SlideShare a Scribd company logo
1 of 10
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
DOI : 10.5121/ijdps.2013.4307 85
KALMAN FILTER BASED CONGESTION
CONTROLLER
Mehdi Mohtashamzadeh
Department of Computer Engineering, Soosangerd Branch, Islamic Azad University,
Soosangerd, IRAN
Mohtashamzadeh@gmail.com
ABSTRACT
Facing burst traffic, TCP congestion control algorithms severely decrease window size neglecting the fact
that such burst traffics are temporal. In the increase phase sending window experiences a linear rise which
may lead to waste in hefty proportion of available bandwidth. If congestion control mechanisms be able to
estimate future state of network traffic they can cope with different circumstances and efficiently use
bandwidth. Since data traffic which is running on networks is mostly self-similar, algorithms can take
advantage of self-similarity property and repetitive traffic patterns to have accurate estimations and
predictions in large time scales.
In this research a two-stage controller is presented. In fact the first part is a RED congestion controller
which acts in short time scales (200 milliseconds) and the second is a Kalman filter estimator which do
RTT and window size estimations in large time scales (every two seconds). If the RED mechanism decides
to increase the window size, the magnitude of this increase is controlled by Kalman filter. To be more
precise, if the Kalman filter indicates a non-congested situation in the next large time scale, a magnitude
factor is calculated and given to RED algorithm to strengthen the amount of increase.
KEYWORDS
Kalman filter, Self similarity, congestion control
1. INTRODUCTION
Ever increasing amount of data in networks may lead to congested networks, routers with full
queues, increase of loss rate, and end-to-end latency. As a result effective throughput in networks
would be plummeted. To deal with such challenges routers have to route packets faster and more
precise. Towards this end congestion control algorithms have developed to enable the dramatic
growth of networks, especially Internet. The original idea ([1]) was to adjust the transmission rate
based on the loss probability. The first implementation of this mechanism was named TCP Tahoe
and later refined into TCP Reno, New Reno, RED, REM and etc. These algorithms are now the
dominating transport protocols on the Internet.
Almost all congestion control mechanisms cannot utilize available bandwidth since they react late
and harsh to traffic bursts and cannot effectively recover network as they increase sending
window size in a slow conservative linear manner. Admittedly, such manner may protect network
resources from high level contentions. However, if mechanisms be able to get aware of network
status in near future, they can control the magnitude of window size increase or decrease. Since
network traffic imitate Heavy-tail distribution [2-4] and have Long Range Dependency (LRD)
and self-similarity, network parameters can be predicted. Unfortunately, most network protocols
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
86
have been designed according to Poisson probability distribution of network traffic. Researchers
have proposed two main solutions, first to overwrite network protocols and other to modify
existing control mechanisms to gain from self-similarity and LRD property. Current work belongs
to the second solution and tries to improve the performance of TCP RED mechanism [5] using
mathematical concept of Kalman filters to estimate Round Trip Time (RTT) and window size
parameters in large time scales considering the fact that traffic is self-similar and repeated in time.
As a light and precise estimation tool, Kalman filter has widely been deployed by researchers to
control congestion in data networks. Authors of [6] have studied RTT estimation as a suitable
parameter to control congestion using network state information. Investigating the characteristic
of RTT and the application of the estimation, they concluded that the estimation objective is to
keep the estimate smooth but still able to capture sudden mean changes. As a result a Kalman
filter combined with CUSUM change detection was proposed and shown to perform well based
on results of experiments on real data.Hoon Yang et al. [7] have proposed an LQ-Servo control
mechanism with observer for TCP/AQM system. The controller’s structure is composed of a
traditional servo mechanism based on Linear Quadric approach. In order to estimate the state of
TCP window packet size, they facilitate the control structure with a Kalman filter based
observer.Last but not least, in [8] an Extended Kalman Filter based bandwidth estimation module
which is capable of providing highly accurate link capacity estimations. Authors claim that their
protocol-independent non-packet-probing module is distinct from other bandwidth estimators in
two ways; firstly, rather than directly measuring link capacity, the module uses the persistent
queue size and associated parameters. Second, their proposed module is claimed to overcome the
degradation of the network utilization problem resulted by an increasing bandwidth value. They
demonstrated that both XCP and VCP protocols with EKF-based Bandwidth Estimator could
overcome the limitations of the original protocols and achieve significant performance
improvements in network utilization by eliminating the protocol oscillatory behaviour.
2. TCP-RTT
In random early detection (RED) [5], packets are dropped before the buffer is full, with a
probability that increases with the queue length. RED can thus be seen as a way of indirectly
signalling the queue length to the source. RED is window-based which means that each sender
has a window that determines how many packets are allowed to be sent at any given time. The
transmission rate is regulated by adjusting this window.
During congestion avoidance phase the congestion window size (W) of senders grows linearly
which cause linear increase in queue length. This growth continues as long as weighted average
queue length (X) remains below ; if X exceeds this threshold system should go through the
delayed drop-notification phase. This phase is governed by a count-down timer which expires
in exactly one round trip time ( ). During this some queued packets are dropped base on their
calculated drop probability. This phase ends with the expiration of the timer, after which the
congestion window W is cut in half and a new timer , is used which is initialized to the value of
the current round trip time. Third phase is called recovery in which senders are not permitted to
transmit packets, the congestion window W is kept fixed and the queue is going to be empty. This
phase lasts for 0.5 .In the last phase which also lasts 0.5 senders are allowed to transmit
packets but the congestion window W is still kept fixed resulting in no change in queue length.
The controller returns to the congestion avoidance phase after the expiration of timer.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
87
=
⎩
⎪
⎨
⎪
⎧ +
1
+
1
( )
( )
As it can be seen in the above equation window size increase in “congestion avoidance” and
“Delayed notification” phases is done in a linear manner which may reduce performance
according to bandwidth waste. This shortcoming is challenged in this research and details are
presented in the following section.
3. SELF-SIMILARITY OF TRAFFIC IN LONG TIME SCALE
Crovella et al. [9] studied 500 thousand of web requests. Senders were assumed as on/off traffic
generators.They found that overall generated traffic is self-similar. In addition, authors of [10]
have shown that in most cases Ethernet local network’s traffic is burst and self-similar. Moreover,
TCP, Telnet, and FTP traffic types have been studied by authors of [11]. They understood that
Poisson model which has been the dominant model of network traffic for plenty of years is not
compatible with burst property of traffic in different time scales. Last but not least, research
results of [12] depict that VBR traffic can easily be modelled by Heavy-Tail distribution, thus it is
self-similar. In accordance with these demonstrations, self-similarity can be considered to
improve network throughput via predicting network status.
4. KALMAN FILTER BASED CONGESTION CONTROLLER
The proposed design of current research is a two-stage controller (Fig. 1). The first part is a RED
controller which function in short time scales and the second part is a Kalman filter which tries do
estimate RTT and window size parameters every three seconds (long time scale) keeping in mind
that traffic is self-similar and traffic patterns are repeated in long time scales.
The mathematical model of classic congestion controllers may serve their purpose well in most
cases but the assumptions of the mathematical model are not correct in all circumstances, for
example, presence of a very large number of network nodes and packet-flows may affect the
calculations up to a fractional level which can accumulate into a high level of measurement
uncertainty when the results are used as feedback control [13]. Moreover, a RED algorithm which
operates on a router at some congested link and uses the exponentially weighted-average-queue-
length to predict packet losses and impose flow control may use wrong parameters (weights) and
can consequently lead to uncertainties. The aim of State Estimation is to separate the signal of
interest from the measurement uncertainties and filter out the noise. Kalman filter State Estimator
is used here to achieve these goals. The reason of Kalman filter selection is the well-known
property of feedback systems. Feedback can compensate for model uncertainty. This is one of the
properties which explain the broad usage of Kalman filters.
The proposed controller functions as follows. If the estimated value of window size shows a rise
and the estimated RTT depicts a fall in comparison with the last long time scale, aggressiveness
factor (α) is calculated and sent to the first part of the controller. The RED algorithm can use this
factor to strengthen the amount of increase in “congestion avoidance” and “Delayed notification”
phases considering the fact that in the next long time scale network may experience low level of
contention (based on Kalman filter estimations). Although the long time scale controller can be
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
88
implemented just based on RTT estimations, controller accuracy would be increased in case of
using window size estimations along with RTT estimations.
Figure 1.Two-stage congestion controller. The first part has a short time view of network, while the second
part makes long time predictions according to self-similarity property of traffic patterns
Six congestion levels have been considered for the simulated network based on average (µ) and
deviation (б) of RTT estimates. Each level can be mapped to a period [x,y) of RTT in which x
and y are computed according to the following equations. It is worth noting that periods are
recomputed at the end of every long time scale.














mkk
m
k
x
11
2
1















mk
mkx
k
m
y 1
1
2
)2(


“m” stands for quantity of levels in these equations.
In accordance with the above equations, six traffic levels results to six ranges of RTTs which are
listed below:
(-∞, µ-2б) [µ-2 б, µ- б) [µ- б, µ) [µ, µ+ б) [µ+ б, µ+2 б) [µ+2 б, ∞)
Aggressiveness factor can then be calculated considering predicted traffic level (L).
α = (1/L) A
“A” is maximum value of Aggressiveness factor. As a result, increase equation of RED algorithm
can be represented as follow,
=
⎩
⎪
⎨
⎪
⎧ +
α
+
α
( )
( )
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
89
The more the quantity of levels are, the more precise the controller will be. However, having
more levels means more computational overheads.
4.1 Kalman filter estimators
There are two estimators functioning in the second part of the controller, one to estimate RTT
value and the other one to provide window size estimations. RTT estimation model’s equations
are as follows,
= ∗ + ∗ +
= ( ∈ {0,1})
= 1
= 0
(1)
= + (2)
Furthermore, time update and measurement update equations are listed in Table 1.
Table 1. Time update and measurement update equations of RTT estimator
time update measurement update
= + ∗
= +
=
+
, = ( )
= + −
= (1 − ) + ,
= ( )
The difference between the sampled RTT value and estimated RTT depicts the amount of
measurement noise in each long time scale.
= − (3)
If sum of measurement noise till the current time scale exceeds a predefined threshold (0.05 in
simulations), this noise should be considered in calculations (Y > 0). Otherwise, measurement
noise is considered to be zero.
= S + V
S > ℎ ℎ ℎ
δ = 1 , S = 0
Else
δ = 0
The window size estimator has similar equations as follows,
= ∗ + ∗ + , = (4)
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
90
= + (5)
In which A=1 and B=0 (there is no control input in the system while controlling window size). As
a result the last equation can be rewritten as
= + (6)
Time update and measurement update equations are presented in Table 2. Measurement noise
considerations are the same RTT.
Table 2. Time update and measurement update equations of window size estimator
time update measurement update
= + ∗
= +
=
+
, = ( )
= + −
= (1 − ) + ,
= ( )
4.2. Selection of the long time scale
To design an efficient two time scale congestion controller an important issue is to specify time
scales. As in Fig. 2 probability Pr{L2|L1=l} will be more concentrated if the large time scale
increases. This concentration means having more precise predictability.
Figure 2. Probability density used to identify L2 according to recent traffic level L1 [14].
Entropy is a method by which we can discuss about distributions. Entropy is at maximum level
when the probability distribution is not concentrated and otherwise entropy will be low.
For probability density function (Pi) entropy can be calculated as follow,

i
iii ppPS /1log)( (7)
In this equation Pi is the probability density function. So in our case entropy is,
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
91
 
'
}1|'2Pr{log}1|'2Pr{
l
l lLlLlLlLS (8)
Authors of [14] have shown that increasing the time scale leads to reduction of entropy. Therefore
larger time scales would be more adequate. Also it has been mentioned that decrease of entropy is
negligible for time scales larger than 3 seconds.
5. RESULTS
Simulated network included 30 ON/OFF traffic generators to produce self-similar traffic. The
average hop count for each packet in flight was set to be more than four. Furthermore, network
parameter setting has considered as follows.
Table 3. Network parameter setting
Variable Value
RED
Parameters
130
270
0.15
weight 0.001
Propagation delay
( )
0.1
According to measurements RTT estimation values and actual RTT sampling values show little
differences (Fig. 3) and these differences become dispensable after 90 Seconds since Kalman
filter corrects itself according to the past estimations and network states. A comparison between
RTT results of pure RED congestion controller and Kalman controller depicts that the design with
Kalman filter estimator leads to have a network with higher degree of throughput and low variant
RTT.
Fast decreases of RTT in Fig. 3 at 50, 92, and 149 seconds are results of predicting low level of
contention by the Kalman controller which enables the first part of the controller (RED) to
increase the window size more aggressively.
In addition, RTT results related to pure RED congestion controller are presented in Fig. 4. By
comparing the RTT results of Fig. 3 and Fig. 4, capability of Kalman filter based controller could
be perceived, since the average RTT value for Kalman controller and RED controller are 0.190
and 0.223 respectively.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
92
Figure 3. RTT estimation values made by Kalman filter vs. actual RTT samplings
Figure 4. RTT results of RED controller
Moreover, queue length in routers was investigated. Overflowed router queues in a network can
be interpreted as congested network. A comparison between the queue size of a particular node
with the proposed mechanism versus the pure RED is presented in Fig. 5. it can be deduced that
the Kalman filter approach has been more successful in controlling queue length parameter,
which means that the network has experienced fewer congested situations. Fast falling slopes in
this figure are due to improved window size increases performed by the first part of the controller
based on precise estimations of the Kalman filter estimator functioning in the second part. In
other words, detecting low level of contention, Kalman filter based controller triggers the first
part to do window sizeincrease more aggressively. However, every controller has some
uncertainties and measurement noises by which overall performance could be plummeted. Plenty
of miss-predictions have been detected during simulations. A case in point is the fast rise of queue
length in (538,542) period which is due to two false estimations. Apart from these anomalies, the
proposed controller has outperformed the classic congestion controller in most cases.
In conclusion, there is no doubt that the measurement update and time update calculations which
should be done in each long time scale impose computational overheads but according to the
0
0.05
0.1
0.15
0.2
0.25
0.3
20 51 79 110 140 171
Kalman estimations samplings
Simulation
time (sec)
RTT
(sec)
0
0.05
0.1
0.15
0.2
0.25
0.3
20
26
32
38
44
50
56
62
68
74
80
86
92
98
104
110
116
122
128
134
140
146
152
158
164
170
176
RED
RTT (sec)
Simulation time (sec)
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
93
above discussed results the proposed Kalman filter approach may be an appropriate replacement
for classic congestion controllers.
Figure 5. Queue length for the proposed structure vs. pure RED congestion controller
6. CONCLUSIONS
Accurate modelling of networks can efficiently help avoiding congestion. Although congestions
can be eliminated completely when the model does not have any uncertainties and measurement
noises, even the most accurate and fastest modelling and simulation techniques experience some
extent of anomalies and uncertainties. Admittedly, these uncertainties can be negligible for a
small scale network. However, studies have shown that a small fraction of noise may lead to
disorders in networks with heavy traffic loads. A congestion avoidance modelling technique
coupled with State Estimation can therefore be worthwhile as it is capable of predicting network
status and eliminating congestions. Towards this end, in this research a RED congestion
controller was combined with a Kalman filter estimator to do precise estimations of network
parameters according to the self-similarity property of traffic patterns and to improve the
functionality of classic controllers. Results have shown that the proposed structure improves
network throughput.
REFERENCES
1. Jacobson, V. (2004) “Congestion avoidance and control”, in symposium proceedings on Applications,
Architecture and Protocols for Computer Communications, Stanford, California, US., 16-18 August,
vol. 18, no. 4, p.314-329.
2. Paxon, V.& Floyd, S.(1995)“Wide-area traffic: The failure of poison modeling”, IEEE/ACM
Transactions on Networking (TON), vol. 3, No 3, pp. 226--244. IEEE Press, New York.
3. Crovella, M.& Bestavors, A.(1996)“Self similarity in World Wide Web traffic: Evidence and possible
causes”, International conference on measurement and modeling of computer systems (ACM
SIGMETRICS). ACM, Philadelphia.
4. Willinger, W., Taqqu, M., Sherman, R. & Wilson, D.(1997)“Self-similarity through high-variability:
statistical analysis of Ethernet LAN traffic at source level”, IEEE/ACM Transactions on Networking
(TON), vol. 5, No 1, pp. 71--86. IEEE Press, New York.
5. Floyd, S. and Jacobson, V. (1993) “Random Early Detection Gateways for Congestion Avoidance”,
IEEE Transactions on Networking, New York, United States, August 1993, Vol. 1, no. 4, p. 397-413.
0
10
20
30
40
50
60
70
500 507 514 521 528 535 542 549
Kalman estimator RED
Simulation time (sec)
Queue size
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013
94
6. Jacobsson, K., Hjalmarsson, H., Möller, N. & Johansson, K. H. (2004) “Estimation of RTT and
Bandwidth for Congestion Control Applications in Communication Networks”, 43rdIEEE Conference
on Decision and Control (CDC),Atlantis, Bahamas, December.
7. Yang, J. H., Lim, D. K., Lee, J.B. & Shin, S. J. (2012) “Robust Congestion Control based on Loop-
Shaping Method with Kalman Filter for TCP/AQM System”, International Journal of Multimedia and
Ubiquitous Engineering, Vol. 7, No. 2.
8. Huang, Z., Li, X. &Yousefizadeh, H. (2010) “Robust EKF-BasedWireless Congestion Control”,
International Communications Conference (ICC2010), Cape Town, South Africa, May.
9. Crovella, M.& Bestavors, A.(1996)“Self similarity in World Wide Web traffic: Evidence and possible
causes”, International conference on measurement and modeling of computer systems (ACM
SIGMETRICS). ACM, Philadelphia.
10. Leland, W., Taqqu, M., Willinger, W.& Wilson, D. (1994) “On the self-similar nature of Ethernet
traffic (extended version)”, IEEE/ACM Transactions on Networking (TON), Vol 2, No 1, pp. 1-15,
February.
11. Paxon, V.& Floyd, S.(1995)“Wide-area traffic: The failure of poison modeling”, IEEE/ACM
Transactions on Networking (TON), vol. 3, No 3, pp. 226--244. IEEE Press, New York.
12. Garret, W.&Willinger, W. (1994) “Analysis, Modelling and generation of self-similar VBR video
traffic”, ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and
Applications, London, UK, September.
13. Nagar, A., Abbas, G.&Tawfik, H. (2006)“Online State Estimation of Communication Networks”,
International Journal of Computer Science and Network Security (IJCSNS), vol. 6, No 5.
14. Park, K.& Tuan, T. (2000)“Performance evaluation of multiple time scale TCP under self-similar
traffic condition”, ACM Transactions on modeling and computer simulation, vol. 10, No 2, pp. 152--
177. ACM, New York.

More Related Content

What's hot

RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMRED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMEditor IJCATR
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
 
Icfcc conference real
Icfcc conference realIcfcc conference real
Icfcc conference realUM
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETijsrd.com
 
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET Journal
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET Journal
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
 
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...IJCNCJournal
 
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...EvaObinna
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSIJCNCJournal
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmIJSRED
 

What's hot (20)

RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMRED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
 
P2885 jung
P2885 jungP2885 jung
P2885 jung
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 
Admission control
Admission controlAdmission control
Admission control
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Icfcc conference real
Icfcc conference realIcfcc conference real
Icfcc conference real
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
 
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP network
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
 
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
 
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
 

Viewers also liked

A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...ijdpsjournal
 
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...ijdpsjournal
 
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERSPERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERSijdpsjournal
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentijdpsjournal
 
Permission based group mutual exclusion
Permission based group mutual exclusionPermission based group mutual exclusion
Permission based group mutual exclusionijdpsjournal
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...ijdpsjournal
 
Scalable frequent itemset mining using heterogeneous computing par apriori a...
Scalable frequent itemset mining using heterogeneous computing  par apriori a...Scalable frequent itemset mining using heterogeneous computing  par apriori a...
Scalable frequent itemset mining using heterogeneous computing par apriori a...ijdpsjournal
 
Before we shake hands: representation and the global future of education
Before we shake hands: representation and the global future of education Before we shake hands: representation and the global future of education
Before we shake hands: representation and the global future of education kioglobal
 
Risky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationRisky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationkioglobal
 
Risky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationRisky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationkioglobal
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...ijdpsjournal
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...ijdpsjournal
 
Less a LessPHP
Less a LessPHPLess a LessPHP
Less a LessPHPcubaguest
 
MODELLING TRAFFIC IN IMS NETWORK NODES
MODELLING TRAFFIC IN IMS NETWORK NODESMODELLING TRAFFIC IN IMS NETWORK NODES
MODELLING TRAFFIC IN IMS NETWORK NODESijdpsjournal
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlationijdpsjournal
 
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...ijdpsjournal
 
Latency aware write buffer resource
Latency aware write buffer resourceLatency aware write buffer resource
Latency aware write buffer resourceijdpsjournal
 

Viewers also liked (18)

A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...
 
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
 
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERSPERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
 
Permission based group mutual exclusion
Permission based group mutual exclusionPermission based group mutual exclusion
Permission based group mutual exclusion
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
 
Scalable frequent itemset mining using heterogeneous computing par apriori a...
Scalable frequent itemset mining using heterogeneous computing  par apriori a...Scalable frequent itemset mining using heterogeneous computing  par apriori a...
Scalable frequent itemset mining using heterogeneous computing par apriori a...
 
Before we shake hands: representation and the global future of education
Before we shake hands: representation and the global future of education Before we shake hands: representation and the global future of education
Before we shake hands: representation and the global future of education
 
Risky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationRisky Reading: images and the vision of African education
Risky Reading: images and the vision of African education
 
Risky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationRisky Reading: images and the vision of African education
Risky Reading: images and the vision of African education
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
Less a LessPHP
Less a LessPHPLess a LessPHP
Less a LessPHP
 
MODELLING TRAFFIC IN IMS NETWORK NODES
MODELLING TRAFFIC IN IMS NETWORK NODESMODELLING TRAFFIC IN IMS NETWORK NODES
MODELLING TRAFFIC IN IMS NETWORK NODES
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlation
 
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
 
Latency aware write buffer resource
Latency aware write buffer resourceLatency aware write buffer resource
Latency aware write buffer resource
 

Similar to KALMAN FILTER BASED CONGESTION CONTROLLER

Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSCONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSIJCI JOURNAL
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log andijwmn
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...IRJET Journal
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...AIRCC Publishing Corporation
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...ijcsit
 
Fuzzy type 1 PID controllers design for TCP/AQM wireless networks
Fuzzy type 1 PID controllers design for TCP/AQM wireless networksFuzzy type 1 PID controllers design for TCP/AQM wireless networks
Fuzzy type 1 PID controllers design for TCP/AQM wireless networksnooriasukmaningtyas
 
New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems
New Proposed Contention Avoidance Scheme for Distributed Real-Time SystemsNew Proposed Contention Avoidance Scheme for Distributed Real-Time Systems
New Proposed Contention Avoidance Scheme for Distributed Real-Time Systemspaperpublications3
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...IRJET Journal
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksIJMER
 
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
Performance Analysis of TCP and SCTP For Congestion Losses In ManetPerformance Analysis of TCP and SCTP For Congestion Losses In Manet
Performance Analysis of TCP and SCTP For Congestion Losses In ManetIJERA Editor
 

Similar to KALMAN FILTER BASED CONGESTION CONTROLLER (20)

Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
U01725129138
U01725129138U01725129138
U01725129138
 
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSCONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log and
 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
 
Fuzzy type 1 PID controllers design for TCP/AQM wireless networks
Fuzzy type 1 PID controllers design for TCP/AQM wireless networksFuzzy type 1 PID controllers design for TCP/AQM wireless networks
Fuzzy type 1 PID controllers design for TCP/AQM wireless networks
 
P20 nichols
P20 nicholsP20 nichols
P20 nichols
 
New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems
New Proposed Contention Avoidance Scheme for Distributed Real-Time SystemsNew Proposed Contention Avoidance Scheme for Distributed Real-Time Systems
New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for Networks
 
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
Performance Analysis of TCP and SCTP For Congestion Losses In ManetPerformance Analysis of TCP and SCTP For Congestion Losses In Manet
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

KALMAN FILTER BASED CONGESTION CONTROLLER

  • 1. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 DOI : 10.5121/ijdps.2013.4307 85 KALMAN FILTER BASED CONGESTION CONTROLLER Mehdi Mohtashamzadeh Department of Computer Engineering, Soosangerd Branch, Islamic Azad University, Soosangerd, IRAN Mohtashamzadeh@gmail.com ABSTRACT Facing burst traffic, TCP congestion control algorithms severely decrease window size neglecting the fact that such burst traffics are temporal. In the increase phase sending window experiences a linear rise which may lead to waste in hefty proportion of available bandwidth. If congestion control mechanisms be able to estimate future state of network traffic they can cope with different circumstances and efficiently use bandwidth. Since data traffic which is running on networks is mostly self-similar, algorithms can take advantage of self-similarity property and repetitive traffic patterns to have accurate estimations and predictions in large time scales. In this research a two-stage controller is presented. In fact the first part is a RED congestion controller which acts in short time scales (200 milliseconds) and the second is a Kalman filter estimator which do RTT and window size estimations in large time scales (every two seconds). If the RED mechanism decides to increase the window size, the magnitude of this increase is controlled by Kalman filter. To be more precise, if the Kalman filter indicates a non-congested situation in the next large time scale, a magnitude factor is calculated and given to RED algorithm to strengthen the amount of increase. KEYWORDS Kalman filter, Self similarity, congestion control 1. INTRODUCTION Ever increasing amount of data in networks may lead to congested networks, routers with full queues, increase of loss rate, and end-to-end latency. As a result effective throughput in networks would be plummeted. To deal with such challenges routers have to route packets faster and more precise. Towards this end congestion control algorithms have developed to enable the dramatic growth of networks, especially Internet. The original idea ([1]) was to adjust the transmission rate based on the loss probability. The first implementation of this mechanism was named TCP Tahoe and later refined into TCP Reno, New Reno, RED, REM and etc. These algorithms are now the dominating transport protocols on the Internet. Almost all congestion control mechanisms cannot utilize available bandwidth since they react late and harsh to traffic bursts and cannot effectively recover network as they increase sending window size in a slow conservative linear manner. Admittedly, such manner may protect network resources from high level contentions. However, if mechanisms be able to get aware of network status in near future, they can control the magnitude of window size increase or decrease. Since network traffic imitate Heavy-tail distribution [2-4] and have Long Range Dependency (LRD) and self-similarity, network parameters can be predicted. Unfortunately, most network protocols
  • 2. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 86 have been designed according to Poisson probability distribution of network traffic. Researchers have proposed two main solutions, first to overwrite network protocols and other to modify existing control mechanisms to gain from self-similarity and LRD property. Current work belongs to the second solution and tries to improve the performance of TCP RED mechanism [5] using mathematical concept of Kalman filters to estimate Round Trip Time (RTT) and window size parameters in large time scales considering the fact that traffic is self-similar and repeated in time. As a light and precise estimation tool, Kalman filter has widely been deployed by researchers to control congestion in data networks. Authors of [6] have studied RTT estimation as a suitable parameter to control congestion using network state information. Investigating the characteristic of RTT and the application of the estimation, they concluded that the estimation objective is to keep the estimate smooth but still able to capture sudden mean changes. As a result a Kalman filter combined with CUSUM change detection was proposed and shown to perform well based on results of experiments on real data.Hoon Yang et al. [7] have proposed an LQ-Servo control mechanism with observer for TCP/AQM system. The controller’s structure is composed of a traditional servo mechanism based on Linear Quadric approach. In order to estimate the state of TCP window packet size, they facilitate the control structure with a Kalman filter based observer.Last but not least, in [8] an Extended Kalman Filter based bandwidth estimation module which is capable of providing highly accurate link capacity estimations. Authors claim that their protocol-independent non-packet-probing module is distinct from other bandwidth estimators in two ways; firstly, rather than directly measuring link capacity, the module uses the persistent queue size and associated parameters. Second, their proposed module is claimed to overcome the degradation of the network utilization problem resulted by an increasing bandwidth value. They demonstrated that both XCP and VCP protocols with EKF-based Bandwidth Estimator could overcome the limitations of the original protocols and achieve significant performance improvements in network utilization by eliminating the protocol oscillatory behaviour. 2. TCP-RTT In random early detection (RED) [5], packets are dropped before the buffer is full, with a probability that increases with the queue length. RED can thus be seen as a way of indirectly signalling the queue length to the source. RED is window-based which means that each sender has a window that determines how many packets are allowed to be sent at any given time. The transmission rate is regulated by adjusting this window. During congestion avoidance phase the congestion window size (W) of senders grows linearly which cause linear increase in queue length. This growth continues as long as weighted average queue length (X) remains below ; if X exceeds this threshold system should go through the delayed drop-notification phase. This phase is governed by a count-down timer which expires in exactly one round trip time ( ). During this some queued packets are dropped base on their calculated drop probability. This phase ends with the expiration of the timer, after which the congestion window W is cut in half and a new timer , is used which is initialized to the value of the current round trip time. Third phase is called recovery in which senders are not permitted to transmit packets, the congestion window W is kept fixed and the queue is going to be empty. This phase lasts for 0.5 .In the last phase which also lasts 0.5 senders are allowed to transmit packets but the congestion window W is still kept fixed resulting in no change in queue length. The controller returns to the congestion avoidance phase after the expiration of timer.
  • 3. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 87 = ⎩ ⎪ ⎨ ⎪ ⎧ + 1 + 1 ( ) ( ) As it can be seen in the above equation window size increase in “congestion avoidance” and “Delayed notification” phases is done in a linear manner which may reduce performance according to bandwidth waste. This shortcoming is challenged in this research and details are presented in the following section. 3. SELF-SIMILARITY OF TRAFFIC IN LONG TIME SCALE Crovella et al. [9] studied 500 thousand of web requests. Senders were assumed as on/off traffic generators.They found that overall generated traffic is self-similar. In addition, authors of [10] have shown that in most cases Ethernet local network’s traffic is burst and self-similar. Moreover, TCP, Telnet, and FTP traffic types have been studied by authors of [11]. They understood that Poisson model which has been the dominant model of network traffic for plenty of years is not compatible with burst property of traffic in different time scales. Last but not least, research results of [12] depict that VBR traffic can easily be modelled by Heavy-Tail distribution, thus it is self-similar. In accordance with these demonstrations, self-similarity can be considered to improve network throughput via predicting network status. 4. KALMAN FILTER BASED CONGESTION CONTROLLER The proposed design of current research is a two-stage controller (Fig. 1). The first part is a RED controller which function in short time scales and the second part is a Kalman filter which tries do estimate RTT and window size parameters every three seconds (long time scale) keeping in mind that traffic is self-similar and traffic patterns are repeated in long time scales. The mathematical model of classic congestion controllers may serve their purpose well in most cases but the assumptions of the mathematical model are not correct in all circumstances, for example, presence of a very large number of network nodes and packet-flows may affect the calculations up to a fractional level which can accumulate into a high level of measurement uncertainty when the results are used as feedback control [13]. Moreover, a RED algorithm which operates on a router at some congested link and uses the exponentially weighted-average-queue- length to predict packet losses and impose flow control may use wrong parameters (weights) and can consequently lead to uncertainties. The aim of State Estimation is to separate the signal of interest from the measurement uncertainties and filter out the noise. Kalman filter State Estimator is used here to achieve these goals. The reason of Kalman filter selection is the well-known property of feedback systems. Feedback can compensate for model uncertainty. This is one of the properties which explain the broad usage of Kalman filters. The proposed controller functions as follows. If the estimated value of window size shows a rise and the estimated RTT depicts a fall in comparison with the last long time scale, aggressiveness factor (α) is calculated and sent to the first part of the controller. The RED algorithm can use this factor to strengthen the amount of increase in “congestion avoidance” and “Delayed notification” phases considering the fact that in the next long time scale network may experience low level of contention (based on Kalman filter estimations). Although the long time scale controller can be
  • 4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 88 implemented just based on RTT estimations, controller accuracy would be increased in case of using window size estimations along with RTT estimations. Figure 1.Two-stage congestion controller. The first part has a short time view of network, while the second part makes long time predictions according to self-similarity property of traffic patterns Six congestion levels have been considered for the simulated network based on average (µ) and deviation (б) of RTT estimates. Each level can be mapped to a period [x,y) of RTT in which x and y are computed according to the following equations. It is worth noting that periods are recomputed at the end of every long time scale.               mkk m k x 11 2 1                mk mkx k m y 1 1 2 )2(   “m” stands for quantity of levels in these equations. In accordance with the above equations, six traffic levels results to six ranges of RTTs which are listed below: (-∞, µ-2б) [µ-2 б, µ- б) [µ- б, µ) [µ, µ+ б) [µ+ б, µ+2 б) [µ+2 б, ∞) Aggressiveness factor can then be calculated considering predicted traffic level (L). α = (1/L) A “A” is maximum value of Aggressiveness factor. As a result, increase equation of RED algorithm can be represented as follow, = ⎩ ⎪ ⎨ ⎪ ⎧ + α + α ( ) ( )
  • 5. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 89 The more the quantity of levels are, the more precise the controller will be. However, having more levels means more computational overheads. 4.1 Kalman filter estimators There are two estimators functioning in the second part of the controller, one to estimate RTT value and the other one to provide window size estimations. RTT estimation model’s equations are as follows, = ∗ + ∗ + = ( ∈ {0,1}) = 1 = 0 (1) = + (2) Furthermore, time update and measurement update equations are listed in Table 1. Table 1. Time update and measurement update equations of RTT estimator time update measurement update = + ∗ = + = + , = ( ) = + − = (1 − ) + , = ( ) The difference between the sampled RTT value and estimated RTT depicts the amount of measurement noise in each long time scale. = − (3) If sum of measurement noise till the current time scale exceeds a predefined threshold (0.05 in simulations), this noise should be considered in calculations (Y > 0). Otherwise, measurement noise is considered to be zero. = S + V S > ℎ ℎ ℎ δ = 1 , S = 0 Else δ = 0 The window size estimator has similar equations as follows, = ∗ + ∗ + , = (4)
  • 6. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 90 = + (5) In which A=1 and B=0 (there is no control input in the system while controlling window size). As a result the last equation can be rewritten as = + (6) Time update and measurement update equations are presented in Table 2. Measurement noise considerations are the same RTT. Table 2. Time update and measurement update equations of window size estimator time update measurement update = + ∗ = + = + , = ( ) = + − = (1 − ) + , = ( ) 4.2. Selection of the long time scale To design an efficient two time scale congestion controller an important issue is to specify time scales. As in Fig. 2 probability Pr{L2|L1=l} will be more concentrated if the large time scale increases. This concentration means having more precise predictability. Figure 2. Probability density used to identify L2 according to recent traffic level L1 [14]. Entropy is a method by which we can discuss about distributions. Entropy is at maximum level when the probability distribution is not concentrated and otherwise entropy will be low. For probability density function (Pi) entropy can be calculated as follow,  i iii ppPS /1log)( (7) In this equation Pi is the probability density function. So in our case entropy is,
  • 7. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 91   ' }1|'2Pr{log}1|'2Pr{ l l lLlLlLlLS (8) Authors of [14] have shown that increasing the time scale leads to reduction of entropy. Therefore larger time scales would be more adequate. Also it has been mentioned that decrease of entropy is negligible for time scales larger than 3 seconds. 5. RESULTS Simulated network included 30 ON/OFF traffic generators to produce self-similar traffic. The average hop count for each packet in flight was set to be more than four. Furthermore, network parameter setting has considered as follows. Table 3. Network parameter setting Variable Value RED Parameters 130 270 0.15 weight 0.001 Propagation delay ( ) 0.1 According to measurements RTT estimation values and actual RTT sampling values show little differences (Fig. 3) and these differences become dispensable after 90 Seconds since Kalman filter corrects itself according to the past estimations and network states. A comparison between RTT results of pure RED congestion controller and Kalman controller depicts that the design with Kalman filter estimator leads to have a network with higher degree of throughput and low variant RTT. Fast decreases of RTT in Fig. 3 at 50, 92, and 149 seconds are results of predicting low level of contention by the Kalman controller which enables the first part of the controller (RED) to increase the window size more aggressively. In addition, RTT results related to pure RED congestion controller are presented in Fig. 4. By comparing the RTT results of Fig. 3 and Fig. 4, capability of Kalman filter based controller could be perceived, since the average RTT value for Kalman controller and RED controller are 0.190 and 0.223 respectively.
  • 8. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 92 Figure 3. RTT estimation values made by Kalman filter vs. actual RTT samplings Figure 4. RTT results of RED controller Moreover, queue length in routers was investigated. Overflowed router queues in a network can be interpreted as congested network. A comparison between the queue size of a particular node with the proposed mechanism versus the pure RED is presented in Fig. 5. it can be deduced that the Kalman filter approach has been more successful in controlling queue length parameter, which means that the network has experienced fewer congested situations. Fast falling slopes in this figure are due to improved window size increases performed by the first part of the controller based on precise estimations of the Kalman filter estimator functioning in the second part. In other words, detecting low level of contention, Kalman filter based controller triggers the first part to do window sizeincrease more aggressively. However, every controller has some uncertainties and measurement noises by which overall performance could be plummeted. Plenty of miss-predictions have been detected during simulations. A case in point is the fast rise of queue length in (538,542) period which is due to two false estimations. Apart from these anomalies, the proposed controller has outperformed the classic congestion controller in most cases. In conclusion, there is no doubt that the measurement update and time update calculations which should be done in each long time scale impose computational overheads but according to the 0 0.05 0.1 0.15 0.2 0.25 0.3 20 51 79 110 140 171 Kalman estimations samplings Simulation time (sec) RTT (sec) 0 0.05 0.1 0.15 0.2 0.25 0.3 20 26 32 38 44 50 56 62 68 74 80 86 92 98 104 110 116 122 128 134 140 146 152 158 164 170 176 RED RTT (sec) Simulation time (sec)
  • 9. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 93 above discussed results the proposed Kalman filter approach may be an appropriate replacement for classic congestion controllers. Figure 5. Queue length for the proposed structure vs. pure RED congestion controller 6. CONCLUSIONS Accurate modelling of networks can efficiently help avoiding congestion. Although congestions can be eliminated completely when the model does not have any uncertainties and measurement noises, even the most accurate and fastest modelling and simulation techniques experience some extent of anomalies and uncertainties. Admittedly, these uncertainties can be negligible for a small scale network. However, studies have shown that a small fraction of noise may lead to disorders in networks with heavy traffic loads. A congestion avoidance modelling technique coupled with State Estimation can therefore be worthwhile as it is capable of predicting network status and eliminating congestions. Towards this end, in this research a RED congestion controller was combined with a Kalman filter estimator to do precise estimations of network parameters according to the self-similarity property of traffic patterns and to improve the functionality of classic controllers. Results have shown that the proposed structure improves network throughput. REFERENCES 1. Jacobson, V. (2004) “Congestion avoidance and control”, in symposium proceedings on Applications, Architecture and Protocols for Computer Communications, Stanford, California, US., 16-18 August, vol. 18, no. 4, p.314-329. 2. Paxon, V.& Floyd, S.(1995)“Wide-area traffic: The failure of poison modeling”, IEEE/ACM Transactions on Networking (TON), vol. 3, No 3, pp. 226--244. IEEE Press, New York. 3. Crovella, M.& Bestavors, A.(1996)“Self similarity in World Wide Web traffic: Evidence and possible causes”, International conference on measurement and modeling of computer systems (ACM SIGMETRICS). ACM, Philadelphia. 4. Willinger, W., Taqqu, M., Sherman, R. & Wilson, D.(1997)“Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at source level”, IEEE/ACM Transactions on Networking (TON), vol. 5, No 1, pp. 71--86. IEEE Press, New York. 5. Floyd, S. and Jacobson, V. (1993) “Random Early Detection Gateways for Congestion Avoidance”, IEEE Transactions on Networking, New York, United States, August 1993, Vol. 1, no. 4, p. 397-413. 0 10 20 30 40 50 60 70 500 507 514 521 528 535 542 549 Kalman estimator RED Simulation time (sec) Queue size
  • 10. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.3, May 2013 94 6. Jacobsson, K., Hjalmarsson, H., Möller, N. & Johansson, K. H. (2004) “Estimation of RTT and Bandwidth for Congestion Control Applications in Communication Networks”, 43rdIEEE Conference on Decision and Control (CDC),Atlantis, Bahamas, December. 7. Yang, J. H., Lim, D. K., Lee, J.B. & Shin, S. J. (2012) “Robust Congestion Control based on Loop- Shaping Method with Kalman Filter for TCP/AQM System”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 7, No. 2. 8. Huang, Z., Li, X. &Yousefizadeh, H. (2010) “Robust EKF-BasedWireless Congestion Control”, International Communications Conference (ICC2010), Cape Town, South Africa, May. 9. Crovella, M.& Bestavors, A.(1996)“Self similarity in World Wide Web traffic: Evidence and possible causes”, International conference on measurement and modeling of computer systems (ACM SIGMETRICS). ACM, Philadelphia. 10. Leland, W., Taqqu, M., Willinger, W.& Wilson, D. (1994) “On the self-similar nature of Ethernet traffic (extended version)”, IEEE/ACM Transactions on Networking (TON), Vol 2, No 1, pp. 1-15, February. 11. Paxon, V.& Floyd, S.(1995)“Wide-area traffic: The failure of poison modeling”, IEEE/ACM Transactions on Networking (TON), vol. 3, No 3, pp. 226--244. IEEE Press, New York. 12. Garret, W.&Willinger, W. (1994) “Analysis, Modelling and generation of self-similar VBR video traffic”, ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and Applications, London, UK, September. 13. Nagar, A., Abbas, G.&Tawfik, H. (2006)“Online State Estimation of Communication Networks”, International Journal of Computer Science and Network Security (IJCSNS), vol. 6, No 5. 14. Park, K.& Tuan, T. (2000)“Performance evaluation of multiple time scale TCP under self-similar traffic condition”, ACM Transactions on modeling and computer simulation, vol. 10, No 2, pp. 152-- 177. ACM, New York.