machine learning
• Network today is producing large amount of data.
• What to do with the collected data?
• Network performance enhancement
• Smarter routing decision
• Network management and planning
• Network automation
• Analytics and automation of this huge amount of data depends largely on data analytics and
machine learning techniques.
4
Random Neural Network (RNN)
• When a biophysical neuron is excited, it transmits a train of signals, called spikes (firing of
signals), along its axon to either excite or inhibit the receiving neurons.
• The combined effect of excitatory (positive) and inhibitory (negative) inputs change the potential
level of the receiving neuron and determine whether it will become excited.
• Neurons in RNN interact by exchanging positive and negative spiking signals with certain
probability.
• RNN model is used in pattern recognition, classification, image processing, combinatorial
optimization and communication systems.
5
Timotheou S. The random neural network: a survey. The computer journal. 2010 Mar 1;53(3):251-67.
Excitatory = causing, or constituting excitation
Inhibitory = suppress or restrain an impulse
Reinforcement learning
The basic reinforcement learning model consists of:
• Set of environment and agent states S
• Set of agent actions A
• Policies of transitioning from states to actions
• Rules that determine reward (or punishment) of a transition (G and R)
6
Sutton RS, Barto AG. Reinforcement learning: An introduction. Cambridge: MIT press; 1998 Mar 1.
Paper review
O. Brun, L. Wang, and E. Gelenbe, “Big data for Autonomic
Intercontinental Overlays”, IEEE Journal on Selected Areas in
Communications, vol. 34, no. 3, March 2016.
7
Introduction
• Multihop intercontinental network that uses IP to communicate between nodes.
• IP routing often results in sub-optimal paths with respect to metrics such as end-to-end round trip
delay.
• QoS of such routes can be optimized using the collected network statistics.
• Objective: Select route to provide better QoS than IP.
• Machine learning based scheme to exploit large scale data collected from communicating node
pairs.
8
(Big) Data collection
• ICMP-based ping to collects round-trip delay data at the overlay nodes, every two minutes
• 24 hours with 20 overlay nodes: collect up to some 2.7 × 10^5 data points per day.
9
10
Routing overlay
11
Routing overlay
• Routing overlay is a method to improve performance without changing underlying network.
• Overlay network is formed by software routers deployed over the Internet.
• Operates by monitoring the quality of Internet paths (latency, bandwidth, loss rate) between
overlay nodes.
• When primary path becomes unavailable or suffers from congestion, re-routes packets along an
alternate path.
• Routing overlays can be used to quickly recover from path outages, and also improve QoS of
data flows.
• This approach makes it possible to override the routes determined by Internet protocols and to
route traffic based on metrics directly related to the performance needs of the application.
12
Self-healing and self-optimising routing overlay
• SMART overlay network is formed by software
agents that are deployed at VMs.
• On each VM, a Transmission (TA) and Reception
Agent(RA) run together with various Applications
or tasks.
• Each VM’s software router is the Proxy that
monitors the quality of the overlay paths towards
other destinations, selects the best paths, and
forwards the packets over these paths.
• TA receives the packets that are being sent to other
Applications at other sites.
• RA receives packets from the local Proxy,
decapsulate and delivers them to the appropriate
Application in the VM.
• TA, RA and Proxy enables the control of path of
packets through the network, without the
applications being aware that their data flows
are routed by the overlay.
13
Proxy: details
• Monitoring Agent: monitors the quality of the
Internet paths between the local cloud and the other
clouds.
• Routing Agent: drives the monitoring agent and uses the
data it collects to discover an optimal path.
• Forwarding Agent: forwards each incoming packet
to its destination on the path it was instructed to use by
Routing agent.
• Source routing: Routing table of source proxy describes
the complete path between overlay proxies to be followed
by a packet to reach its destination, while the path
between proxies is determined by the conventional IP
protocol.
14
Packet forwarding process
• SMART header contains the sequence of intermediate proxies.
15
Random Neural Network (RNN)
• At each time interval, the algorithm chooses a subset of paths to probe, and measures the sum of
edge delays in the probed paths.
• The algorithm then sends its packet over the minimum latency path among those it has probed.
• Each neuron in RNN represents a path from source to destination.
• RNN helps to select K paths to destination out of N paths.
• State of n connected neurons are represented by a vector k(t) = [k1(t), k2(t), . . . , kn(t)], where ki(t)
is a non-negative integer valued random variable representing the “potential” of the i-th neuron
being excited at time t.
16
Random Neural Network
• A neuron i of the RNN is said to be excited
whenever ki(t) > 0, in which case it can fire and
send signals at an average rate ri
17
Timotheou S. The random neural network: a survey. The computer journal. 2010 Mar 1;53(3):251-67.
Qi <- Ki(t)
ri
From out of network
To out of network
From other neurons
To other neurons
Positive signal received = higher probability of firing
Neg. signal received = higher probability of not firing
Reinforcement learning
• “Guide” RNN to choose better paths by:
• “Reward” neurons representing good paths.
• “Punish” neurons representing bad paths.
18
1. Increasing probability
of it’s “firing”
2. Reducing probability
of others “firing”
1. Decrease probability
of it’s “firing”
2. Increasing probability
of others “firing”
G = minimum delay
Higher delay = lower reward
Algorithm
19
2. Select neurons with highest probability at time tl
3. Calculate rewards. where G = minimize delay
4. p* is the best path
7. Good path: reward the neuron!
10.Increase positive weights going into the neuron
11. Increase negative weights leading to
other neurons
Algorithm(continued..)
20
13. Bad path: punish the neuron!
16. Increase negative weights going into the neuron
17. Increase positive weights leading to other neurons
(give other paths a higher chance of being selected)
22. Re-normalize w to avoid ever increasing weights
26. Update decision threshold T.
β ∈ (0, 1) is used to introduce forgetfulness.
Higher β will give more importance lesson learned
from previous events.
Results(1)
21
Results(2)
22
Results(3)
23
Summary
• Increasing amount of data collected from networks can help to
improve performance.
• Machine learning tools are useful to analyze and learn from
these huge data.
• Usefulness of other interesting machine/deep learning tools are
yet to be explored in Network research.
24
Thanks!
Comments: krahman@ucdavis.edu
http://www.linkedin.com/in/kmsabidurrahman/
25

More Related Content

PDF
A Reliable Routing Technique for Wireless Sensor Networks
PPTX
Online opportunistic routing using Reinforcement learning
PDF
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
PDF
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
PPTX
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
PDF
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
PDF
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
A Reliable Routing Technique for Wireless Sensor Networks
Online opportunistic routing using Reinforcement learning
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...

What's hot (19)

PDF
Eh33798804
PPTX
Protocols For Self Organisation Of A Wireless Sensor Network
PDF
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
PDF
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
PDF
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
PPTX
Kautz based wireless sensor and actuator
PDF
Dynamic adaptation balman
PDF
Iaetsd a survey on geographic routing relay selection in
PDF
Energy in Wireless Sensor Network
PDF
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
PDF
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
DOC
A seminar report on data aggregation in wireless sensor networks
PDF
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
PDF
CoryCookFinalProject535
PDF
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
DOCX
Towards energy efficient big data gathering
PDF
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
PDF
network mining and representation learning
PDF
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
Eh33798804
Protocols For Self Organisation Of A Wireless Sensor Network
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
Kautz based wireless sensor and actuator
Dynamic adaptation balman
Iaetsd a survey on geographic routing relay selection in
Energy in Wireless Sensor Network
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
A seminar report on data aggregation in wireless sensor networks
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
CoryCookFinalProject535
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
Towards energy efficient big data gathering
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
network mining and representation learning
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
Ad

Viewers also liked (13)

DOCX
Resume Dec_2016-V
PDF
Telecom report press release
PDF
NBTCiTech58
PDF
About Data From A Machine Learning Perspective
PPTX
Football Camps For Elite Gamespeed
PDF
Differential privacy and applications to location privacy
PPTX
Weight loss diets
DOC
Elg assignment 2
DOC
Bus30104 intro to biz final project sept 2015
PDF
Cnc final assignment
KEY
Machine Learning on Big Data
DOCX
SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.
PDF
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
Resume Dec_2016-V
Telecom report press release
NBTCiTech58
About Data From A Machine Learning Perspective
Football Camps For Elite Gamespeed
Differential privacy and applications to location privacy
Weight loss diets
Elg assignment 2
Bus30104 intro to biz final project sept 2015
Cnc final assignment
Machine Learning on Big Data
SUGERENTE CARPETA DE TUTORÍA Y ORIENTACIÓN EDUCATIVA.
HOW TO APPLY BIG DATA ANALYTICS AND MACHINE LEARNING TO REAL TIME PROCESSING ...
Ad

Similar to Big data and machine learning for network research problems (20)

PPTX
WSN Routing Protocols
PDF
Network Intrusion Detection Dean Final, actual version
PPTX
Introduction to cyber forensics
PPTX
3. WIRELESS_PROTOCOLS.pptx
PDF
Simulation of Route Optimization with load balancing Using AntNet System
PPTX
A review of routing protocols in wsn
PPT
Chapter_13_Energy-Efficient_WSN_Slides.ppt
PDF
Mitigation of sink hole attack in manet using aco
PPTX
Ns lecture1: Introduction to Routing Protocol
PDF
Computer Networks Lecture Notes
PDF
Lecture Notes for computer networks subject
PPT
Routing protocol for effective interoperability
DOCX
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
PDF
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
PPTX
Transfer reliability and congestion control strategies in opportunistic netwo...
PPTX
Networking_and_Data_communication.pptx
PDF
2009.08 grid peer-slides
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
PDF
Introduction to Quantum Computing
PDF
Dynamic routing
WSN Routing Protocols
Network Intrusion Detection Dean Final, actual version
Introduction to cyber forensics
3. WIRELESS_PROTOCOLS.pptx
Simulation of Route Optimization with load balancing Using AntNet System
A review of routing protocols in wsn
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Mitigation of sink hole attack in manet using aco
Ns lecture1: Introduction to Routing Protocol
Computer Networks Lecture Notes
Lecture Notes for computer networks subject
Routing protocol for effective interoperability
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Transfer reliability and congestion control strategies in opportunistic netwo...
Networking_and_Data_communication.pptx
2009.08 grid peer-slides
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
Introduction to Quantum Computing
Dynamic routing

More from Sabidur Rahman (15)

PDF
Smart city- services and technologies
PDF
Blockchain technology and its’ usecases in computer networks
PPTX
T-SDN Controllers for Transport Network
PDF
5 g and beyond! IEEE ICC 2018 keynotes reviewed
PDF
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
PDF
Akamai Edge 2017 reviewed
PDF
Understanding mobile service usage and user behavior pattern for mec resource...
PDF
Innovations in Edge Computing and MEC
PDF
Dynamic workload migration over optical backbone network to minimize data cen...
PPTX
Migration of groups of virtual machines in distributed data centers to reduce...
PDF
Cost savings from auto-scaling of network resources using machine learning
PDF
IoT Mobility Forensics
PDF
Network tomography to enhance the performance of software defined network mon...
PDF
Approximation techniques used for general purpose algorithms
PDF
Computer Security: Worms
Smart city- services and technologies
Blockchain technology and its’ usecases in computer networks
T-SDN Controllers for Transport Network
5 g and beyond! IEEE ICC 2018 keynotes reviewed
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Akamai Edge 2017 reviewed
Understanding mobile service usage and user behavior pattern for mec resource...
Innovations in Edge Computing and MEC
Dynamic workload migration over optical backbone network to minimize data cen...
Migration of groups of virtual machines in distributed data centers to reduce...
Cost savings from auto-scaling of network resources using machine learning
IoT Mobility Forensics
Network tomography to enhance the performance of software defined network mon...
Approximation techniques used for general purpose algorithms
Computer Security: Worms

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Well-logging-methods_new................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT 4 Total Quality Management .pptx
OOP with Java - Java Introduction (Basics)
Well-logging-methods_new................
Foundation to blockchain - A guide to Blockchain Tech
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CH1 Production IntroductoryConcepts.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Model Code of Practice - Construction Work - 21102022 .pdf
Internet of Things (IOT) - A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CYBER-CRIMES AND SECURITY A guide to understanding

Big data and machine learning for network research problems

  • 1. Big data and machine learning for network research problems Sabidur Rahman Friday Group Meeting December 22, 2016 krahman@ucdavis.edu http://www.linkedin.com/in/kmsabidurrahman/
  • 2. Agenda • Big data and machine learning • How these two fit into networking world? • Random Neural Network • Reinforcement learning • Paper review: O. Brun, L. Wang, and E. Gelenbe, “Big data for Autonomic Intercontinental Overlays”, IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, March 2016. 2
  • 4. Machine learning • Network today is producing large amount of data. • What to do with the collected data? • Network performance enhancement • Smarter routing decision • Network management and planning • Network automation • Analytics and automation of this huge amount of data depends largely on data analytics and machine learning techniques. 4
  • 5. Random Neural Network (RNN) • When a biophysical neuron is excited, it transmits a train of signals, called spikes (firing of signals), along its axon to either excite or inhibit the receiving neurons. • The combined effect of excitatory (positive) and inhibitory (negative) inputs change the potential level of the receiving neuron and determine whether it will become excited. • Neurons in RNN interact by exchanging positive and negative spiking signals with certain probability. • RNN model is used in pattern recognition, classification, image processing, combinatorial optimization and communication systems. 5 Timotheou S. The random neural network: a survey. The computer journal. 2010 Mar 1;53(3):251-67. Excitatory = causing, or constituting excitation Inhibitory = suppress or restrain an impulse
  • 6. Reinforcement learning The basic reinforcement learning model consists of: • Set of environment and agent states S • Set of agent actions A • Policies of transitioning from states to actions • Rules that determine reward (or punishment) of a transition (G and R) 6 Sutton RS, Barto AG. Reinforcement learning: An introduction. Cambridge: MIT press; 1998 Mar 1.
  • 7. Paper review O. Brun, L. Wang, and E. Gelenbe, “Big data for Autonomic Intercontinental Overlays”, IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, March 2016. 7
  • 8. Introduction • Multihop intercontinental network that uses IP to communicate between nodes. • IP routing often results in sub-optimal paths with respect to metrics such as end-to-end round trip delay. • QoS of such routes can be optimized using the collected network statistics. • Objective: Select route to provide better QoS than IP. • Machine learning based scheme to exploit large scale data collected from communicating node pairs. 8
  • 9. (Big) Data collection • ICMP-based ping to collects round-trip delay data at the overlay nodes, every two minutes • 24 hours with 20 overlay nodes: collect up to some 2.7 × 10^5 data points per day. 9
  • 10. 10
  • 12. Routing overlay • Routing overlay is a method to improve performance without changing underlying network. • Overlay network is formed by software routers deployed over the Internet. • Operates by monitoring the quality of Internet paths (latency, bandwidth, loss rate) between overlay nodes. • When primary path becomes unavailable or suffers from congestion, re-routes packets along an alternate path. • Routing overlays can be used to quickly recover from path outages, and also improve QoS of data flows. • This approach makes it possible to override the routes determined by Internet protocols and to route traffic based on metrics directly related to the performance needs of the application. 12
  • 13. Self-healing and self-optimising routing overlay • SMART overlay network is formed by software agents that are deployed at VMs. • On each VM, a Transmission (TA) and Reception Agent(RA) run together with various Applications or tasks. • Each VM’s software router is the Proxy that monitors the quality of the overlay paths towards other destinations, selects the best paths, and forwards the packets over these paths. • TA receives the packets that are being sent to other Applications at other sites. • RA receives packets from the local Proxy, decapsulate and delivers them to the appropriate Application in the VM. • TA, RA and Proxy enables the control of path of packets through the network, without the applications being aware that their data flows are routed by the overlay. 13
  • 14. Proxy: details • Monitoring Agent: monitors the quality of the Internet paths between the local cloud and the other clouds. • Routing Agent: drives the monitoring agent and uses the data it collects to discover an optimal path. • Forwarding Agent: forwards each incoming packet to its destination on the path it was instructed to use by Routing agent. • Source routing: Routing table of source proxy describes the complete path between overlay proxies to be followed by a packet to reach its destination, while the path between proxies is determined by the conventional IP protocol. 14
  • 15. Packet forwarding process • SMART header contains the sequence of intermediate proxies. 15
  • 16. Random Neural Network (RNN) • At each time interval, the algorithm chooses a subset of paths to probe, and measures the sum of edge delays in the probed paths. • The algorithm then sends its packet over the minimum latency path among those it has probed. • Each neuron in RNN represents a path from source to destination. • RNN helps to select K paths to destination out of N paths. • State of n connected neurons are represented by a vector k(t) = [k1(t), k2(t), . . . , kn(t)], where ki(t) is a non-negative integer valued random variable representing the “potential” of the i-th neuron being excited at time t. 16
  • 17. Random Neural Network • A neuron i of the RNN is said to be excited whenever ki(t) > 0, in which case it can fire and send signals at an average rate ri 17 Timotheou S. The random neural network: a survey. The computer journal. 2010 Mar 1;53(3):251-67. Qi <- Ki(t) ri From out of network To out of network From other neurons To other neurons Positive signal received = higher probability of firing Neg. signal received = higher probability of not firing
  • 18. Reinforcement learning • “Guide” RNN to choose better paths by: • “Reward” neurons representing good paths. • “Punish” neurons representing bad paths. 18 1. Increasing probability of it’s “firing” 2. Reducing probability of others “firing” 1. Decrease probability of it’s “firing” 2. Increasing probability of others “firing” G = minimum delay Higher delay = lower reward
  • 19. Algorithm 19 2. Select neurons with highest probability at time tl 3. Calculate rewards. where G = minimize delay 4. p* is the best path 7. Good path: reward the neuron! 10.Increase positive weights going into the neuron 11. Increase negative weights leading to other neurons
  • 20. Algorithm(continued..) 20 13. Bad path: punish the neuron! 16. Increase negative weights going into the neuron 17. Increase positive weights leading to other neurons (give other paths a higher chance of being selected) 22. Re-normalize w to avoid ever increasing weights 26. Update decision threshold T. β ∈ (0, 1) is used to introduce forgetfulness. Higher β will give more importance lesson learned from previous events.
  • 24. Summary • Increasing amount of data collected from networks can help to improve performance. • Machine learning tools are useful to analyze and learn from these huge data. • Usefulness of other interesting machine/deep learning tools are yet to be explored in Network research. 24