6,352 research outputs found
Design and performance evaluation of a state-space based AQM
Recent research has shown the link between congestion control in
communication networks and feedback control system. In this paper, the design
of an active queue management (AQM) which can be viewed as a controller, is
considered. Based on a state space representation of a linearized fluid flow
model of TCP, the AQM design is converted to a state feedback synthesis problem
for time delay systems. Finally, an example extracted from the literature and
simulations via a network simulator NS (under cross traffic conditions) support
our study
On Designing Lyapunov-Krasovskii Based AQM for Routers Supporting TCP Flows
For the last few years, we assist to a growing interest of designing AQM
(Active Queue Management) using control theory. In this paper, we focus on the
synthesis of an AQM based on the Lyapunov theory for time delay systems. With
the help of a recently developed Lyapunov-Krasovskii functional and using a
state space representation of a linearized fluid model of TCP, two robust AQMs
stabilizing the TCP model are constructed. Notice that our results are
constructive and the synthesis problem is reduced to a convex optimization
scheme expressed in terms of linear matrix inequalities (LMIs). Finally, an
example extracted from the literature and simulations via {\it NS simulator}
support our study
Design of a robust Controller/Observer for TCP/AQM network: First application to intrusion detection systems for drone fleet
International audienceThis paper proposes a robust controller/observer for UAVs network anomaly estimation which is based on both Lyapunov Krasovkii functional and dynamic behavior of TCP (Transmission Control Protocol). Several research works on network anomaly estimation have been led using automatic control techniques and provide methods for designing both observer and command laws dedicated to time delay problem while estimating the anomaly or intrusion in the system. The observer design is based on a linearized fluid-flow model of the TCP behavior and must be associated to an AQM (Active Queue Management) to perform its diagnosis. The developed robust controller/observer in this paper has to be tuned by considering the time delay linear state-space representation of TCP model. As a first result, the designed controller/observer system has been successfully applied to some relevant practical problems such as topology network for aerial vehicles and the effectiveness is illustrated by using real traffic traces including Denial of Service attacks. Our first results show promising perspectives for Intrusion Detection System (IDS) in a fleet of UAVs
Towards the development of a smart flying sensor: illustration in the field of precision agriculture
Sensing is an important element to quantify productivity, product quality and to make decisions. Applications, such as mapping, surveillance, exploration and precision agriculture, require a reliable platform for remote sensing. This paper presents the first steps towards the development of a smart flying sensor based on an unmanned aerial vehicle (UAV). The concept of smart remote sensing is illustrated and its performance tested for the task of mapping the volume of grain inside a trailer during forage harvesting. Novelty lies in: (1) the development of a position-estimation method with time delay compensation based on inertial measurement unit (IMU) sensors and image processing; (2) a method to build a 3D map using information obtained from a regular camera; and (3) the design and implementation of a path-following control algorithm using model predictive control (MPC). Experimental results on a lab-scale system validate the effectiveness of the proposed methodology
Traffic Profiles and Performance Modelling of Heterogeneous Networks
This thesis considers the analysis and study of short and long-term traffic patterns of
heterogeneous networks. A large number of traffic profiles from different locations and
network environments have been determined. The result of the analysis of these patterns
has led to a new parameter, namely the 'application signature'. It was found that these
signatures manifest themselves in various granularities over time, and are usually unique
to an application, permanent virtual circuit (PVC), user or service. The differentiation of
the application signatures into different categories creates a foundation for short and long-term
management of networks. The thesis therefore looks from the micro and macro
perspective on traffic management, covering both aspects.
The long-term traffic patterns have been used to develop a novel methodology for network
planning and design. As the size and complexity of interconnected systems grow steadily,
usually covering different time zones, geographical and political areas, a new
methodology has been developed as part of this thesis. A part of the methodology is a new
overbooking mechanism, which stands in contrast to existing overbooking methods
created by companies like Bell Labs. The new overbooking provides companies with
cheaper network design and higher average throughput. In addition, new requirements like
risk factors have been incorporated into the methodology, which lay historically outside
the design process. A large network service provider has implemented the overbooking
mechanism into their network planning process, enabling practical evaluation.
The other aspect of the thesis looks at short-term traffic patterns, to analyse how
congestion can be controlled. Reoccurring short-term traffic patterns, the application
signatures, have been used for this research to develop the "packet train model" further.
Through this research a new congestion control mechanism was created to investigate how
the application signatures and the "extended packet train model" could be used. To
validate the results, a software simulation has been written that executes the proprietary
congestion mechanism and the new mechanism for comparison. Application signatures for
the TCP/IP protocols have been applied in the simulation and the results are displayed and
discussed in the thesis. The findings show the effects that frame relay congestion control
mechanisms have on TCP/IP, where the re-sending of segments, buffer allocation, delay
and throughput are compared. The results prove that application signatures can be used
effectively to enhance existing congestion control mechanisms.AT&T (UK) Ltd, Englan
A cross-layer architecture to improve mobile host rate performance and to solve unfairness problem in WLANs
The evolution of the Internet has been mainly promoted in recent years by the emergence and pro- liferation of wireless access networks towards a global ambient and pervasive network accessed from mobile devices. These new access networks have introduced new MAC layers independently of the legacy "wire- oriented" protocols that are still at the heart of the pro- tocol stacks of the end systems. This principle of isola- tion and independence between layers advocated by the OSI model has its drawbacks of maladjustment between new access methods and higher-level protocols built on the assumption of a wired Internet. In this paper, we introduce and deliver solutions for several pathologi- cal communication behaviors resulting from the malad- justment between WLAN MAC and higher layer stan- dard protocols such as TCP/IP and UDP/IP. Specially, based on an efficient analytical model for WLANs band- width estimation, we address in this paper the two fol- lowing issues: 1) Performance degradation due to the lack of flow control between the MAC and upper layer resulting in potential MAC buffer overflow; 2) Unfair bandwidth share issues between various type of flows. We show how these syndromes can be efficiently solved from neutral "cross layer" interactions which entail no changes in the considered protocols and standards
- …