Random Neural Networks for the Adaptive Control of Packet Networks

    Research output: Contribution to conferencePresentation

    Abstract

    The Random Neural Network (RNN) has been used in a wide variety of applications, including image compression, texture generation, pattern recognition, and so on. Our work focuses on the use of the RNN as a routing decision maker which uses Reinforcement Learning (RL) techniques to explore a search space (i.e. the set of all possible routes) to find the optimal route in terms of the Quality of Service metrics that are most important to the underlying traffic. We have termed this algorithm as the Cognitive Packet Network (CPN), and have shown in previous works its application to a variety of network domains. In this paper, we present a set of experiments which demonstrate how CPN performs in a realistic environment compared to a priori-computed optimal routes. We show that RNN with RL can autonomously learn the best route in the network simply through exploration in a very short time-frame. We also demonstrate the quickness with which our algorithm is able to adapt to a disruption along its current route, switching to the new optimal route in the network. These results serve as strong evidence for the benefits of the RNN Reinforcement Learning algorithm which we employ.
    Original languageAmerican English
    Pages313-320
    Number of pages8
    DOIs
    StatePublished - Sep 10 2006
    EventArtificial Neural Networks - ICANN 2006: 16th International Conference, Athens, Greece, September 10-14, 2006 Proceedings, Part I -
    Duration: Sep 10 2006 → …

    Conference

    ConferenceArtificial Neural Networks - ICANN 2006: 16th International Conference, Athens, Greece, September 10-14, 2006 Proceedings, Part I
    Period9/10/06 → …

    ASJC Scopus Subject Areas

    • Theoretical Computer Science
    • General Computer Science

    Disciplines

    • Computer Sciences

    Fingerprint

    Dive into the research topics of 'Random Neural Networks for the Adaptive Control of Packet Networks'. Together they form a unique fingerprint.

    Cite this