Designing optimal rate allocation algorithms based on utility function in data networks

Number of pages: 210 File Format: word File Code: 31355
Year: Not Specified University Degree: Master's degree Category: Electronic Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Designing optimal rate allocation algorithms based on utility function in data networks

    Faculty of Electricity and Computers

    Doctoral Dissertation in Electrical Engineering

    Abstract:

    The purpose of this thesis is to improve the performance of optimal rate allocation algorithms based on the utility function in data networks. The optimal rate allocation algorithm based on the utility function was first proposed by Dr. Golestani. Then Kelly showed that it is possible to convert the optimal rate allocation problem into two simpler sub-problems, one of which is solved by the network and the other by the users, and he showed that the network problem is actually a rate allocation problem with a proportional justice criterion and has many advantages, including the similarity with the congestion control algorithm in TCP/IP (AIMD method) and also the stability and convergence of the algorithm Math showed. But at the same time, Kelly's algorithm has some limitations, including the problem of scalability, low convergence speed, and high computational overheads. In this treatise, we will introduce two hierarchical algorithms, a fuzzy algorithm and a hybrid fuzzy-hierarchical algorithm with the aim of solving the above-mentioned defects in order to achieve rate allocation methods with higher convergence speeds while maintaining proportional justice. In addition, the mathematical analysis of the stability of the proposed algorithms, the analysis of the behavior of hierarchical algorithms in the presence of background traffic with a variable rate, and the analysis of the phenomenon of users entering and exiting the system are among the other things that will be examined in this treatise.

    Introduction

    In general, quality of service 1 is the ability that the network has in distinguishing between different types of services and traffic classes in such a way that users who are in a Traffic classes are placed, depending on their needs, they can observe different performance of the network compared to other types. Among the ways to support the quality of service, we can refer to various methods of rate control and congestion control2.

    Rate control and congestion control methods are used in computer networks in order to control traffic in the networks and divide the bandwidth, taking into account the assumed fairness criteria.

    Rate control is a set of methods used by the network to control the input rate to the network, while congestion control is the application of some controls on the input. which have caused network buffers to be filled.

    In a general classification, congestion control in data telecommunication networks is done in two ways. Window-based methods in which the number of packets in the network is set to a certain limit by intelligently controlling a window called the congestion window4 [6,5,4,3,2,1] and rate-based methods in which the traffic in the network is looked at as a liquid flow and with specific algorithms, an attempt is made to allocate rates to network users in such a way that justice is observed in allocating rates to users. [11,10,9,8,7].

    Several criteria have been introduced to implement this justice, the most prominent of which are maximum-minimum1, proportional2, and minimum potential delay3 criteria [14,13,12].

    Mo and Walrand in [13] have investigated the justice criterion (W,a) and have shown that all the mentioned justice criteria can be considered as special cases of the general justice criterion. (W,a) obtained.

    With the research conducted in the field of congestion control and rate allocation algorithms, it has been concluded that any algorithm that is used for congestion control or rate allocation should be implemented in a distributed manner at the network level as much as possible, because otherwise, if the algorithm is implemented centrally, as the network dimensions increase, a significant computational load will be applied to the central processor, and in addition, in the event of a malfunction in this processor, the behavior of the entire system will be disturbed. And it becomes a mess, while in a distributed algorithm, the responsibility of rate allocation and congestion control is placed on all network nodes and end users, and the creation of an error or defect in a part of this distributed system will not have a great impact on the behavior of the entire algorithm.. For this reason, researchers such as Bertsekas [15] and Gallager [16] have tried to push rate allocation algorithms towards distributed and widespread algorithms at the network level.

    The initial idea of ??implementing the rate control problem as a general optimization problem has been proposed by S.J. Golestani [17] and after him, many researchers have tried to develop existing methods to allow users on the network level to access optimal rates with distributed methods.

    The main work of these researchers can be generally divided into two main categories. In the first category, researchers such as S. Low in [18,19] have tried to turn the optimization problem into a widespread problem at the network level by using duality theory [15] in which end users and network links are able to solve the general optimization problem by exchanging some information with each other and even these researchers in [18] have tried to prove the stability of their distributed algorithms with the help of mathematical methods and in practice how to implement such algorithms in the ATM 5 network. [21,20] and for the ABR service available in it, it has been investigated and analyzed using the facilities provided by this service.

    Researchers who are in the second category of the above division try to solve the problem of optimal rate allocation with the general optimization theory by using methods based on the penalty function [15], which includes the research done in [24,23,22,10,8,7] pointed out.

    Of course, it is necessary to explain, there are also researchers who have tried to solve the problem of general optimization of rate allocation by using methods different from the above two general methods. For example, Ba?ar et al. T. in [25] and R. Srikant et al. In [8], they have tried to analyze the rate allocation optimization problem with the help of game theory.

    Among the most important methods of the second category, we can refer to the research results in [7]. Kelly et al. In [7], in addition to implementing an extensive algorithm at the network level, they have tried to achieve the criterion of proportional justice. Among the most important features of this criterion, its proximity to the well-known congestion control method in the Internet by Jacobson et al. It is presented in [26]. Among other outstanding features of this algorithm, checking and proving its stability by selecting suitable Lyapunov functions.

    Since the time delay in the Kelly algorithm has received less attention, R.Johari and D.Tan have done extensive research in [11] to prove the stability of the Kelly algorithm in the presence of delay and under certain conditions, and have achieved significant results, and finally, the stability of the algorithm for a general network topology and arbitrary but limited delays by L. Massoulié in [27] and S.Deb and R.Srikant is presented in [28].

    The issue of user entry and exit in the Kelly algorithm is investigated in [10].

    One of the most effective methods applied to avoid congestion or control it is the use of costing methods2 on network links in exchange for the traffic passing through them [31,30,29] which in this Methods Each link imposes a fee on passing users for the cumulative traffic that passes through it, and this fee increases with the increase of passing cumulative traffic, and for example, in [7], such costing methods have been used in order to achieve fair and optimal rates for elastic users [32] in the network. Recently, due to the ever-increasing growth of applications on the Internet and the need for services that have specific limits for delay (or delay changes4), special attention has been paid to applying methods based on optimization and costing algorithms on real-time traffic5, and since

    one of the best ways to achieve service quality in the current Internet is the use of segregated services [33], applying costing methods to segregated services [34] and costing based on priority and real-time traffic costing using the concept of effective bandwidth 2 [35] are important current research fields and many researchers around the world are engaged in research in this field. It is based on utility function 3 in data networks.

  • Contents & References of Designing optimal rate allocation algorithms based on utility function in data networks

    List:

    Title

    Pages

    Table of Contents.. Eight

    Abstract..1

    Chapter One: Introduction

    1-1 Introduction ..2

    1-3 Explanation of the subject..5

    1-2 Order of Presentation Contents..6

    Chapter Two: Examining the concept of quality of service in data networks

    2-1 Introduction. 7

    2-2 Mechanisms in the network to create QoS. 8

    2-3 Queuing methods with continuous work. 9

    2-3-1 FIFO queuing method. 2-3-4 Round Robin queuing method.12

           2-3-5 Bitwise Round Robin method.

           2-3-6 practical method of fair bitwise round robin queuing. 2-3-9 Improved DRR method (DRR+) 15

    2-3-10 Weighted Fair Queuing (WFQ) method 15

    2-3-11 WF2Q method 15

    2-3-12 Delay-EDD and Jitter-EDD methods 16

    2-4 Queuing methods with work Non-persistent. 17

    2-4-1 Leaky Bucket method 18 2-4-2 Token Bucket method 18 2-5 Methods used to drop packets 18 2-5-1 Tail Dropping 19 2-5-2 Random Early Detection (RED) 19

    2-5-3 Weighted Random Early Detection (WRED). 19

    2-6 types of service classes in data networks. 20

    2-7 integrated services. ..25

    Chapter three: rate control and the concept of justice in data networks

    3-1 Introduction..26

    3-2 The concept of rate control and its goals. 27. 3-2-1 window-based methods 27. 3-2-2 rate-based methods 28. 3-3 division of existing traffic at the network level 29. 3-4 concept of fairness in rate allocation in data networks 31. 4-1 network model 32.

           3-4-2 maximum-minimum justice criterion.33

           3-4-3 proportional justice criterion..34

          3-4-4 minimum potential delay justice criterion.

           3-4-5 weighted bandwidth allocation.

           3-4-6 proportional justice criterion (W,a) 37. 3-5 Conclusion. 38. Chapter 4: Examining optimal rate allocation methods to network level users based on fluid flow perspective. 4-1 Introduction.

    4-3 Rate control in computer networks using the concept of cost.46

    4-3-1 Kelly algorithm for solving the network problem.49

    ..51

           4-3-5 Time delays ..52

           4-3-6 Matching users ..54

     

                                                                                                                                                                                                           Simultaneous optimization of the path and rate of users. Conclusion..60

    Chapter Five: Methods for Solving Constrained Convex Optimization Problems 1-5 Introduction ..61

    5-2 Constrained Convex Optimization ..62

    5-2-1 Gradient Image Method 63

    5-2-2 Weighted Gradient Image and Newton Algorithms 65

           5-2-3 Convergence check using slope method. 66

    5-2-7 penalty function method.74 6-3 Proposed Algorithms 76 6-3-1 Algorithm I 82 6-3-2 Algorithm II 84 6-3-3 Algorithm III 96 6-3-4 Algorithm IV 100 6-4 Stability of algorithms with proportional justice in the presence of time delay. 102

    6-5 Conclusion. 118

    Chapter Seven: Computer Simulation

    7-1 Introduction. 119

    7-2 Comparison of Algorithms I to IV with conventional algorithms. 119

           7-2-1 First example. 120

    7-2-2 Second example 129 7-2-3 Third example 140 7-2-4 Fourth example 151 7-2-5 Fifth example (checking the interaction of bottlenecks) 158 7-3 Simulating user entry and exit 161

    7-4 Simulation of other justice criteria in the fuzzy algorithm. 165

    7-5 Discrete event simulation. 166

    7-5-1 first part. 168

    7-5-2 second part. 177

    7-5-3 Simulation of hierarchical algorithm II in the presence of background traffic. 178

    7-5-4 Comparison of Fuzzy Algorithm with Kelly. 179

    7-6 Conclusion. 179

    Chapter Eight: Conclusion and Suggestions

    8-1 Conclusion 181

    8-2 Suggestions 184

    List of Symptoms Abbreviation 186. References 188. Appendices A-N) Supplementary figures related to computer simulation. . Attached CD

    Q) Some computer programs used in the simulation. CD attachment

    Source:

    [1] Tanenbaum, A.S., Computer Networks, 3rd edition, Prentice Hall, New Jersey, 1996.

    [2] Brakmo, L., TCP Vegas Release 0.8, Nov. 1994.

    http://www.cs.arizona.edu/protocols

    [3] Mitra, D. and Seery, J.B., “Dynamic adaptive window for high-speed data networks,” in Proc. ACM SIGCOMM'90 Conf., pp. 30-40, 1990.

    [4] Mitra, D. and Seery, J.B., “Dynamic adaptive windows for high-speed data networks with multiple paths and propagation delays,” Computer Networks and ISDN Systems, (25), pp. 663-679, 1993.

    [5] Floyd, S., “TCP and explicit congestion notification,” ACM Computer Communications Review, Vol. 24, No. 5, pp. 10-23, Oct. 1994.

    [6] Fall, K. and Floyd, S., “Simulation-based comparison of tahoe, reno and sack TCP,” ACM Compu. Commun. Rev., Vol. 26, No. 3, pp. 5-21, July 1996.

    [7] Kelly, F.P., Maulloo, A.K. and Tan, D.K.H., “Rate control for communication networks: shadow prices, proportional fairness and stability,” J. Oper. Res. Soc., Vol. 49, No. 3, pp. 237-252, Mar. 1998.

    [8] Kunniyur, S. and Srikant, R., “End-to-End Congestion Control Schemes: Utility Functions, Random Losses and ECN Marks,” IEEE INFOCOM Mar. 2000.

    [9] Fendick, K.W., Rodriguez, M.A. and Weiss, A., "Analysis of a rate-based feedback control strategy for long-haul data transport." Performance Evaluation, Vol. 16, pp. 67-84, 1992.

    [10] Tan, D.K.H., Mathematical Models of Rate Control for Communication Networks, Ph.D. dissertation, pp. 35-61, Cambridge university, Aug. 1999.

    [11] Johari, R. and Tan, D., “End-to-End congestion control for the Internet: Delays and Stability,” IEEE Trans. On Networking, Vol.9, No.6, pp. 818-832, Dec. 2001.

    [12] Massoulié, L. and Roberts, J., “Bandwidth sharing: objectives and algorithms,” in Proc. IEEE INFOCOM, Vol.3, 1999, pp. 1395-1403.

    [13] Mo, J. and Walrand, J., “Fair End-to-End Window-Based Congestion Control,” IEEE Transactions on Networking, Vol. 8, No. 5, pp. 556-567, Oct. 2000.

    [14] Hurley, P., Le Boudec, J.Y. and Thiran, P., "A note on the fairness of additive increase and multiplicative decrease," in Proc. ITC-16, Edinburg, Scotland, pp. 467-478, June 1999.

    [15] Bertsekas, D. and Tsitsiklis, J., Parallel and Distributed Computation. Englewood Cliffs, NJ: Prentice-Hall, 1989. [16] Gallagher, R.G. and Bertsekas, D., Data Networks, Prentice-Hall, NJ 1987. [17] Golestani, S.J.

Designing optimal rate allocation algorithms based on utility function in data networks