6,352 research outputs found

    Set-up and study of a networked control system

    Get PDF

    Design and performance evaluation of a state-space based AQM

    Full text link
    Recent research has shown the link between congestion control in communication networks and feedback control system. In this paper, the design of an active queue management (AQM) which can be viewed as a controller, is considered. Based on a state space representation of a linearized fluid flow model of TCP, the AQM design is converted to a state feedback synthesis problem for time delay systems. Finally, an example extracted from the literature and simulations via a network simulator NS (under cross traffic conditions) support our study

    On Designing Lyapunov-Krasovskii Based AQM for Routers Supporting TCP Flows

    Full text link
    For the last few years, we assist to a growing interest of designing AQM (Active Queue Management) using control theory. In this paper, we focus on the synthesis of an AQM based on the Lyapunov theory for time delay systems. With the help of a recently developed Lyapunov-Krasovskii functional and using a state space representation of a linearized fluid model of TCP, two robust AQMs stabilizing the TCP model are constructed. Notice that our results are constructive and the synthesis problem is reduced to a convex optimization scheme expressed in terms of linear matrix inequalities (LMIs). Finally, an example extracted from the literature and simulations via {\it NS simulator} support our study

    Design of a robust Controller/Observer for TCP/AQM network: First application to intrusion detection systems for drone fleet

    Get PDF
    International audienceThis paper proposes a robust controller/observer for UAVs network anomaly estimation which is based on both Lyapunov Krasovkii functional and dynamic behavior of TCP (Transmission Control Protocol). Several research works on network anomaly estimation have been led using automatic control techniques and provide methods for designing both observer and command laws dedicated to time delay problem while estimating the anomaly or intrusion in the system. The observer design is based on a linearized fluid-flow model of the TCP behavior and must be associated to an AQM (Active Queue Management) to perform its diagnosis. The developed robust controller/observer in this paper has to be tuned by considering the time delay linear state-space representation of TCP model. As a first result, the designed controller/observer system has been successfully applied to some relevant practical problems such as topology network for aerial vehicles and the effectiveness is illustrated by using real traffic traces including Denial of Service attacks. Our first results show promising perspectives for Intrusion Detection System (IDS) in a fleet of UAVs

    Towards the development of a smart flying sensor: illustration in the field of precision agriculture

    Get PDF
    Sensing is an important element to quantify productivity, product quality and to make decisions. Applications, such as mapping, surveillance, exploration and precision agriculture, require a reliable platform for remote sensing. This paper presents the first steps towards the development of a smart flying sensor based on an unmanned aerial vehicle (UAV). The concept of smart remote sensing is illustrated and its performance tested for the task of mapping the volume of grain inside a trailer during forage harvesting. Novelty lies in: (1) the development of a position-estimation method with time delay compensation based on inertial measurement unit (IMU) sensors and image processing; (2) a method to build a 3D map using information obtained from a regular camera; and (3) the design and implementation of a path-following control algorithm using model predictive control (MPC). Experimental results on a lab-scale system validate the effectiveness of the proposed methodology

    Traffic Profiles and Performance Modelling of Heterogeneous Networks

    Get PDF
    This thesis considers the analysis and study of short and long-term traffic patterns of heterogeneous networks. A large number of traffic profiles from different locations and network environments have been determined. The result of the analysis of these patterns has led to a new parameter, namely the 'application signature'. It was found that these signatures manifest themselves in various granularities over time, and are usually unique to an application, permanent virtual circuit (PVC), user or service. The differentiation of the application signatures into different categories creates a foundation for short and long-term management of networks. The thesis therefore looks from the micro and macro perspective on traffic management, covering both aspects. The long-term traffic patterns have been used to develop a novel methodology for network planning and design. As the size and complexity of interconnected systems grow steadily, usually covering different time zones, geographical and political areas, a new methodology has been developed as part of this thesis. A part of the methodology is a new overbooking mechanism, which stands in contrast to existing overbooking methods created by companies like Bell Labs. The new overbooking provides companies with cheaper network design and higher average throughput. In addition, new requirements like risk factors have been incorporated into the methodology, which lay historically outside the design process. A large network service provider has implemented the overbooking mechanism into their network planning process, enabling practical evaluation. The other aspect of the thesis looks at short-term traffic patterns, to analyse how congestion can be controlled. Reoccurring short-term traffic patterns, the application signatures, have been used for this research to develop the "packet train model" further. Through this research a new congestion control mechanism was created to investigate how the application signatures and the "extended packet train model" could be used. To validate the results, a software simulation has been written that executes the proprietary congestion mechanism and the new mechanism for comparison. Application signatures for the TCP/IP protocols have been applied in the simulation and the results are displayed and discussed in the thesis. The findings show the effects that frame relay congestion control mechanisms have on TCP/IP, where the re-sending of segments, buffer allocation, delay and throughput are compared. The results prove that application signatures can be used effectively to enhance existing congestion control mechanisms.AT&T (UK) Ltd, Englan

    A cross-layer architecture to improve mobile host rate performance and to solve unfairness problem in WLANs

    Get PDF
    The evolution of the Internet has been mainly promoted in recent years by the emergence and pro- liferation of wireless access networks towards a global ambient and pervasive network accessed from mobile devices. These new access networks have introduced new MAC layers independently of the legacy "wire- oriented" protocols that are still at the heart of the pro- tocol stacks of the end systems. This principle of isola- tion and independence between layers advocated by the OSI model has its drawbacks of maladjustment between new access methods and higher-level protocols built on the assumption of a wired Internet. In this paper, we introduce and deliver solutions for several pathologi- cal communication behaviors resulting from the malad- justment between WLAN MAC and higher layer stan- dard protocols such as TCP/IP and UDP/IP. Specially, based on an efficient analytical model for WLANs band- width estimation, we address in this paper the two fol- lowing issues: 1) Performance degradation due to the lack of flow control between the MAC and upper layer resulting in potential MAC buffer overflow; 2) Unfair bandwidth share issues between various type of flows. We show how these syndromes can be efficiently solved from neutral "cross layer" interactions which entail no changes in the considered protocols and standards
    • …
    corecore