SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. I (Mar. – Apr. 2016), PP 49-53
www.iosrjournals.org
DOI: 10.9790/1676-1102014953 www.iosrjournals.org 49 | Page
Improving Congestion Control in Data Communication Network
Using Queuing Theory Model.
Dr.Dike D.O1
, Obiora V.T1
, Eze C.U1
.
1
(Department Of Electrical And Electronics Engineering, Federal University Of Technology, Owerri, Nigeria)
Abstract: Congestion in data Communication networks poses a serious problem especially in situations where
efficiency and link reliability is needed for optimum performance of the network devices. In this Paper,
Congestion Control Problem is solved using the concept of Queuing theory. The network planning engineer
would find the developed computational software useful in network planning. The software would enable him
decide on the choice of routers 49and other Physical network devices to run his desired Algorithms on. The
designed software computes the needed parameters based on the M/M/1 queuing Model.
Keywords: Congestion Control, Data Communication, Data Packets,Java, Queuing Theory.
I. Introduction
Congestion control is a worldwide problem in data communication networks that deals with the
efficient usage of network devices at peak load. According to [1], congestion control is used to describe the
efforts made by network modes to prevent or respond to over load conditions. In other words, it refers to the
control of entry into any telecommunications network (be it data or voice network), in order to avoid a
congestive collapse of the processing capacity of the network modes and facilitate efficient resource sharing. It
is important to note that congestion control is different from flow control as both terms seem to be misused.
Flow control is a fundamental feedback control congestion problem [2] management technique that manages
data transfer rate.
Congestion is a problem that has to be overcome in networks so that the networks can be reliable and
efficient to the subscribers of such networks. In data networks, resource allocation is necessary through
scheduling tasks so as to improve the general reliability. However, the question that has to be answered remains
this, how can congestion be avoided in a data network communication system. This question can be answered
when we look at congestion control as a scheduling problem that can be solved by using the queuing theory
approach.49The theory of congestion control was pioneered by Frank Kelly, of the University of Cambridge
who in [3] applied the principles of microeconomic theory and optimization to describe how individuals could
control their rate to achieve an optimal network wide rate allocation.
In recent times a lot of research work has done a lot of in-depth study of congestion control for wireless
sensor networks. [4], [5] tells us about congestion avoidance and detection [COAD] protocol which detects
congestion based on buffer occupancy as well as wireless load channel. [4] provides a scheme that considers
current buffer occupancy status and buffer changing trends. [6] uses an approximation method to evaluate the
reliability of large telecommunication networks based on planning indices and as defined in availability and
expected lost traffic. Network reliability is paramount, so congestion must be controlled.
Network reliability is defined as some connectivity measure and problems are NP-hard. [7,8,9,10]. In a data
network, reliability is outlined by three main characteristics.
1. The high reliability of the network components.
2. The substantial size of the network.
3. The multiflow: the rerouting makes it necessary to take into account the multiflow characteristics of the
traffic.
Also, a modified TCP based equation has been proposed using a controller implementing the traditional
GREEN algorithm [11] to solve congestion control problems in Queue Management System. [12] addresses
managing a virtual dynamic Backbone, the algorithm used focused on maintaining network connectivity. [1]
defines the three salient features of the network model used in defining the network arch leaders of a potential
bottleneck router as shown in figure 1.
Fig1: Congestion in a packet switched network.
Improving Congestion Control In Data Communication Network Using Queuing Theory Model.
DOI: 10.9790/1676-1102014953 www.iosrjournals.org 50 | Page
Active Queue Management (AQM) strategy for congestion avoidance in Transmission Control
Protocol (TCP) networks to regulate queue size close to a reference [13]. It all boils down to the same question
earlier asked. How can congestion be avoided?
Several techniques can be used in congestion detection and avoidance. These include
 Warning Bit:This is a special but that is set by the router to warn the source when congestion is detected.
 Choke Packets:This is a control packet that is generated at a congested node and transmitted to restrict
traffic flow. An example of a choke packet is the ICMO source quench packet.
 Traffic Shaping:This controls the rate at which data packets are sent in ATM and integrated services
network. It is another method of congestion control. Two traffic shaping algorithms are:
i. Leaky Bucket algorithm
ii. Token Bucket algorithm
Leaky Bucket algorithm is used to control rate in a network. It is implemented as a single server queue
with constant service time. If the bucket (buffer) overflows then packets are discarded. Leaky bucket enforces a
constant output rate regardless of the business of the input.
Token Bucket algorithm allows the output rate to very depending on the size of the burst, here, the bucket holds
tokens. To transmit a packet, the host must capture and destroy one token.
Fig 2
a. Leaky Bucket with Packets b. Token Bucket
II. Congestion Control Techniques
Research directions and recent solutions solving the congestion problem in wireless sensor networks
were studied [14]. The fact that most part of discovered sources is that classical TCP based congestion detection
and avoidance technique is not suitable for wireless sensor networks.
Thus it can be inferred that TCP based congestion detection and avoidance would not be feasible for data
networks. In trying to control congestion in data networks layer if the Open System Interconnect (OSI) layer.
A large number of techniques exist which were invented for the wireless sensor networks. These methods are
deployed by different layers of the OSI stack. Examples of these network congestion control techniques include:
 Router Centric:Here the internal network routers are responsible for the packets to forward and which
packets to drop. Queuing theory algorithm is a typical example of the router centric technique.
 Host Centric:In this technique, the hosts adjust their behaviour based on network condition observations.
Example is the TCP congestion control mechanism.
 Reservation Based:Here, the end host asks the network to reserve a small amount of capacity at the time
flow is established. The reservation can be receiver based or sender-based.
 Feedback Based: In this approach, the host begins transmitting without reserving any capacity at the time
flow is established. However, the transmit rate is adjusted according to the feedback received. If the
feedback is explicit, then it means the router is involved in the resource allocation scheme. If the feedback
is implicit, the router drops the packets when they become congested.
 Window Based:Here, the receiver sends an advertised window to the sender which is used to reserve buffer
space in networks.
 Rate Based:The sender’s rate is controlled by the receiver indicating the bits per second it can absorb.
For an effective resource allocation, the two principal metrics of networking namely throughput and
delay must be considered [4]. The relationship is defined by a ration that is referred to as the power of the
network mathematically
Power= Throughput/Delay. - - - (1)
The theory behind the power of the network is the queuing theory.
Improving Congestion Control In Data Communication Network Using Queuing Theory Model.
DOI: 10.9790/1676-1102014953 www.iosrjournals.org 51 | Page
Fig 3: Ratio of Throughput to Delay as a function of Load.
III. Methodology
3.1 Queuing Theory Model
The basic definition of a queue is a waiting line for customers waiting to be serviced. In a queuing
situation the principal players are the customers who arrive at a facility from a source. On arrival, the customer
can start service immediately or wart in a queue if the facility is busy. This basic scenario occurs in data
communication networks where packets are operated upon. The queuing theory model could also be applicable
in such scenarios to improve congestion control by efficient planning and calculating ones queuing algorithm
depending on the model chosen. The basic queue system is as described in figure 4 below
Fig 4: Basic Queuing System
The input describes the pattern in which the packets arrive.
The queue formation is a waiting line in which the packets join while waiting to the transmitted.
The service mechanism refers to the queue discipline which represents the order in which packets are selected
from a queue is a crucial factor in the analysis of queuing models. The most common ones are
i. First Come, First Served (FCFS): packets are served in the order of their arrival.
ii. Last Come, First Served (LCFS): packets that arrived last are served first.
iii. Service in Random Order (SIRO): packets are served in random order.
iv. Service in some priority procedure.
Using queuing theory in congestion control has to do with Active Queue Management of data packets. There are
various models used in queue theory such as
 Pure birth death model.
 Standard multi server model
 Single Earlang model.
 Finite queue multi server model.
Etc
This work focuses on the birth and death model which is a core problem in operations research.
3.1 Modelling Of Pure Birth And Death Model
In modelling this system, we have to note that the pure birth model deals with arrivals only while the
death models deals with departure. Both models combined are described by a poisson distribution
We define the following
n =Number of packets in the system
𝑰 𝒏= Arrival rate
µn = Departure rate
𝑃𝑛 = Steady- state probability of n packets
𝑃𝑛 is a function of𝑰 𝒏 and µn.
These probabilities used to determine the system measures of performance.
Under steady condition (n>0), the expected rates of flow into the state and not of the state must be
equal. On the knowledge that the state can be changed from n-l to n+l, we obtain.
Expected rate p of flow into state n = 𝜆 𝑛−1 𝑃𝑛−1 + 𝜇 𝑛+1 𝑃𝑛+1 − − − 2
Expected rate of flow into state n = 𝜆 𝑛 + 𝜇 𝑛 𝑃𝑛 − − − (3)
Equating equations 2 and (3) , we get
𝜆 𝑛−1 𝑃𝑛−1 + 𝜇 𝑛+1 𝑃𝑛+1 = 𝜆 𝑛 + 𝜇 𝑛 𝑃𝑛 − − − (4)
𝑓𝑜𝑟𝑛 = 1, 2, …
Using the state transition diagram given below,
Improving Congestion Control In Data Communication Network Using Queuing Theory Model.
DOI: 10.9790/1676-1102014953 www.iosrjournals.org 52 | Page
Fig 5: Poisson queues transition diagram.
Equation (4) when n=0, becomes,
𝜆0 + 𝑃0 = 𝜇1 𝑃1 − − − (5)
Equation (5) is solved recursively in terms of 𝑃𝑜. 𝑓𝑜𝑟𝑛 = 0, 𝑤𝑒𝑕𝑎𝑣𝑒
𝑃1 =
λ0
μ1
𝑃0 − − − (6)
For n=1, we have from equation (4)
𝜆0 + 𝑃0 + 𝜇2 𝑃2 = 𝜆1 + 𝜇1 𝑃1 − − − 7
Substituling 𝑃1
𝜆0
𝜇0
𝑃0 𝑖𝑛𝑡𝑜𝑒𝑞𝑢𝑎𝑡𝑖𝑜𝑛 6 , 𝑤𝑒𝑔𝑒𝑡
𝑃2
𝜆1 𝜆0
𝜇2 𝜇1
𝑃0 − − − (8)
We can show by induction that
𝑃0 =
𝜆 𝑛−1 𝜆 𝑛−2 … 𝜆0
𝜇 𝑛 𝜇 𝑛−1 … 𝜇1
𝑃0 − − − (9)
For n= 1, 2, - - -
𝑃0 is determined from the equation
𝑃𝑛
∞
𝑛=0
= 1 − − − (10)
3.2 Software Design
The queuing theory model computational software was developed using Java programming language
on the Netbeans 8.0 Integrated Development Environment (IDE).
Based on equations (2) – (10) an application program was developed to compute the necessary parameters used
in queue theory.
The computed parameters from the application include: Average entities in the system, queue length,
waiting time Average probability of empty, probability of system being busy, etc.
Fig 6: Input Parameters Form for Software
Fig 7: Result Parameter Form for Software.
Improving Congestion Control In Data Communication Network Using Queuing Theory Model.
DOI: 10.9790/1676-1102014953 www.iosrjournals.org 53 | Page
IV. Conclusion
This paper looks at how Congestion can be controlled in a data communication environment by using
Queuing theory model. The Model enables the network planning engineer to effectively plan the network for
efficient operation. The software developed can aid the network planning engineer to better optimise the
network planning to reduce congestion problems.
References
[1]. L.L Peterson, Computer Networks: A Systems Approach(Burlington, MA: Morgan Kaufmann,2007).
[2]. H.T Kung,Traffic Management for High Speed Networks(Washington, DC, USA: National Academy Press, 1997).
[3]. P.K Frank, Networks of Queues with Customers of different types, Journal of Applied Probability, 1975,542-554.
[4]. J. Wei, B. Fan, and Y. Sun, A congestion control scheme based on fuzzy logic for wireless sensor networks, 9th International
Conference on Fuzzy SystemsKnowledge Discovery,2012, 501–504.
[5]. C. Y. Wan, S. Eisenman, A. T. Campbell, CODA: congestion detection and avoidance in sensor networks, Proceedings 11th ACM
Conference on Sensor systems, Rome, 2013.
[6]. J. Carlier, Y. Li, and J. Lutton, Reliability evaluation of large telecommunication networks, Journal of Discrete Applied
Mathematics.76( 1–3), 1997, 61–80.
[7]. A. Aggarwal and R.E. Barlow, A survey of network reliability and domination theory, Operations Research Journal, 32, 1984 478-
479.
[8]. J. Carlier and C. Lucet, A decomposition method for network reliability evaluation,Discrete Applied Mathematics, 1995, 17-68.
[9]. M.O. Locks, Recent development in computing of system reliability, IEEE Transactions on Reliability, 34 (1985)
[10]. Theologou and J. Carlier, Factoring and reductions for networks with imperfect vertices, IEEE Transactions on Reliability, 40
(1991) 210-217.
[11]. S. Zargar and M. Yaghmaee, Fuzzy Green: A modified TCP equation-based active queue management using fuzzy logic
approach,International Journal of Computer Science and Network Security,6 (5), 2006, 50–58.
[12]. Iana Siomina;Mathematical Models forRadio Network Planning and Resource Optimization : UMTS , WLANs , and Ad Hoc
Networks, no. 1116. 2007.
[13]. S. H. Hosseini, M. Shabanian, and B. N. Araabi, A Neuro-Fuzzy Control for TCP Network Congestion, Springer Journal of Soft
Computing, 58(1), 2009, 93–101.
[14]. H.A.Taha; Operations Research: An Introduction(New Jersey, USA: Pearson, 2011)

More Related Content

What's hot

Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...IDES Editor
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
 
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGIJCNCJournal
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networkscsandit
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkcsandit
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
 
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...IJECEIAES
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 

What's hot (20)

Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
AWN_FINAL_TERM_PAPER
AWN_FINAL_TERM_PAPERAWN_FINAL_TERM_PAPER
AWN_FINAL_TERM_PAPER
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
4 fuzzy aqm
4 fuzzy aqm4 fuzzy aqm
4 fuzzy aqm
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
 
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
 
PPT
PPTPPT
PPT
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
 
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 

Viewers also liked

Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 compositeStudy of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 compositeIOSR Journals
 
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...IOSR Journals
 
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...IOSR Journals
 
Role of Project Management Consultancy in Construction Project
Role of Project Management Consultancy in Construction ProjectRole of Project Management Consultancy in Construction Project
Role of Project Management Consultancy in Construction ProjectIOSR Journals
 
A Study on Thermo-Mechanical Analysis of Hot Rolling & Estimation of Residual...
A Study on Thermo-Mechanical Analysis of Hot Rolling & Estimation of Residual...A Study on Thermo-Mechanical Analysis of Hot Rolling & Estimation of Residual...
A Study on Thermo-Mechanical Analysis of Hot Rolling & Estimation of Residual...IOSR Journals
 
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...IOSR Journals
 

Viewers also liked (20)

Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 compositeStudy of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
 
C011141018
C011141018C011141018
C011141018
 
B1103040715
B1103040715B1103040715
B1103040715
 
T01821125128
T01821125128T01821125128
T01821125128
 
C018131821
C018131821C018131821
C018131821
 
B017520718
B017520718B017520718
B017520718
 
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
 
G012465564
G012465564G012465564
G012465564
 
N010226872
N010226872N010226872
N010226872
 
K1103047173
K1103047173K1103047173
K1103047173
 
H018124360
H018124360H018124360
H018124360
 
G010433745
G010433745G010433745
G010433745
 
H010414651
H010414651H010414651
H010414651
 
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
 
Role of Project Management Consultancy in Construction Project
Role of Project Management Consultancy in Construction ProjectRole of Project Management Consultancy in Construction Project
Role of Project Management Consultancy in Construction Project
 
A Study on Thermo-Mechanical Analysis of Hot Rolling & Estimation of Residual...
A Study on Thermo-Mechanical Analysis of Hot Rolling & Estimation of Residual...A Study on Thermo-Mechanical Analysis of Hot Rolling & Estimation of Residual...
A Study on Thermo-Mechanical Analysis of Hot Rolling & Estimation of Residual...
 
A018120105
A018120105A018120105
A018120105
 
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
 
E010213039
E010213039E010213039
E010213039
 
J010116069
J010116069J010116069
J010116069
 

Similar to I1102014953

Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksIJMER
 
Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...IJECEIAES
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterIJERA Editor
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...IRJET Journal
 
Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN IJECEIAES
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 

Similar to I1102014953 (20)

Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for Networks
 
Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
 
U01725129138
U01725129138U01725129138
U01725129138
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
 
Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 

I1102014953

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. I (Mar. – Apr. 2016), PP 49-53 www.iosrjournals.org DOI: 10.9790/1676-1102014953 www.iosrjournals.org 49 | Page Improving Congestion Control in Data Communication Network Using Queuing Theory Model. Dr.Dike D.O1 , Obiora V.T1 , Eze C.U1 . 1 (Department Of Electrical And Electronics Engineering, Federal University Of Technology, Owerri, Nigeria) Abstract: Congestion in data Communication networks poses a serious problem especially in situations where efficiency and link reliability is needed for optimum performance of the network devices. In this Paper, Congestion Control Problem is solved using the concept of Queuing theory. The network planning engineer would find the developed computational software useful in network planning. The software would enable him decide on the choice of routers 49and other Physical network devices to run his desired Algorithms on. The designed software computes the needed parameters based on the M/M/1 queuing Model. Keywords: Congestion Control, Data Communication, Data Packets,Java, Queuing Theory. I. Introduction Congestion control is a worldwide problem in data communication networks that deals with the efficient usage of network devices at peak load. According to [1], congestion control is used to describe the efforts made by network modes to prevent or respond to over load conditions. In other words, it refers to the control of entry into any telecommunications network (be it data or voice network), in order to avoid a congestive collapse of the processing capacity of the network modes and facilitate efficient resource sharing. It is important to note that congestion control is different from flow control as both terms seem to be misused. Flow control is a fundamental feedback control congestion problem [2] management technique that manages data transfer rate. Congestion is a problem that has to be overcome in networks so that the networks can be reliable and efficient to the subscribers of such networks. In data networks, resource allocation is necessary through scheduling tasks so as to improve the general reliability. However, the question that has to be answered remains this, how can congestion be avoided in a data network communication system. This question can be answered when we look at congestion control as a scheduling problem that can be solved by using the queuing theory approach.49The theory of congestion control was pioneered by Frank Kelly, of the University of Cambridge who in [3] applied the principles of microeconomic theory and optimization to describe how individuals could control their rate to achieve an optimal network wide rate allocation. In recent times a lot of research work has done a lot of in-depth study of congestion control for wireless sensor networks. [4], [5] tells us about congestion avoidance and detection [COAD] protocol which detects congestion based on buffer occupancy as well as wireless load channel. [4] provides a scheme that considers current buffer occupancy status and buffer changing trends. [6] uses an approximation method to evaluate the reliability of large telecommunication networks based on planning indices and as defined in availability and expected lost traffic. Network reliability is paramount, so congestion must be controlled. Network reliability is defined as some connectivity measure and problems are NP-hard. [7,8,9,10]. In a data network, reliability is outlined by three main characteristics. 1. The high reliability of the network components. 2. The substantial size of the network. 3. The multiflow: the rerouting makes it necessary to take into account the multiflow characteristics of the traffic. Also, a modified TCP based equation has been proposed using a controller implementing the traditional GREEN algorithm [11] to solve congestion control problems in Queue Management System. [12] addresses managing a virtual dynamic Backbone, the algorithm used focused on maintaining network connectivity. [1] defines the three salient features of the network model used in defining the network arch leaders of a potential bottleneck router as shown in figure 1. Fig1: Congestion in a packet switched network.
  • 2. Improving Congestion Control In Data Communication Network Using Queuing Theory Model. DOI: 10.9790/1676-1102014953 www.iosrjournals.org 50 | Page Active Queue Management (AQM) strategy for congestion avoidance in Transmission Control Protocol (TCP) networks to regulate queue size close to a reference [13]. It all boils down to the same question earlier asked. How can congestion be avoided? Several techniques can be used in congestion detection and avoidance. These include  Warning Bit:This is a special but that is set by the router to warn the source when congestion is detected.  Choke Packets:This is a control packet that is generated at a congested node and transmitted to restrict traffic flow. An example of a choke packet is the ICMO source quench packet.  Traffic Shaping:This controls the rate at which data packets are sent in ATM and integrated services network. It is another method of congestion control. Two traffic shaping algorithms are: i. Leaky Bucket algorithm ii. Token Bucket algorithm Leaky Bucket algorithm is used to control rate in a network. It is implemented as a single server queue with constant service time. If the bucket (buffer) overflows then packets are discarded. Leaky bucket enforces a constant output rate regardless of the business of the input. Token Bucket algorithm allows the output rate to very depending on the size of the burst, here, the bucket holds tokens. To transmit a packet, the host must capture and destroy one token. Fig 2 a. Leaky Bucket with Packets b. Token Bucket II. Congestion Control Techniques Research directions and recent solutions solving the congestion problem in wireless sensor networks were studied [14]. The fact that most part of discovered sources is that classical TCP based congestion detection and avoidance technique is not suitable for wireless sensor networks. Thus it can be inferred that TCP based congestion detection and avoidance would not be feasible for data networks. In trying to control congestion in data networks layer if the Open System Interconnect (OSI) layer. A large number of techniques exist which were invented for the wireless sensor networks. These methods are deployed by different layers of the OSI stack. Examples of these network congestion control techniques include:  Router Centric:Here the internal network routers are responsible for the packets to forward and which packets to drop. Queuing theory algorithm is a typical example of the router centric technique.  Host Centric:In this technique, the hosts adjust their behaviour based on network condition observations. Example is the TCP congestion control mechanism.  Reservation Based:Here, the end host asks the network to reserve a small amount of capacity at the time flow is established. The reservation can be receiver based or sender-based.  Feedback Based: In this approach, the host begins transmitting without reserving any capacity at the time flow is established. However, the transmit rate is adjusted according to the feedback received. If the feedback is explicit, then it means the router is involved in the resource allocation scheme. If the feedback is implicit, the router drops the packets when they become congested.  Window Based:Here, the receiver sends an advertised window to the sender which is used to reserve buffer space in networks.  Rate Based:The sender’s rate is controlled by the receiver indicating the bits per second it can absorb. For an effective resource allocation, the two principal metrics of networking namely throughput and delay must be considered [4]. The relationship is defined by a ration that is referred to as the power of the network mathematically Power= Throughput/Delay. - - - (1) The theory behind the power of the network is the queuing theory.
  • 3. Improving Congestion Control In Data Communication Network Using Queuing Theory Model. DOI: 10.9790/1676-1102014953 www.iosrjournals.org 51 | Page Fig 3: Ratio of Throughput to Delay as a function of Load. III. Methodology 3.1 Queuing Theory Model The basic definition of a queue is a waiting line for customers waiting to be serviced. In a queuing situation the principal players are the customers who arrive at a facility from a source. On arrival, the customer can start service immediately or wart in a queue if the facility is busy. This basic scenario occurs in data communication networks where packets are operated upon. The queuing theory model could also be applicable in such scenarios to improve congestion control by efficient planning and calculating ones queuing algorithm depending on the model chosen. The basic queue system is as described in figure 4 below Fig 4: Basic Queuing System The input describes the pattern in which the packets arrive. The queue formation is a waiting line in which the packets join while waiting to the transmitted. The service mechanism refers to the queue discipline which represents the order in which packets are selected from a queue is a crucial factor in the analysis of queuing models. The most common ones are i. First Come, First Served (FCFS): packets are served in the order of their arrival. ii. Last Come, First Served (LCFS): packets that arrived last are served first. iii. Service in Random Order (SIRO): packets are served in random order. iv. Service in some priority procedure. Using queuing theory in congestion control has to do with Active Queue Management of data packets. There are various models used in queue theory such as  Pure birth death model.  Standard multi server model  Single Earlang model.  Finite queue multi server model. Etc This work focuses on the birth and death model which is a core problem in operations research. 3.1 Modelling Of Pure Birth And Death Model In modelling this system, we have to note that the pure birth model deals with arrivals only while the death models deals with departure. Both models combined are described by a poisson distribution We define the following n =Number of packets in the system 𝑰 𝒏= Arrival rate µn = Departure rate 𝑃𝑛 = Steady- state probability of n packets 𝑃𝑛 is a function of𝑰 𝒏 and µn. These probabilities used to determine the system measures of performance. Under steady condition (n>0), the expected rates of flow into the state and not of the state must be equal. On the knowledge that the state can be changed from n-l to n+l, we obtain. Expected rate p of flow into state n = 𝜆 𝑛−1 𝑃𝑛−1 + 𝜇 𝑛+1 𝑃𝑛+1 − − − 2 Expected rate of flow into state n = 𝜆 𝑛 + 𝜇 𝑛 𝑃𝑛 − − − (3) Equating equations 2 and (3) , we get 𝜆 𝑛−1 𝑃𝑛−1 + 𝜇 𝑛+1 𝑃𝑛+1 = 𝜆 𝑛 + 𝜇 𝑛 𝑃𝑛 − − − (4) 𝑓𝑜𝑟𝑛 = 1, 2, … Using the state transition diagram given below,
  • 4. Improving Congestion Control In Data Communication Network Using Queuing Theory Model. DOI: 10.9790/1676-1102014953 www.iosrjournals.org 52 | Page Fig 5: Poisson queues transition diagram. Equation (4) when n=0, becomes, 𝜆0 + 𝑃0 = 𝜇1 𝑃1 − − − (5) Equation (5) is solved recursively in terms of 𝑃𝑜. 𝑓𝑜𝑟𝑛 = 0, 𝑤𝑒𝑕𝑎𝑣𝑒 𝑃1 = λ0 μ1 𝑃0 − − − (6) For n=1, we have from equation (4) 𝜆0 + 𝑃0 + 𝜇2 𝑃2 = 𝜆1 + 𝜇1 𝑃1 − − − 7 Substituling 𝑃1 𝜆0 𝜇0 𝑃0 𝑖𝑛𝑡𝑜𝑒𝑞𝑢𝑎𝑡𝑖𝑜𝑛 6 , 𝑤𝑒𝑔𝑒𝑡 𝑃2 𝜆1 𝜆0 𝜇2 𝜇1 𝑃0 − − − (8) We can show by induction that 𝑃0 = 𝜆 𝑛−1 𝜆 𝑛−2 … 𝜆0 𝜇 𝑛 𝜇 𝑛−1 … 𝜇1 𝑃0 − − − (9) For n= 1, 2, - - - 𝑃0 is determined from the equation 𝑃𝑛 ∞ 𝑛=0 = 1 − − − (10) 3.2 Software Design The queuing theory model computational software was developed using Java programming language on the Netbeans 8.0 Integrated Development Environment (IDE). Based on equations (2) – (10) an application program was developed to compute the necessary parameters used in queue theory. The computed parameters from the application include: Average entities in the system, queue length, waiting time Average probability of empty, probability of system being busy, etc. Fig 6: Input Parameters Form for Software Fig 7: Result Parameter Form for Software.
  • 5. Improving Congestion Control In Data Communication Network Using Queuing Theory Model. DOI: 10.9790/1676-1102014953 www.iosrjournals.org 53 | Page IV. Conclusion This paper looks at how Congestion can be controlled in a data communication environment by using Queuing theory model. The Model enables the network planning engineer to effectively plan the network for efficient operation. The software developed can aid the network planning engineer to better optimise the network planning to reduce congestion problems. References [1]. L.L Peterson, Computer Networks: A Systems Approach(Burlington, MA: Morgan Kaufmann,2007). [2]. H.T Kung,Traffic Management for High Speed Networks(Washington, DC, USA: National Academy Press, 1997). [3]. P.K Frank, Networks of Queues with Customers of different types, Journal of Applied Probability, 1975,542-554. [4]. J. Wei, B. Fan, and Y. Sun, A congestion control scheme based on fuzzy logic for wireless sensor networks, 9th International Conference on Fuzzy SystemsKnowledge Discovery,2012, 501–504. [5]. C. Y. Wan, S. Eisenman, A. T. Campbell, CODA: congestion detection and avoidance in sensor networks, Proceedings 11th ACM Conference on Sensor systems, Rome, 2013. [6]. J. Carlier, Y. Li, and J. Lutton, Reliability evaluation of large telecommunication networks, Journal of Discrete Applied Mathematics.76( 1–3), 1997, 61–80. [7]. A. Aggarwal and R.E. Barlow, A survey of network reliability and domination theory, Operations Research Journal, 32, 1984 478- 479. [8]. J. Carlier and C. Lucet, A decomposition method for network reliability evaluation,Discrete Applied Mathematics, 1995, 17-68. [9]. M.O. Locks, Recent development in computing of system reliability, IEEE Transactions on Reliability, 34 (1985) [10]. Theologou and J. Carlier, Factoring and reductions for networks with imperfect vertices, IEEE Transactions on Reliability, 40 (1991) 210-217. [11]. S. Zargar and M. Yaghmaee, Fuzzy Green: A modified TCP equation-based active queue management using fuzzy logic approach,International Journal of Computer Science and Network Security,6 (5), 2006, 50–58. [12]. Iana Siomina;Mathematical Models forRadio Network Planning and Resource Optimization : UMTS , WLANs , and Ad Hoc Networks, no. 1116. 2007. [13]. S. H. Hosseini, M. Shabanian, and B. N. Araabi, A Neuro-Fuzzy Control for TCP Network Congestion, Springer Journal of Soft Computing, 58(1), 2009, 93–101. [14]. H.A.Taha; Operations Research: An Introduction(New Jersey, USA: Pearson, 2011)