SlideShare a Scribd company logo
1 of 1
2020 – 2021
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 Mo: +91 9500218218 / +91 8220150373
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Congestion Control Scheme Performance Analysis Based on Nonlinear RED
Abstract:
Congestion control has become a research focus with the development of network
communication technology. Random early detection (RED) for queue management
techniques is the most effective method. However, RED is particularly sensitive to the traffic
load and the parameters of the scheme itself. When the traffic load is low, the bandwidth is
underutilized, whereas when the traffic load is high, the delay is large. This paper presents a
minimal adjustment to RED called three-section random early detection (TRED) based on
nonlinear RED, in which the packet dropping probability function is divided into three sections
to distinguish between light, moderate, and high loads to achieve a tradeoff in the delay and
the throughput between low and high traffic loads. The NS2 simulation results show that
TRED effectively improves the insufficiencies of RED to achieve better congestion control.
Additionally, very little work needs to be done to migrate from RED to TRED on Internet
routers because only the packet dropping probability profile is adjusted.

More Related Content

What's hot

What's hot (6)

Distributed data fusion for multirobot search
Distributed data fusion for multirobot searchDistributed data fusion for multirobot search
Distributed data fusion for multirobot search
 
Big data analysis and scheduling optimization system oriented assembly proces...
Big data analysis and scheduling optimization system oriented assembly proces...Big data analysis and scheduling optimization system oriented assembly proces...
Big data analysis and scheduling optimization system oriented assembly proces...
 
City lines designing hybrid hub and-spoke transit system with urban big data
City lines designing hybrid hub and-spoke transit system with urban big dataCity lines designing hybrid hub and-spoke transit system with urban big data
City lines designing hybrid hub and-spoke transit system with urban big data
 
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...
ROUTING PRESSURE: A CHANNEL-RELATED AND TRAFFIC-AWARE METRIC OF ROUTING ALGOR...
 
fuzzy type-2
fuzzy type-2fuzzy type-2
fuzzy type-2
 
Synopsis defense-version01-hamid
Synopsis defense-version01-hamidSynopsis defense-version01-hamid
Synopsis defense-version01-hamid
 

Similar to Congestion control scheme performance analysis based on nonlinear red

Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
EvaObinna
 
The blue active queue management algorithms
The blue active queue management algorithmsThe blue active queue management algorithms
The blue active queue management algorithms
ambitlick
 

Similar to Congestion control scheme performance analysis based on nonlinear red (20)

Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
 
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
 
Effects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodesEffects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodes
 
A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...
 
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Opportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networksOpportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networks
 
Data aggregation techniques to remove redundancy in wireless sensor networks
Data aggregation techniques to remove redundancy in wireless sensor networksData aggregation techniques to remove redundancy in wireless sensor networks
Data aggregation techniques to remove redundancy in wireless sensor networks
 
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
 
F017343241
F017343241F017343241
F017343241
 
A low complexity cyclostationary spectrum sensing for interference avoidance ...
A low complexity cyclostationary spectrum sensing for interference avoidance ...A low complexity cyclostationary spectrum sensing for interference avoidance ...
A low complexity cyclostationary spectrum sensing for interference avoidance ...
 
A fault tolerant approach to extend network life time of wireless sensor network
A fault tolerant approach to extend network life time of wireless sensor networkA fault tolerant approach to extend network life time of wireless sensor network
A fault tolerant approach to extend network life time of wireless sensor network
 
Leveraging sdn to conserve energy in wsn an analysis
Leveraging sdn to conserve energy in wsn an analysisLeveraging sdn to conserve energy in wsn an analysis
Leveraging sdn to conserve energy in wsn an analysis
 
An autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networksAn autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networks
 
Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...
 
The blue active queue management algorithms
The blue active queue management algorithmsThe blue active queue management algorithms
The blue active queue management algorithms
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
 

More from Shakas Technologies

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Congestion control scheme performance analysis based on nonlinear red

  • 1. 2020 – 2021 #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 Mo: +91 9500218218 / +91 8220150373 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Congestion Control Scheme Performance Analysis Based on Nonlinear RED Abstract: Congestion control has become a research focus with the development of network communication technology. Random early detection (RED) for queue management techniques is the most effective method. However, RED is particularly sensitive to the traffic load and the parameters of the scheme itself. When the traffic load is low, the bandwidth is underutilized, whereas when the traffic load is high, the delay is large. This paper presents a minimal adjustment to RED called three-section random early detection (TRED) based on nonlinear RED, in which the packet dropping probability function is divided into three sections to distinguish between light, moderate, and high loads to achieve a tradeoff in the delay and the throughput between low and high traffic loads. The NS2 simulation results show that TRED effectively improves the insufficiencies of RED to achieve better congestion control. Additionally, very little work needs to be done to migrate from RED to TRED on Internet routers because only the packet dropping probability profile is adjusted.