Next Article in Journal
Information Theoretic Causality Detection between Financial and Sentiment Data
Previous Article in Journal
A Compression-Based Method for Detecting Anomalies in Textual Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Diffusion Model of a Non-Integer Order PIγ Controller with TCP/UDP Streams

1
Department of Distributed Systems and Informatic Devices, Faculty of Automatic Control, Electronics and Computer Science, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
2
Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
Submission received: 24 April 2021 / Revised: 11 May 2021 / Accepted: 13 May 2021 / Published: 16 May 2021
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
In this article, a way to employ the diffusion approximation to model interplay between TCP and UDP flows is presented. In order to control traffic congestion, an environment of IP routers applying AQM (Active Queue Management) algorithms has been introduced. Furthermore, the impact of the fractional controller P I γ and its parameters on the transport protocols is investigated. The controller has been elaborated in accordance with the control theory. The TCP and UDP flows are transmitted simultaneously and are mutually independent. Only the TCP is controlled by the AQM algorithm. Our diffusion model allows a single TCP or UDP flow to start or end at any time, which distinguishes it from those previously described in the literature.

1. Introduction

Network protocols control the transfer of information between a transmitter and receiver. They have to fulfil many functionalities, for example, ensure the correctness of transmitted data and increase channel capacity. This article focuses on the problem of transmission efficiency. Traffic intensity has a stochastic nature. The protocols should adapt the transmission to the limited bandwidth and deterministic mechanisms of computer networks. The goal is to minimize information loss due to packet drops in overflowing buffers. These control activities are based on the exchange of information between sender and receiver. The article analyses two approaches to increase the efficiency (by minimizing packet loss) in the wide-area network:
  • a mechanism for controlling the speed of sending information at the transmitter level, due to the TCP protocol [1];
  • removing data from the network regulated by the AQM mechanism on the IP level [2].
Due to the rapid development of network communication technology, more and more attention has been focused on the problems of congestion control. Congestion is an important factor affecting a network’s Quality of Service (QoS) and reducing its performance. The Transport Control Protocol (TCP) has already been used in Internet applications for more than 30 years. During this time, several congestion control algorithms have been developed to meet the requirements of a constantly changing computer network. Active Queue Management (AQM) is a network approach to congestion prevention that works in combination with the TCP protocol. The most effective congestion control occurs when the AQM mechanism and TCP protocol work together [3].
The earliest of the AQM algorithms is called Random Early Detection (RED) [4]. In the past twenty years, many AQM mechanisms have been proposed. These mechanisms can be classified into three categories [5,6]: heuristic, optimization and control theory approach. The heuristic approach towards the AQM mechanism heavily depends on intuition. Examples of such mechanisms are inter alia, BLUE algorithm [7], hyperbola RED (HRED) [8], and Yellow algorithm [9]. These algorithms aim to improve packet loss, fairness, network utilization, and adaptability to different characteristics of the network traffic. The AQM based on the optimization approach was developed by Frank Kelly. His paper [10] transforms the design of the AQM algorithm to a convex optimization problem. Another AQM algorithm elaborated following the optimization theory was the Random Early Marking (REM) [11]. However, the AQM mechanisms based on the optimization theory are usually complex and hard to tune [6]. In this case, it is also difficult to control the instantaneous queue length of the router [12]. To overcome these effects, researchers have resorted to the control theory. The exact type of a P I γ controller used in this article belongs to the family of AQM mechanisms based on this theory, described in Section 2.
The dynamic model of the TCP behavior is required to enable the application of the control theory principles to AQM. The transient analysis should be performed in the model to provide us with time-dependent behavior of flows and queues. Apart from discrete time simulation, which is very time-consuming in the case of transient-state analysis, fluid flow or diffusion approximation methods can be used. Usually, due to its simplicity, the fluid flow method is the one used to model TCP networks [13,14,15,16]. The diffusion approximation, on the other hand, offers more accurate results. In the diffusion approximation model, traffic flows are determined by their mean and variance. On top of that, second-order partial equations describe queue changes.
In this paper, the transient behavior of the AQM mechanisms is analyzed via extending our earlier models presented in [17]. Comparing with previous results, the consideration of independent TCP/UDP streams that can start and end at any time constitutes a novelty. The diffusion approximation method is employed to trace the behavior of the AQM mechanisms applied to control Internet traffic. We are able to describe the features of RED, NLRED, PI and P I γ that were not possible to notice in an open-loop or a fluid-flow scenario. Table 1 presents main approaches to AQM based on PI and non-integer order P I γ controllers.
This paper is organized as follows: In Section 2 one can find the literature overview of AQM mechanisms based on the control theory approach. This section also describes an embedding of our model in the area of diffusion modelling. Section 3 gives a brief description of the AQM mechanism used in this paper. Section 4 describes our diffusion model of the P I γ controller with TCP/UDP streams. In Section 5, numerical results are presented. Section 6 concludes our work.

2. Background and Related Work

2.1. AQMs Based on the Control Theory Approach

Yes, it should be subsection, thank you. The detection and mitigation of congestion are some of the biggest problems in the computer networks domain [3]. Many mechanisms have been created to solve these issues. They are based on different operating principles. Most of the congestion avoidance mechanisms have been implemented in transport layer protocols such as TCP [26]. UDP applications, such as voice or video traffic, do not have any congestion avoidance mechanisms. In the case of such applications, it is possible to use the open-loop hop-by-hop backpressure strategy. In accordance with this strategy, a congested node broadcasts backpressure messages to upstream nodes to reduce their transmission rate [27]. This method is useful for bandwidth control but, unfortunately, introduces transmission delays. Therefore, there are many attempts to improve these kinds of algorithms, for example, [28]. Back pressure algorithms can be used in wireless sensor networks (WSNs) because of their limited need for: computation resources, storage, energy and communication bandwidth [27,29]. The TCP protocol and the back pressure mechanism are incompatible due to a mismatch between the TCP congestion control mechanism and the back pressure queue size based routing [26]. As a result, wider use of this solution in the Internet would require changes in the TCP protocol [26].
The traffic control in TCP/IP network is, in fact, a closed-loop algorithm in which AQM algorithm plays the role of a controller. The performance and dynamics of network connections can be studied using the control theory to improve their stability and to reduce the reaction time. Several feedback control algorithms have been developed. The article [30] proposes a fluid flow dynamic model of TCP/RED networks by using stochastic differential equations. Based on this dynamic model, several AQM controllers have been proposed using different control approaches. The article [13] proposes a Proportional-Integral (PI) controller on low-frequency dynamics. Authors of the article [31] propose adaptive Proportional (P) and Proportional-Integral (PI) controller and conclude that PI controller can adapt very well to the large fluctuation of the Internet traffic. The article [32] describes a new variant of the RED mechanism called Proportional-Derivative-RED (PD-RED) that performs better than Adaptive RED. Authors of [19] propose the Proportional-Integral-Differential (PID) controller to speed up the responsiveness of the AQM system. Among them, PI controllers are attracting increased attention because of their computation, and implementation simplicity [18]. The article [6] tries to preserve the simplicity of the PI controller by proposing a self-tuning compensated PID controller.
Traditional calculus is based on integer-order differentiation and integration. Differentiation or integration of non-integer order have been used in many mathematical models of dynamic systems. The article [33] claims that many real dynamic systems are better characterized using a fractional dynamic model. Authors indicate that non-integer order controllers provide better performance than the conventional integer order ones. The article [20] presents the first application of the fractional order PI controller to an AQM strategy. The authors focus on the method for determining the parameter regions where the P I γ controller ensures a given modulus margin (inverse of the H norm of the sensitivity function). The article [21] describes an evaluation of the fractional-order P I γ controller used as an AQM mechanism. The performance of the controller is evaluated using fluid flow approximation (closed-loop control) and simulation (open loop scenario). The article [34] studies the proper selection of the P I α D β parameters to show an influence of the proportional, integral and derivative terms on the controller’s dropping function. A simulation model is used in this article. The article [17] proposes a new model of the P I γ controller based on a diffusion approximation approach. This model is able to provide more detailed information on transmission delays than the frequently used fluid flow model.

2.2. Diffusion Approximation

Diffusion models refer to the changes of flows defined by their mean and variance. They are more accurate than the fluid flow models, where only the mean value is considered. They use the central limit theorem to justify that the number of arrivals and services at a queueing system tends to the normal distribution and a diffusion process may represent the queue length. The solution of the diffusion equation with parameters depending on the analyzed system approximates a queue distribution. This way, the models easily incorporate general distributions of interarrival and service times and the transient queue behavior.
The diffusion approximation has been used to study the performance evaluation of computer systems and networks for many years. The tutorial [35] describes how the diffusion approximation formalism can be applied to the analysis of some traffic control mechanisms in the ATM network. The article [36] presents the diffusion model of wireless network based on the IEEE 802.11 protocol. In the article [37], the first attempt to model the TCP/RED router using diffusion approximation is made. The article [38] applies diffusion approximation to model the influence of a buffer capacity on Quality of Experience in wireless video connections. In our article [17], a new model of TCP NewReno based on the diffusion approximation method is developed. The combined diffusion approximation and simulation model is proposed in [25]. These models allow analyzing the behavior of a single TCP stream. To the best of our knowledge, there is no diffusion model described in the literature which can be used to analyze the independent TCP/UDP streams.

3. RED, NLRED and a Non-Integer Order PI γ Controllers

The traffic control built-in a TCP/IP protocol is a typical closed-loop one. The flow of packets emitted by a sender is controlled by the loss probability p observed in routers and reported to the sender with a certain delay. The losses decrease the traffic, and their lack increases it. In the case of a passive router, the losses occur when the router queue is full.
The RED family algorithms determine the dropping probability even if there is still a place to store packets but the queue increases. They use the weighted moving average a v g computed at packets’ arrival; for packet i:
a v g i = ( 1 w ) a v g i 1 + w q i
where a v g i 1 is the moving average computed at the arrival of the previous packet, and q i is the queue seen by the packet i. The probability of a loss is for small values of a v g   p R E D = 0 . As a v g grows, the probability increases linearly between two thresholds M i n t h and M a x t h , from 0 to p m a x .
P R E D ( a v g ) = p m a x a v g M i n t h M a x t h M i n t h
Finally, it becomes p R E D = 1 given a v g > M a x t h .
Another modification of RED is NLRED (non-linear RED) algorithm [39]. In this mechanism, the linear packet dropping function is replaced by a quadratic function:
p = 0 for   a v g < M i n t h ( a v g M i n t h M a x t h M i n t h ) 2 P m a x for   M i n t h a v g M a x t h 1 for   a v g > M a x t h
Paper [40] proposes another approach to a non-linear packet dropping function. This function is based on the third-degree polynomials instead of the well-known quadratic function. This approach allows to choose the optimal packet dropping function:
p ( a v g , a 1 , a 2 , p m a x ) = 0 for   a v g < M i n t h φ 0 ( a v g ) + a 1 φ 1 ( a v g ) + a 2 φ 2 ( a v g ) for   M i n t h a v g M a x t h 1 for   a v g > M a x t h
where:
φ 0 ( a v g ) = p m a x a v g M i n t h M a x t h M i n t h ,
φ 1 ( a v g ) = ( a v g M i n t h ) ( M a x t h a v g ) ,
φ 2 ( a v g ) = ( a v g M i n t h ) 2 ( M a x t h a v g )
Probability p can also be determined directly by the controller by comparing the current queue q i and the queue q 0 we wish to maintain. Their difference, called error in the control theory, is the input signal to the controller, which may be the classical PID one or, as it has been investigated recently, the proportional-integral P I γ of fractional, that is, non-integer order. Fractional derivatives and integrals are known since the times of Leibnitz and recently become used in the control of physical processes [41].
In the case of the P I γ controller, the loss probability p i of a packet i is equal to:
p i = m a x { 0 , ( K P e i + K I Δ γ e i ) }
It depends on the proportional and integral terms K P , K I , the error e i = q i q , and the order of integration γ . Their impact is further discussed in the articles [21,22,34,42].
The packet drop probability is determined at discrete moments of packet arrivals. There exists only one definition of the non-integer order discrete differ-integral. It [43] is a generalization of the traditional definition of the difference between the integer-order and the non-integer one and is analogous with the generalization employed in the Grünwald-Letnikov (GrLET) formula [44,45].
For a given sequence f 0 , f 1 , . . . , f j , . . . , f k
γ f k = j = 0 k ( 1 ) j γ j f k j
where γ R is by and large a non-integer fractional order, f k is a differentiated discrete function, and γ j is a generalised Newton symbol which definition looks as follows:
γ j = 1 for   j = 0 γ ( γ 1 ) ( γ 2 ) . . ( γ j + 1 ) j ! for   j = 1 , 2 ,
Parameters of the non-integer order P I γ controller are presented in Table 2.

4. Diffusion Approximation of the TCP and UDP Network Streams

In this section, how to model the AQM router supporting TCP/UDP flows using the diffusion approximation is described. The main goal of the analysis presented below is to model the Active Queue Management based on the answer of P I γ controller.
The method of diffusion approximation is used in queueing theory (e.g., [46,47,48,49]) when it is hard to determine a queue distribution. The queue length is replaced by the value of diffusion process X(t). The probability density function (pdf) of the letter, f ( x , t ; x 0 )
f ( x , t ; x 0 ) d x = P [ x X ( t ) < x + d x | X ( 0 ) = x 0 ]
of X ( t ) , is given by the diffusion equation:
f ( x , t ; x 0 ) t = α 2 2 f ( x , t ; x 0 ) x 2 β f ( x , t ; x 0 ) x
and helps us to evaluate the queue distribution. It is usually used in the analysis of G/G/1 queueings systems, that is, having general distributions of interarrival and service times or G/G/1/L, where additionaly the queue is limited to L positions. In the latter case the number of packets in router is in the range [ 0 , L ] and therefore the diffusion process is limited by barriers in x = 0 and x = L , and the diffusion equation is used in the form [47]:
f ( x , t ; x 0 ) t = α 2 2 f ( x , t ; x 0 ) x 2 β f ( x , t ; x 0 ) x + λ p 0 ( t ) δ ( x 1 ) + λ p L ( t ) δ ( x L + 1 )
d p 0 ( t ) d t = lim x 0 [ α 2 f ( x , t ; x 0 ) x β f ( x , t ; x 0 ) ] λ p 0 ( t ) , d p L ( t ) d t = lim x L [ α 2 f ( x , t ; x 0 ) x β f ( x , t ; x 0 ) ] μ p L ( t ) .
In the above equations, [ p 0 ( t ) , p L ( t ) ] denote probabilities that the process is in either of barriers, λ and μ are the intensities of jumps from barriers; from x = 0 to x = 1 and from x = L to x = L 1 corresponding to the arrival of a packet to the empty queue or departure of a packet from the full queue. Parameters β and α are chosen as β = λ μ , α = λ 3 σ A 2 + μ 3 σ B 2 , where 1 / λ , 1 / μ are the first moments of interarrival and service time distributions, and σ A 2 , σ B 2 are their varainces, more information plesae see Table 3. This way the changes of the diffusion process and of the queue have the same mean and variance. The steady-state solution of Equation (12) is given in [47] and the transient case is considered in [49].
Below, we expand this model to include a number of independent streams. We assume a queue supports k input streams. For each stream, packets arrive at intervals which are described by the distribution A ( k ) ( x ) . The service time distribution is equal to B ( k ) ( x ) . The k input stream ( k = 1 , . . . , K ) is described by the distribution A ( k ) ( x ) , (with the average value 1 / λ ( k ) and variance σ A ( k ) 2 ). The service time of the k stream has a distribution B ( k ) ( x ) with the average value 1 / μ ( k ) and variance σ B ( k ) 2 . The density functions of these distributions are denoted by a ( k ) ( x ) i b ( k ) ( x ) . We assume input streams of individual classes are independent. The normal distribution of the number of packets of a k-th stream coming over a period of time is approximately equal to λ ( k ) t , with a variance satisfying the equation λ ( k ) 3 σ A ( k ) 2 t = λ ( k ) C A ( k ) 2 t . The number of packets of all streams that arrived during this time has also a normal distribution with the average value λ t = k = 1 K λ ( k ) t and a variance satisfying the equation λ C A 2 t = k = 1 K λ ( k ) C A ( k ) 2 t . So, the parameters of the totality of streams are:
λ ( t ) = k = 1 K λ ( k ) ( t ) , C A 2 = k = 1 K λ ( k ) ( t ) λ ( t ) C A ( k ) 2
where λ ( k ) ( t ) λ ( t ) is the probability that a given packet belongs to a stream k which allows us to determine the resultant service time parameters:
1 μ = k = 1 K λ ( k ) λ 1 μ ( k ) , C B 2 = μ 2 k = 1 K [ λ ( k ) λ 1 μ ( k ) 2 ( C B ( k ) 2 + 1 ) ] 1 ,
and then the parameters α , β of the diffusion equations:
β ( t ) = λ ( t ) + μ , α ( t ) = λ ( t ) C A 2 + μ C B 2
The distribution p ( n ) f ( n ) specifies the number of packets of all streams in the queue, and the probability that there are v packets which belong to the k-th stream in the queue equals to:
p ( k ) ( v ) = n = v [ p ( n ) n v ( λ ( k ) λ ) v ( 1 λ ( k ) λ ) n v ] ,
where k = 1 , . . . , K .
In the article, the case of two kinds of input streams is presented. UDP stream is a CBR stream with assumed number of packets sent per time unit ( λ U D P ( t ) is constant) and TCP stream for which the input intensity changes according to the TCP NewReno congestion control algorithm ( λ T C P ( t ) is shaped by the AQM mechanism). When the diffusion model is considered, the total intensity of the input stream is equal to the sum of intensities of the components.
In the case of two input streams, one TCP and one UDP, the mean and the variance of input distribution for a queue is calculated as follows:
β ( t ) = λ T C P ( t ) λ U D P ( t ) μ
α ( t ) = [ λ T C P ( t ) + λ U D P ( t ) ] [ σ A T C P 2 ( t ) λ T C P 3 ( t ) + σ A U D P 2 ( t ) λ U D P 3 ( t ) λ T C P ( t ) + λ U D P ( t ) ] + μ C B 2
α ( t ) = σ A T C P 2 ( t ) λ T C P 3 ( t ) + σ A U D P 2 ( t ) λ U D P 3 ( t ) + μ C B 2
The TCP NewReno/AQM model based on the diffusion approximation works as follows: The diffusion approximation gives the distribution of the router’s queue at time t. The mean value of this queue length modifies the packet rejection probability. This probability affects the intensity l of the input stream because the congestion window increases by one for lossless transmission or halves for packet loss. We assume that the flow λ , the size of the congestion window W, and the delay q / μ of the router are linked together in the following way:
λ = W μ q
where 1 / μ is the mean service time. In the diffusion model, the calculations are carried out inside the intervals of length Δ t = 1 / λ . When λ changes, the length of the interval changes as well. We obtain a queue distribution at time t i at the end of the interval i. Based on it, we get the average queue length E [ q i ] and then the probability of packet rejection p i which defines new value of λ : λ i + 1 = λ i + Δ λ i due to the AQM algorithm, where
Δ λ i = μ i E [ q i ] λ i 2 2 E [ q i ] μ p i .
Over the time t i + 1 = t i + 1 / λ i , we repeat the calculations for a new value of λ . In the model presented in this article it is assumed that the i-th flow can start or end a transmission at any moment. The change in the source intensity Δ λ in the time t affects the dispatching time and the queue length. The algorithm of these calculations is presented in Figure 1.

5. Numerical Results

In this chapter, the results obtained through the method described above are discussed. We employ the proposed numerical scheme to obtain the transient behavior of TCP window dynamics and queue length. The results for various types of input streams and AQM mechanisms (RED, NLRED, PI, P I γ ) are discussed.
We assume the following parameters of the AQM buffer: M i n t h = 10 , M a x t h = 20 , buffer size (measured in packets) = 30 .
The parameters of RED are as follows: weight parameter w = 0.008 , p m a x = 0.02 . Article [50] shows the impact of RED parameters on the network traffic. Using higher values of these parameters results in the increase in network traffic fluctuations. This choice of RED parameters shows more clearly the influence of TCP/UDP flows on the AQM queue behavior [17]. These parameters are slightly different than those proposed in the literature [51]. The NLRED parameters are as follows: a 1 = 0.00042 , a 2 = 0.0000038 and p m a x = 0.855 . Article [40] proposes using parameters with such values to achieve the best transmission performance.
The parameters of P I γ : s e t p o i n t = 10 , P = 0.0001 , I = 0.005 , γ = 0.4 . For γ = 1.0 the PI controller is considered (Table 4). The proper choice of AQM/PI controller parameters is difficult. It strongly affects the packet dropping function (i.e., integral order γ accelerates and strengthens the controller’s response). Proper selection of AQM parameters should help achieve two goals: obtaining desired queue behavior and adaptation to network transmission conditions. The influence of the controller’s parameters on queue behavior is discussed in papers [21,22].
Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14, Figure 15, Figure 16 and Figure 17 show the evolution of sources intensity and queue length. In Figure 2 the queue behavior in the case of one TCP flow and P I γ controller is shown. The source intensity increases until the queue reaches the desired length. Exceeding the desired queue length increases the probability of a packet loss in AQM and thus causes reduction in the source intensity. Consequently, the queue occupancy and packet loss probability decreases. So, the source intensity increases after some time. Source intensity and queue length oscillations continue until a stable state is reached. In the stable state, the average queue length reaches 10.2 packets, and the source intensity reaches λ = 1 . In the case of a P I controller (Figure 2) the average queue length reaches almost the same value ( 10.01 packets). Nevertheless, the queue occupancy still oscillates between extreme values. Such oscillations, associated with a big fractional order of the controller, are described in the article [24].
The behaviors of a single TCP stream in cooperation with the RED algorithm (Figure 4) and NLRED (Figure 5) are shown. It is identical to the previous one (Figure 2). The average queue length reaches 14.7 for RED and 10.5 packets for NLRED, the source intensity reaches λ = 1 . This value is roughly halfway between M i n t h and M a x t h .
In Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14, Figure 15, Figure 16 and Figure 17 the behavior of the TCP/UDP AQM system for several co-transmitted data streams is portrayed.
In Figure 6, Figure 7, Figure 8 and Figure 9 simultaneous transmission of TCP and UDP streams is presented. Figure 6 shows the situation where a queue is controlled by the P I γ mechanism. The TCP transmitter starts a transmission at time t = 0 . The TCP window evolution proceeds, as shown in Figure 2. At t = 200 the UDP stream (constant intensity λ = 0.5 ) starts its transmission. Thereby, the intensity of the TCP stream is reduced and the queue occupancy is increased. Over time, the controller attempts to stabilize the queue at the desired level. At t = 650 , the UDP stream ends its transmission. As a result, the queue length decreases. The end of the UDP transmission also causes the TCP window to grow. Consequently, the queue length increases up to the desired size. When it comes to the P I controller (Figure 7), queue fluctuations occur as previously. They disappear when an additional UDP stream is loaded into the system and reappear once it has finished the transmission. This behavior is also visible in the next experiments. A similar layout of input streams is presented in Figure 8 and Figure 9. In the case of the RED and NLRED algorithms, the commencement of the UDP stream increases the queue length. For the RED mechanism, it reaches the value near M a x t h .
In Figure 10, Figure 11, Figure 12 and Figure 13 the case of one TCP and two UDP streams employed is depicted. TCP works all the time. The first constant bit rate UDP stream ( λ = 0.5 ) starts transmission at time t = 200 and finishes at t = 600 . The second UDP stream ( λ = 0.3 ) transmits between t = 350 and t = 450 . The second UDP stream causes queue overload. In both cases ( P I γ and RED queue), the queue’s occupancy increases dramatically. The P I γ mechanism slowly stabilizes the queue, reducing the queue size (Figure 11). The RED (Figure 12) and NLRED (Figure 13) mechanisms cannot handle such amounts of input data. In the case of a RED algorithm, the size of the queue oscillates around the point M a x t h .
In Figure 14, Figure 15, Figure 16 and Figure 17 the situation when two TCP streams cooperate is shown. At the moment when the second stream is switched on, the intensity of both sources stabilises at the same level ( λ = 0.5 ). In the case of the RED algorithm, the queues occupancies are set at values close to the M a x t h = 19.45 . For NLRED mechanism, the average queue size reaches 10.1. In the case of the P I γ controller, the queue length, after a temporary increase, sags to the desired value. This trend ends when the second source ends its transmission.

6. Conclusions

This article describes the use of the diffusion approximation to estimate the behavior of the AQM mechanisms, their influence on the evolution of the TCP congestion window and potential cooperation of more TCP/UDP streams. Analytical methods for assessing network mechanisms known from the literature, with the exception of the fluid flow method, are not very suitable for evaluating TCP mechanisms. In the article [17], we have presented a new approach of using the diffusion approximation to model the behavior of the TCP stream. In this article, we expand the given mechanism with the possibility of evaluation of cooperation of more TCP/UDP streams.
The experiments also show the good points of the fractional order controller P I γ . Decreasing the integration order of the controller reduces the queue fluctuation.
On the other hand, the new approach gets a completely different view on the cooperation of the TCP/UDP protocol with the AQM mechanisms. Our model allows starting and ending the TCP/UDP transmission at any time. The described approach allows us to observe the dynamics of a transmission when different sources start or end their transmission.
The impact of the AQM algorithm on the dynamics of the TCP window is also presented. Our study shows differences in queue behavior in the case of different AQM mechanisms.

Author Contributions

Conceptualization, D.M., A.D., J.D., J.S., T.C. and J.K.; Formal analysis, J.D. and J.K.; Investigation, D.M. and J.S.; Methodology, A.D., D.M. and T.C.; Project administration, J.K.; Software, A.D., D.M. and J.S.; Supervision, A.D. and J.D.; Validation, T.C.; Visualization, D.M. and J.S.; Writing—original draft, A.D. and J.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was financed by National Science Center project no. 2017/27/B/ST6/00145.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yue, Z.; Zhang, X.; Ren, Y.; Li, J.; Zhong, Q. The performance evaluation and comparison of TCP-based high-speed transport protocols. In Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering, Beijing, China, 22–24 June 2012; pp. 509–512. [Google Scholar] [CrossRef]
  2. Chydzinski, A. On the Transient Queue with the Dropping Function. Entropy 2020, 22, 825. [Google Scholar] [CrossRef] [PubMed]
  3. Grazia, C.A.; Patriciello, N.; Klapez, M.; Casoni, M. A cross-comparison between TCP and AQM algorithms: Which is the best couple for congestion control? In Proceedings of the 14th International Conference on Telecommunications (IEEE ConTEL), Zagreb, Croatia, 28–30 June 2017; pp. 75–82. [Google Scholar]
  4. Floyd, S.; Jacobson, V. Random Early Detection gateways for congestion avoidance. IEEE/ACM Trans. Netw. 1993, 1, 397–413. [Google Scholar] [CrossRef]
  5. Feng, C.; Huang, L.; Xu, C.; Chang, Y. Congestion Control Scheme Performance Analysis Based on Nonlinear RED. IEEE Syst. J. 2017, 11, 2247–2254. [Google Scholar] [CrossRef]
  6. Kahe, G.; Jahangir, A.H. A self-tuning controller for queuing delay regulation in TCP/AQM networks. Telecommun. Syst. 2019, 71, 215–229. [Google Scholar] [CrossRef]
  7. Feng, W.-C.; Shin, K.G.; Kandlur, D.D.; Saha, D. The BLUE Active Queue Management algorithms. IEEE/ACM Trans. Netw. 2002, 10, 513–528. [Google Scholar] [CrossRef]
  8. Hu, L.; Kshemkalyani, A.D. HRED: A simple and efficient Active Queue Management algorithm. In Proceedings of the 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969), Chicago, IL, USA, 11–13 October 2004; pp. 387–393. [Google Scholar]
  9. Long, C.; Zhao, B.; Guan, X.; Yang, J. The Yellow Active Queue Management algorithm. Comput. Netw. 2005, 47, 525–550. [Google Scholar] [CrossRef]
  10. Kelly, F. Mathematical Modelling of the Internet. In Mathematics Unlimited—2001 and Beyond; Springer: Berlin/Heisenberg, Germany, 2001; pp. 685–702. [Google Scholar]
  11. Athuraliya, S.; Low, S.H.; Li, V.H.; Yin, Q. REM: Active Queue Management. IEEE Netw. 2001, 15, 48–53. [Google Scholar] [CrossRef] [Green Version]
  12. Li, Z.; Liu, Y.; Jing, Y. Active Queue Management Algorithm for TCP Networks with Integral Backstepping and Minimax. Int. J. Control Autom. Syst. 2019, 17, 1059–1066. [Google Scholar] [CrossRef]
  13. Hollot, C.V.; Misra, V.; Towsley, D. Analysis and design of controllers for AQM routers supporting TCP flows. IEEE Trans. Autom. Control 2002, 47, 945–959. [Google Scholar] [CrossRef] [Green Version]
  14. Shah, P.; Yasmin, S.; Asghar, S.; Qayyum, A.; Hasbullah, H. A Fluid Flow Model for SCTP Traffic over the Internet. In Proceedings of the International Conference on Emerging Technologies (ICET), Islamabad, Pakistan, 8–9 October 2012; pp. 1–6. [Google Scholar] [CrossRef]
  15. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J. Fluid flow approximation of time-limited TCP/UDP/XCP streams. Bull. Pol. Acad. Sci. Tech. Sci. 2014, 62, 217–225. [Google Scholar] [CrossRef] [Green Version]
  16. Bonaventura, M.; Castro, R. Fluid-flow and packet-level models of data networks unified under a modular/hierarchical framework: Speedups and simplicity, combined. In Proceedings of the 2018 Winter Simulation Conference (WSC), Gothenburg, Sweden, 9–12 December 2018; pp. 3825–3836. [Google Scholar]
  17. Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Szyguła, J.; Marek, D. Diffusion Approximation Model of TCP NewReno Congestion Control Mechanism. Springer Nat. Comput. Sci. 2020, 1, 43. [Google Scholar] [CrossRef] [Green Version]
  18. Unal, H.; Melchor-Aguilar, D.; Ustebay, D.; Niculescu, S.I.; Ozbay, H. Comparison of PI controllers designed for the delay model of TCP/AQM. Comput. Commun. 2013, 36, 1225–1234. [Google Scholar] [CrossRef]
  19. Fan, Y.; Ren, F.; Lin, C. Design a PID controller for Active Queue Management. In Proceedings of the Eighth IEEE Symposium on Computers and Communications, ISCC 2003, Kemer-Antalya, Turkey, 3 July 2003; Volume 2, pp. 985–990. [Google Scholar]
  20. Krajewski, W.; Viaro, U. On robust fractional order PI controller for TCP packet flow. In Proceedings of the BOS Coference: Systems and Operational Research, Angers, France, 6–8 March 2014. [Google Scholar]
  21. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J. The use of a non-integer order PI controller with an Active Queue Management Mechanism. Int. J. Appl. Math. Comput. Sci. 2016, 26, 777–789. [Google Scholar] [CrossRef] [Green Version]
  22. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J. Self-similarity Traffic and AQM Mechanism Based on Non-integer Order PIαDβ Controller. Commun. Comput. Inf. Sci. Springer Int. Publ. 2017, 718, 336–350. [Google Scholar] [CrossRef]
  23. Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Marek, D.; Szyguła, J. The Influence of the Traffic Self-similarity on the Choice of the Non-integer Order PIα Controller Parameters. Commun. Comput. Inf. Sci. Springer Int. Publ. 2018, 935, 76–83. [Google Scholar] [CrossRef]
  24. Szyguła, J.; Domański, A.; Domańska, J.; Czachórski, T.; Marek, D.; Klamka, J. AQM Mechanism with Neuron Tuning Parameters. In Intelligent Information and Database Systems; Springer: Berlin/Heisenberg, Germany, 2020; pp. 299–311. [Google Scholar] [CrossRef]
  25. Marek, D.; Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Szyguła, J. Combined diffusion approximation–simulation model of AQM’s transient behavior. Elsevier Comput. Commun. 2020, 166, 40–48. [Google Scholar] [CrossRef]
  26. Seferoglu, H.; Modiano, E. TCP-aware backpressure routing and scheduling. In Proceedings of the Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 9–14 February 2014; pp. 1–9. [Google Scholar] [CrossRef] [Green Version]
  27. Bohloulzadeh, A.; Mehri, R. A Survey on Congestion Control Protocols in Wireless Sensor Networks. Int. J. Wirel. Inf. Netw. 2020, 365–384. [Google Scholar] [CrossRef]
  28. Athanasopoulou, E.; Bui, L.X.; Ji, T.; Srikant, R.; Stolyar, A. Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks. IEEE/ACM Trans. Netw. 2013, 21, 244–257. [Google Scholar] [CrossRef]
  29. Jan, M.A.; Jan, S.; Alam, M.; Akhunzada, A.; Rahman, I. A Comprehensive Analysis of Congestion Control Protocols in Wireless Sensor Networks. Mob. Netw. Appl. 2018, 23, 456–468. [Google Scholar] [CrossRef]
  30. Misra, V.; Gong, W.; Towsley, D. Fluid-based analysis of network of AQM routers supporting TCP flows with an application to RED. Comput. Commun. Rev. 2000, 30, 151–160. [Google Scholar] [CrossRef]
  31. Hong, Y.; Yang, O.W.W. Adaptive AQM controllers for IP routers with a heuristic monitor on TCP flows. Int. J. Commun. Syst. 2006, 19, 17–38. [Google Scholar] [CrossRef]
  32. Sun, J.; Ko, K.; Chen, G.; Chan, S.; Zukerman, M. PD-RED: To improve the performance of RED. IEEE Commun. Lett. 2003, 7, 406–408. [Google Scholar]
  33. Chen, Y.; Petras, I.; Xue, D. Fractional order control—A tutorial. In Proceedings of the American Control Coference, St. Louis, MO, USA, 10–12 June 2009; pp. 1397–1411. [Google Scholar]
  34. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J.; Szyguła, J. The AQM Dropping Packet Probability Function Based on Non-integer Order PIαDβ Controller. In Lecture Notes in Electrical Engineering; Springer: Berlin/Heisenberg, Germany, 2019; Volume 496, pp. 36–48. [Google Scholar] [CrossRef]
  35. Czachórski, T.; Pekergin, F. Diffusion Approximation as a Modelling Tool. In Network Performance Engineering—A Handbook on Convergent Multi-Service Networks and Next Generation Internet, LNCS; Springer: Berlin/Heisenberg, Germany, 2011; Volume 5233, pp. 447–476. [Google Scholar] [CrossRef]
  36. Czachórski, T.; Grochla, K.; Nycz, T.; Pekergin, F. A diffusion approximation model for wireless networks based on IEEE 802.11 standard. Comput. Commun. 2010, 33, 86–92. [Google Scholar] [CrossRef]
  37. Nycz, T.; Nycz, M.; Czachórski, T. A Numerical Comparison of Diffusion and Fluid-Flow Approximations Used in Modelling Transient States of TCP/IP Networks. Commun. Comput. Inf. Sci. 2014, 431, 213–222. [Google Scholar]
  38. Qi, Y.; Ohtsuki, T. QoE-Aware Video Streaming Transmission Optimization Method for Playout Threshold Adjustment in LTE. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–5. [Google Scholar]
  39. Zhou, K.; Yeung, K.; Li, V. Nonlinear RED: A simple yet efficient Active Queue Management scheme. Comput. Netw. Int. J. Comput. Telecommun. Netw. 2006, 50, 3784–3794. [Google Scholar] [CrossRef]
  40. Domańska, J.; Augustyn, D.; Domański, A. The choice of optimal 3-rd order polynomial packet dropping function for NLRED in the presence of self-similar traffic. Bull. Pol. Acad. Sci. Tech. Sci. 2012, 60, 779–786. [Google Scholar] [CrossRef]
  41. Podlubny, I. Fractional order systems and PIλDμ controllers. IEEE Trans. Autom. Control 1999, 44, 208–214. [Google Scholar] [CrossRef]
  42. Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Marek, D.; Szyguła, J. GPU Accelerated Non-integer Order PIαDβ Controller Used as AQM Mechanism. In Communications in Computer and Information Science; Springer: Berlin/Heisenberg, Germany, 2018; Volume 860, pp. 286–299. [Google Scholar] [CrossRef]
  43. Miller, K.; Ross, B. An Introduction to the Fractional Calculus and Fractional Differential Equations; Wiley: New York, NY, USA, 1993. [Google Scholar]
  44. Podlubny, I. Fractional Differential Equations; Academic Press: San Diego, CA, USA, 1999; Volume 198. [Google Scholar]
  45. Ciesielski, M.; Leszczynski, J. A Numerical Method for Solution of Ordinary Differential Equations of Fractional Order. In Parallel Processing and Applied Mathematics; Springer: Berlin/Heisenberg, Germany, 2002; Volume 2328, pp. 695–702. [Google Scholar] [CrossRef]
  46. Newell, G.F. Queues with time-dependent arrival rates. I—The transition through saturation. J. Appl. Probab. 1968, 2, 436–451. [Google Scholar] [CrossRef] [Green Version]
  47. Gelenbe, E. On Approximate Computer Systems Models. J. ACM 1975, 22, 261–269. [Google Scholar] [CrossRef]
  48. Gelenbe, E. A Diffusion Model for Packet Travel Time in a Random Multi-hop Medium. ACM Trans. Sens. Netw. (TOSN) 2007, 3, 10. [Google Scholar] [CrossRef]
  49. Czachórski, T. A method to solve Diffusion Equation with Instantaneous return Processes Acting as Boundary Conditions. Bull. Pol. Acad. Sci. Tech. Sci. 1993, 41, 417–451. [Google Scholar]
  50. Bonald, T.; May, M.; Bolot, J. Analytic evaluation of RED performance. In Proceedings of the INFOCOM, Tel Aviv, Israel, 26–30 March 2000. [Google Scholar]
  51. Zheng, B.; Atiquzzaman, M. A Framework to Determine the Optimal Weight Parameter of RED in Next-Generation Internet Routers. Int. J. Commun. Syst. 2008, 21, 987–1008. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Flowchart of our model behavior.
Figure 1. Flowchart of our model behavior.
Entropy 23 00619 g001
Figure 2. 1 TCP with P I γ controller.
Figure 2. 1 TCP with P I γ controller.
Entropy 23 00619 g002
Figure 3. 1 TCP with P I controller.
Figure 3. 1 TCP with P I controller.
Entropy 23 00619 g003
Figure 4. 1 TCP with RED controller.
Figure 4. 1 TCP with RED controller.
Entropy 23 00619 g004
Figure 5. 1 TCP with NLRED controller.
Figure 5. 1 TCP with NLRED controller.
Entropy 23 00619 g005
Figure 6. 1 TCP and 1 UDP with P I γ controller.
Figure 6. 1 TCP and 1 UDP with P I γ controller.
Entropy 23 00619 g006
Figure 7. 1 TCP and 1 UDP with P I controller.
Figure 7. 1 TCP and 1 UDP with P I controller.
Entropy 23 00619 g007
Figure 8. 1 TCP and 1 UDP with RED controller.
Figure 8. 1 TCP and 1 UDP with RED controller.
Entropy 23 00619 g008
Figure 9. 1 TCP and 1 UDP with NLRED controller.
Figure 9. 1 TCP and 1 UDP with NLRED controller.
Entropy 23 00619 g009
Figure 10. 1 TCP and 2 UDP with P I γ controller.
Figure 10. 1 TCP and 2 UDP with P I γ controller.
Entropy 23 00619 g010
Figure 11. 1 TCP and 2 UDP with P I controller.
Figure 11. 1 TCP and 2 UDP with P I controller.
Entropy 23 00619 g011
Figure 12. 1 TCP and 2 UDP with RED controller.
Figure 12. 1 TCP and 2 UDP with RED controller.
Entropy 23 00619 g012
Figure 13. 1 TCP and 2 UDP with NLRED controller.
Figure 13. 1 TCP and 2 UDP with NLRED controller.
Entropy 23 00619 g013
Figure 14. 2 TCP with P I γ controller.
Figure 14. 2 TCP with P I γ controller.
Entropy 23 00619 g014
Figure 15. 2 TCP with P I controller.
Figure 15. 2 TCP with P I controller.
Entropy 23 00619 g015
Figure 16. 2 TCP with RED controller.
Figure 16. 2 TCP with RED controller.
Entropy 23 00619 g016
Figure 17. 2 TCP with NLRED controller.
Figure 17. 2 TCP with NLRED controller.
Entropy 23 00619 g017
Table 1. Main approaches of AQM based on PI and non-integer order P I γ controllers.
Table 1. Main approaches of AQM based on PI and non-integer order P I γ controllers.
PI (Simulation) [18]Study of the TCP/AQM mechanisms based on PI controllers
PID (Simulation) [19]Evaluation of the AQM based on non-integer order PID controller
P I γ (Fluid-Flow) [20]First application of non-integer order P I γ controller to an AQM strategy
P I γ (Fluid-Flow/Simulation) [21]Fluid flow approximation and discrete-event simulation to investigate the influence of the AQM policy based on non-integer order P I γ controller on the packet loss probability, the queue length and its variability
P I γ D ω (Simulation) [22]Model of AQM mechanism based on non-integer order P I γ D ω  controller
P I γ (Simulation) [23]Finding optimal parameters of the non-integer order P I γ controller used as AQM mechanisms. The optimization was made by using the well-known Hooke and Jeeves direct search method applied for minimization of a multivariate score function
Adapted P I γ (Simulation) [24]Choice of non-integer order P I γ controller parameters based on machine learning algorithms. The controller parameters automatically adjust to network traffic parameters (traffic intensity and self-similarity)
TCP P I γ (Diffusion) [17]The diffusion approximation model of the simple TCP traffic. Evaluation (in close loop scenario) of the effectiveness of active queue management (AQM) mechanisms based non-integer order P I γ  controller
TCP P I γ (Combined Diffusion and Simulation) [25]Combined diffusion approximation and simulation model based on non-integer order P I γ controller
Table 2. Parameters of the non-integer order P I γ controller.
Table 2. Parameters of the non-integer order P I γ controller.
K P Proportional term
K I Integral term
γ Integral order
e i Error in current slot
q i Actual queue length
qDesired queue length
Table 3. Main notations and parameters of the diffusion model.
Table 3. Main notations and parameters of the diffusion model.
λ Intensity of the input traffic
μ Intensity of packet processing and dispatching
σ A 2 Variance of interarrival time distribution
σ B 2 Variance of service time distribution
C A 2 Squared coefficient of variation of interarrival time distribution
C B 2 Squared coefficient of variation of service time distribution
X ( t ) Diffusion process
β Diffusion parameter; β d t is the mean value of changes of X ( t ) during d t
α Diffusion parameter; α d t is the variance of changes of X ( t ) during d t
f ( x , t , x 0 ) Probability density that the process will be in state x at time t, for initial conditions x 0
Table 4. P I γ and P I controllers coefficients.
Table 4. P I γ and P I controllers coefficients.
K p K i γ SetpointType of Controller
10.00010.005−0.410non integer order controller
20.00010.005−1.010classical controller
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Marek, D.; Domański, A.; Domańska, J.; Szyguła, J.; Czachórski, T.; Klamka, J. Diffusion Model of a Non-Integer Order PIγ Controller with TCP/UDP Streams. Entropy 2021, 23, 619. https://doi.org/10.3390/e23050619

AMA Style

Marek D, Domański A, Domańska J, Szyguła J, Czachórski T, Klamka J. Diffusion Model of a Non-Integer Order PIγ Controller with TCP/UDP Streams. Entropy. 2021; 23(5):619. https://doi.org/10.3390/e23050619

Chicago/Turabian Style

Marek, Dariusz, Adam Domański, Joanna Domańska, Jakub Szyguła, Tadeusz Czachórski, and Jerzy Klamka. 2021. "Diffusion Model of a Non-Integer Order PIγ Controller with TCP/UDP Streams" Entropy 23, no. 5: 619. https://doi.org/10.3390/e23050619

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop