Date post: | 05-Apr-2018 |
Category: |
Documents |
Upload: | usama-malik |
View: | 215 times |
Download: | 0 times |
of 12
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
1/12
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 6, NO. 4, DECEMBER 2009 255
Feedback Control for Router Management andTCP/IP Network Stability
Yassine Ariba, Frdric Gouaisbaut, and Yann Labit
AbstractSeveral works have established links between con-gestion control in communication networks and feedback controltheory. In this paper, following this paradigm, the design ofan AQM (Active Queue Management) ensuring the stability ofthe congestion phenomenon at a router is proposed. To thisend, a modified fluid flow model of TCP (Transmission ControlProtocol) that takes into account all delays of the topology isintroduced. Then, appropriate tools from control theory are usedto address the stability issue and to cope with the time-varyingnature of the multiple delays. More precisely, the design of theAQM is formulated as a structured state feedback for multipletime delay systems through the quadratic separation framework.The objective of this mechanism is to ensure the regulation of
the queue size of the congested router as well as flow ratesto a prescribed level. Furthermore, the proposed methodologyallows to set arbitrarily the QoS (Quality of Service) of thecommunications following through the controlled router. Finally,a numerical example and some simulations support the exposedtheory.
Index TermsActive queue management, congestion control,control theory, multiple time delay system, stability, TCP networkmodel.
I. INTRODUCTION
C
ONGESTION control consists in regulating rates of
traffi
c sent into the network based on its state. The end-to-end congestion control mechanism TCP [1] is widely usedin the current Internet to prevent from congestion collapse.To this end, TCP algorithms use only implicit congestioninformations, such that delays or losses, at end-sources withoutany assistance from the network. As a matter of fact, therehas been a growing recognition that the network itself mustparticipate in congestion control and resource management[2], [3]. Regarding Internet routers, they use only a store andforward mechanism in which packets are stored in an outputlink buffer and are forwarded when the bandwidth of thislatter link is available. If the buffer becomes full, then extrapackets are dropped, thats the so-called drop tail mechanism.However, this latter is known to have many drawbacks suchas synchronization of sources, monopolization of resources byfew connections, large oscillations and saturation of the bufferunder persisting heavy traffics.
To prevent from this behavior, additional network algo-rithms need to be implemented not only to provide better
Manuscript received January 25, 2009; revised May 27, 2009 and August31, 2009. The associate editor coordinating the review of this paper andapproving it for publication was Q. Wang (corresponding guest editor).
Y. Ariba is with CNRS; LAAS; 7, avenue du Colonel Roche, F-31077Toulouse, France (e-mail: [email protected]).
F Gouaisbaut and Y. Labit are with the Universit de Toulouse, UPS, INSA,INP, ISAE ; LAAS ; F-31077 Toulouse, France.
Digital Object Identifier 10.1109/TNSM.2009.04.090405
congestion information to sources but also to control conges-tion effectively. Such mechanisms like Active Queue Manage-ment (AQM), executed by routers, detect congestion problemand inform sources (either implicitly or explicitly with themechanism of Explicit Congestion Notification ECN [4]). TheAQM principle consists in dropping (or marking when theECN option is enabled) some packets before the buffer sat-urates. Hence, following the Additive-Increase Multiplicative-
Decrease (AIMD) behavior, sources reduce their congestionwindow size avoiding then the full saturation of the router.Basically, an AQM drops/marks incoming packet with a given
probability related to a congestion index (such as queue lengthor delays) allowing then a control on the buffer occupation atrouters. The basic design issue is then How does the AQMhave to adjust its dropping probability to regulate the queuelength?.
Various mechanisms have been proposed in the litera-ture for the development of AQM such as Random EarlyDetection (RED) [5], Random Early Marking (REM) [6],Adaptive Virtual Queue (AVQ) [7] and many others [8]. Theirperformances have been evaluated [8] and empirical studieshave shown the effectiveness of these algorithms [3]. Then,significant researches have been devoted to the use of control
theory to develop more efficient AQM. Using dynamicalmodel developed by [9], a PI (Proportional Integral) [10]have been designed. In the same framework, other tools havebeen used to extend this preliminary work such as a PIDcontroller [8], [11] or robust control [12]. However, most ofthese papers do not take into account the delay and ensurethe stability in closed loop for all possible delays which couldbe very conservative in practice. Indeed, it should be moreconvenient to control the network congestion only for admis-sible delays, i.e. with limited and reasonable upperbounds.Furthermore, most of these works have been dedicated tothe stability analysis of networks composed of homogeneous
sources (see for example [13], [11], [14] and [15]). In thispaper, networks with heterogeneous sources are consideredintroducing then several delays. This case has already beeninvestigated in [16] and [17]. In [17], the construction of theAQM required to invoke the Generalized Nyquist Theoremand [16] provides a delay dependent state feedback involvingdelay compensations with a memory feedback control. Allthese latter methodologies are interesting in theory but hardlysuitable in practice. While these latter studies have considereda simplified model of TCP/AQM from [9], we use in thiscontribution a more accurate model presented in [18]. Indeed,contrary to [16] and [17], in this paper both forward andbackward delays are taken into account. Moreover, we do not
1932-4537/09$25.00 c 2009 IEEE
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
2/12
256 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 6, NO. 4, DECEMBER 2009
Fig. 1. Network topology.
make the usual assumption that delays are invariant. Then,congestion control of networks consisting in heterogeneousTCP sources is transformed into a stabilization problem for
multiple time-varying delays systems. Using the robust anal-ysis framework and especially quadratic separation approachdeveloped for time-delay systems by [19] and extended in[20], a stabilizing AQM is designed. The approach employedin this paper allows the formulation of the problem into matrixinequalities [21]. Using semi-definite programming solver, thislatter stability condition provides a simple and systematicmethod to design the parameters of the AQM. That is, nomathematical calculations are required, one just has to run thesystematic solver algorithm.
The paper is organized as follows. The second part presentsthe mathematical model of a network composed of a singlerouter and several heterogeneous sources supporting TCP.Section III is dedicated to the design of the AQM ensuring thestabilization of TCP. Section IV presents a numerical exampleand simulation results using NS-2. Finally, Section V con-cludes the paper. Appendix sections detail some mathematicalproofs and give the notations used in this paper.
II . NETWORK DYNAMICS
A. Fluid-flow model of TCP
In this paper, we consider a network consisting in a singlerouter and heterogeneous TCP sources. By heterogeneous,we mean that each source is linked to the router with differentpropagation delays (see Figure 1). Since the bottleneck isshared by flows, TCP applies the congestion avoidancealgorithm to cope with the network saturation [1].
Deterministic fluid-flow models have been widely used ([9],[18] and references therein) to describe congestion controland AQM schemes in IP networks. These models capturethe mean behavior of the TCP dynamic. While most of thestudies using control theory for network control considerthe model proposed by [9], we consider in this paper themodel introduced in [18] and described by (1). Contraryto the former, the model (1) does not neglect the forwardand backward delays. Furthermore, we will take into accountthe time-varying nature of network delays. The model and
Fig. 2. A single connection.
notations are as follow:
() =( )
( )(1 ())
1
()
( )
( )
()
2(),
() = +
(
)
( ),
=()
+ =
+
,
(1)where is the congestion window size of the source , isthe queue length of the buffer at the router, is the RoundTrip Time (RTT) perceived by the source . This latter quantitycan be decomposed as the sum of the forward and backwarddelays ( and
), standing for, respectively, the trip time
from the source to the router (the one way) and from therouter to the source via the receiver (the return). Note thatwe assume all RTT and backward delays are time-varying
(because of the queueing delay) but bounded: () and ()
= {1,...,}. , and areparameters related to the network configuration and represent,respectively, the link capacity, the propagation time of the pathtaken by the connection and the number of TCP sources. is the number of sessions established by the source .The first equation of (1) describes the AIMD behavior ofthe congestion window size of the transmission protocolapplied by the source . Roughly, the first part of the right-hand side represents the additive-increase, whereas the sec-ond follows the multiplicative decrease [18]. Expressed bythe second equation of (1), the length of the FIFO queue
integrates the difference between incoming traffi
c and thelink capacity. The RTTs, in the third equation, comprise thequeueing delay ()/ and the propagation delay. The signal() = (
) corresponds to the dropping probability of a
packet applied by the AQM. Besides, we also do not supposeany knowledge (like bounds) on the delay derivative whichcorresponds to the delay jitter.
Now, the question is What values should be assigned tothe dropping probability () in order to control flow rates,ensuring then the stability of the congestion ? In this paper,the dropping strategy, set by the AQM, will be designed withthe help of robust control tools. As usual in control theory,it is required to obtain some relevant informations about thenetwork status, ensuring then a feedback control structure.
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
3/12
ARIBA et al.: FEEDBACK CONTROL FOR ROUTER MANAGEMENT AND TCP/IP NETWORK STABILITY 257
Fig. 3. Network control.
Because the congestion window cannot be measured, wepropose a second model (2) that considers flow rates ,expressed as () =
()()
. Hence, the dynamic of this newquantity is of the form
() =
(()
() )=
()() () ()
2
()=
() () ()
().
Based on the expressions of(), (), (), (1) and () =() , a new model of the TCP behavior is derived
() =( )
()2(1 (
)
( )()
2(
)
=1 (
)
() +
()
,
() = +=1
( ),
(2)
Remark 1 Model (2) allows us to use instead of which is more suitable to handle in practice as proposed in
AVQ [22]. Effectively, numerous works have developed tools
that enable flow rates measurements, especially in anomaly
detection framework (see for example [23]).
Remark 2 Our work focuses on the congestion control of
a single router with a fixed topology. and are thensupposed to be constant.
B. Linearization of the nonlinear model
The objective of this study is to regulate the queue length() as well as flow rates () {1,...,} around anarbitrary operating point. By definition, at the equilibriumpoint, () = 0, () = 0, and all variables are set to anequilibrium value (for instance, () = ( ) = 0 ). Letus define the set of equilibrium points of the nonlinear model(2) as
0 = + 0/,
() = 0
0 = ,() = 0 0 =
22+(00 )
2 .(3)
As expected, the equilibrium is set if the amount of dataarriving to the router equals its capacity (see the second
equation in (3)). Moreover, the dropping probability must beset according to the third equation to ensure the equilibriumof the sending rates at the stead state. We can observe thatthe more the source is far away (higher RTT 0 ), the higheris the dropping probability at the equilibrium.Model (2) can thus be approximated by the following linearmodel
1()...()
()
=
1()...()
()
+
1(
1 )...
( )
()
+
1( 1)
...(
)
,
(4)where = 0 , = 0 and = 0 arethe state and input variations around the equilibrium point (3).The matrices of equation (4) are defined by
=
1 0 0 1
0. . . 0
...0 0 0 0 0 0
, =
1 0 0
0. . . 0
0 0 0 0 0
,
=
11 . . . 1 0...
... 01 . . . 0
1 . . . 0
,
(5)with =
100
2
0
00
2 , = 2(10 )
30
, = 00
and
= 12
0
20
2. The linearization is detailed in Appendix B.
Note that the equilibrium point (3) can be arbitrarily chosenaccording to some desired specifications:
0, the queue length at the equilibrium in the firstequation of (3), can be chosen to set the queueing delayat a desired value.
0 , in the second equation of (3), can be chosen to setthe part of the bandwidth that source is allowed to use.So fixing the same value for all 0 , fairness is ensured.Besides, allocating more resources to a given source (greater 0 than others), ensures to user a better Qualityof Service (QoS).
III. STABILIZATION: DESIGN OF AN AQM
A. Preliminaries
Before the design of the AQM, we first present a priorresult on control theory that will be used in the sequel.Although it exists a large literature about the stabilization oftime delay systems [24], it is still an open problem whereconservative methods (BMI, relaxation algorithms, conserva-tive inequalities) are involved [25]. Actually, all results use theLyapunov method and several conservative inequalities (likeParks, Moons or Jensens inequalities) must be introducedto derive constructive conditions [26]. Then, for stabilizationpurpose, some techniques propose to cope with non-linearform via model transformations (like descriptor form or the
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
4/12
258 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 6, NO. 4, DECEMBER 2009
Fig. 4. An interconnected system.
Leibniz-Newton formula) and additional decision variablescalled slack variables [24][27]. Nevertheless, the relevancyand the conservatism of such methods are difficult to quantifyand would lead to tedious calculations with many decisionvariables in the case of the system considered here. In thispaper, we propose another conservative method in an originalframework: the quadratic separation. This latter presents theadvantage to separate a system as the interconnection of alinear equation and a set of operators, allowing then to copewith several delays in an unified and simple way (with lessdecision variables). Besides, system (4) has a particular form:
involving different delays in the same delayed state
vector, because the inputs are subjected to different backward
delays, delayed subvector of the state are entailed in themodel (see system (10) in Section III-B).
Such particular structure cannot be efficiently addressed withclassical control tools and requires to find a particular Lya-punov functional while quadratic separation provides a con-venient method which decomposes the structure of the systemand does not require the system to be in a standard form.Theorem 1 states a stability condition for a closed-loop systemas illustrated in Figure 4 [28], [20]. Coming from the robustcontrol theory, this result provides a suitable framework for
the analysis of multiple time-varying delays systems.
Theorem 1 Given two possibly non-squared matrices , and an uncertain matrix belonging to a set . The inter-connected system represented on Figure 4 is stable for all
matrices if there exists a symmetric matrix =
satisfying both conditions[
][
]
> , (6)
2,
,
0 (7)
The matrices and define the system and matrix
contains operators that characterize the system. The key ideaconsists in embedding the delay operator in an uncertain setsatisfying the constraint (7). The vectors and describe thestate of the system whereas and are exogeneous signals.
B. State feedback control: the dropping strategy
As previously mentioned, an AQM computes the droppingprobability () in order to force source to reduce its sendingrate. Hence, an AQM acts as a controller and feedbacksthe congestion information (via loss rate) to sources basedon network measurements (see Figure 5). In [17], [18], thegeneralized Nyquist criterion is invoked to tune the parametersof RED and PI control laws which depend on the queuelength at the router. Both will be evaluated and compared
Fig. 5. Implementation of the AQM.
to our method in the Section IV. In [16], the predictiveapproach is used to compensate the delays and to stabilize
the communication protocol. However, this latter techniquepresents a high computational cost for the router requiring thecalculus of multiple integrals, multiplications and exponentialsof matrices. Besides, all these methods [16][18] (frequentialmethods, predictive approach) make necessarily the assump-tion that delays are invariant. Similarly to a structured statefeedback, we propose in this paper to compute () as alinear combination of the input rate perceived by the routerand the queue length:
() = 1( ) + 2() (8)
where 1 , 2 {1,...,} are tuning parameters of the
AQM. Applying this control law to each source yields in thefollowing input vector:
1()
...()
=
11 0. . .
0 1
1
1( 1 )
...
( )
+
21 0. . .
0 2
2
()...
()
.
(9)
This is the dropping strategy that must be applied by the AQMat the router (see Figure 5). Note that the dropping probability perceived by the source will be delayed ( ) becauseof the corresponding backward delay. We look for a structuredstate feedback (1 and 2 are diagonal matrices) rather thanfull state feedback for two reasons:
to avoid several extra signals associated to the differentdelay combinations in the state feedback: (
)
for , {1,...,}, introducing then many additionaldelays,
it provides a light computational cost (with less opera-
tions) compared to full matrices 1 and 2, reducingthen the processing time at router.
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
5/12
ARIBA et al.: FEEDBACK CONTROL FOR ROUTER MANAGEMENT AND TCP/IP NETWORK STABILITY 259
Fig. 6. Splitting principle of a TCP connection.
Applying the structured state feedback control law (9) tomodel (4), a closed-loop system is obtained
1()...
()()
=
1()...
()()
+
1( 1 )
...(
)
()
+1 1( 1)
...( )
+ 2 ( 1)
...( )
.(10)
Equation (10) depicts the mean behavior of TCP flow ratesregulated by a structured state feedback type AQM around anequilibrium point.
Remark 3 Since the proposed AQM handles both quantities
and , it appears to be a mix of queue-based and rate-based [22] algorithm. Combining and processing the two
informations, we expect ensuring an efficient regulation but
at the expense of additional measures.
Remark 4 Although we have made a restrictive assumption
in Remark 2 for the mathematical tractability, this latter can
be motivated by using the splitting principle of the TCP
connections [29]. The key idea is to divide an end-to-end
TCP connection into multiple split TCP connections via some
TCP Proxy, as illustrated on Figure 6, in order to isolate
a critical part of the network towards the QoS (wireless
network, satellite communication, congestion phenomenon).
Hence, choosing strategically few TCP proxy around a bot-
tleneck being subject to severe congestion, we can recover the
considered topology (see Figure 7).
Based on the prior result exposed in Section III-A, we aimnow at designing the AQM parameters 1 and 2 throughthe stability analysis of system (10). To this end, followingthe general outline proposed in [19], [20], system (10) can betransformed into a interconnected system of the form of Figure4 choosing matrices , , and vectors , appropriately(see Appendix C). It yields to the following theorem.
Theorem 2 For given upperbounds on delays ,
and
( = {1,...,}), system (10) isasymptotically stable, if there exists positive definite matrices
(+1)(+1), positive diagonal matrices , = {1, 2, 3} and diagonal matrices 1, 2 such that the
Fig. 7. Splitting principle for congestion control.
following inequality holds:
11 12 23 11 1 12 2 13 3
> , (11)
where , 1, 2 and , = {1, 2, 3} (18) are defined as(15)-(19).
The proof is defered in Appendix C. The matrices 1 and 2are derived solving the inequality (11) in a systematic mannerwith a semi-definite optimization algorithm [21].
Remark 5 Remark that the inequality (11) is bilinear w.r.t.
the decision variables. Hence, the optimization problem is
non convex and difficult to handle. Nevertheless, the feasibility
problem can still be tested to provide a suboptimal solution
using a BMI solver [30] or a relaxation algorithm with an
appropriate semi-definite programming solver [25].
IV. NS-2 SIMULATIONS
In this section, we present several simulations that have beenperformed with the network simulator NS-2 (release 2.30).Throughout this part, we consider the numerical exampleillustrated on the Figure 8 where several sources send dataflows to their respective receiver through a bottleneck. Asuch topology induces a congestion phenomenon at the firstrouter. That is why, we propose to implement our AQM tocope with this issue regulating the queue length of the routerto a desired level 0 = 100 packets (while the maximalbuffer size is set to 400 packets). Propagation times areas illustrated on Figure 8. The link bandwidth is fixed to10, that is 2500 packets/s considering packet size of500 bytes. Hence, at the equilibrium the queueing delay isequal to 40. The three sources use TCP/Reno and haveestablished 10 connections generating long lived flows. Uponthese latter specifications, the equilibrium point (3) is derived:0 = 100, 10 = 150, 20 = 250, 30 = 350,10 = 20 = 30 = 83/ (rate for each connections of
the three sources) and 0 = 103 [9.508 3.444 1.760].
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
6/12
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
7/12
ARIBA et al.: FEEDBACK CONTROL FOR ROUTER MANAGEMENT AND TCP/IP NETWORK STABILITY 261
0 10 20 30 40 50 60 70 80250
300
350
400
450
SF
0 10 20 30 40 50 60 70 80250
300
350
400
450
PI
0 10 20 30 40 50 60 70 80250
300
350
400
450
RED
0 10 20 30 40 50 60 70 80250
300
350
400
450
Time (s)
REM
Fig. 10. Evolution of the RTT of connections from source 3 (ms): theexpected value is 350.
Note that REM has the lowest queueing delay, however theobjective is to guarantee the queue length stability inducingthen a queueing delay equals to 40. If a lower queueingdelay is required, one just has to change the equilibriumpoint (reducing the desired queue length). Then, although REDperforms a good regulation on the queue length and the RTTat the steady state, its response time is very slow which makesRED inefficient against short-lived traffic perturbations [13].At last, the stability of the congestion phenomenon keeping astable queue length (and thus a stable queueing delay), allowsto control the RTT for all sources to a desired value with lowvariations (see Figure 10).
Figures 11, 12, 13 and 14 show the packet arrival ratesof each user when different AQM are implemented. The
prescribed equilibrium rate for each connection (according to(3)) that establishes fairness is 10 = 20 = 30 = 83/.As it can be seen on figures, only is able to keeparrival rates comparatively close to the equilibrium value.Table III presents statistics related to these figures and bearsout the accuracy and the control efficiency of the proposedSF as AQM. Futhermore, based on the Jains fairness index= (
)
2
(
2 )
[31] (the more the index is close to 1, the morethe distribution of the resources is fair), we observe that applies a fair strategy.
As mentioned earlier in Remark 6, setting the equi-librium point (3) appropriately, one can allocate arbitrarilydifferent amounts of resource to each source. Consider againexample of Figure 8, the objective is still to regulate the
TABLE IISOME STATISTICS ON THE QUEUE LENGTH FOR DIFFERENT AQM
DT RED REM PI SF() 317.6 103.8 94.8 99.4 102.3
..() 84 21.7 70.7 35.1 23.3
()127 41.5 37.9 39.8 40.9
()
33.6 8.7 28.3 14 9.3
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
1
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
2
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Temps (s)
Source
3
(pqts/s)
Fig. 11. Our State feedback strategy: sending rates of sources, expectedrates for fairness 0 = 83/.
queue length at 0 = 100 but assigning different sharesof the link capacity: 10 = 50/, 20 = 80/ and30 = 120/. Hence, the dropping probability at theequilibrium (3) is 0 = 103 [25.9 3.73 0.84] and solvingcondition of Theorem 2 we obtain:
1 = 103diag
0.303, 0.198, 0.062
,
2 = 103diag
0.215, 0.057, 0.017
.
Simulation of this new configuration still show a stable queuesize around 100 (as previously) but users send data flowswith different prescribed rates (see Figure 15). At last, we havetested the effect of additional unexpected and non-responsivetraffic (see Figure 16). The bursty traffic consists in 1, 6 or10 sources that inject in the congested router UDP flows with
a rate of 0.5 between 80 and 100 sec. Although ourAQM is able to maintain a stable queue length in presenceof light unexpected traffic, it is not efficient anymore underheavy traffic. In that case, the QoS related to the queueingdelay is not guaranteed.
V. CONCLUSION
In this paper the design of an AQM for congestion controlof a single router has been presented. The considered topologyconsists in several TCP sources sending long-lived flowsthrough a router to their respective receivers. To supply theTCP congestion control mechanism, an AQM must be imple-mented at the router. Based on a modified mathematical modelof the protocol behavior, a such AQM has been developed with
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
8/12
262 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 6, NO. 4, DECEMBER 2009
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
1
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Temps (s)
Source
3
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
2
(pqts/s)
Fig. 12. RED strategy: sending rates of sources, expected rates for fairness0 = 83/.
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
1
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
2
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Temps (s)
Source
3
(pqts/s)
Fig. 13. REM strategy: sending rates of sources, expected rates for fairness0 = 83/.
control theory tools. Indeed, in a time delay system frame-work, a control law has been proposed and then the stabilityanalysis of the feedback system has been ensured. That is, theregulation of flows and the queue size of at the router havebeen ensured. Moreover, the choice of the equilibrium pointallows us to fix arbitrarily the different shares of the routercapacity allocated to each user. At last, a numerical exampleand simulations have shown the effectiveness and the fairnessof the proposed methodology. Future works concern the designof resilient AQM to cope with implementation uncertaintiesand tuning errors. Indeed, numerical computations have a finiteprecision and the resulting effective control may be slightlydifferent from the one expected. A second critical issue tohandle is buffer control under bursty and non-responsive trafficlike UDP.
TABLE IIISOME STATISTICS ON ARRIVAL RATES FOR DI FFERENT AQM
RED REMusers
Mean (pkts/s)Stand. dev. (pkts/s)
1 2 3147 83 14861 36 372
1 2 3147 81 6056 34 23
Jains fairness index 0.9450 0.8703
PI SFusers
Mean (pkts/s)Stand. dev. (pkts/s)
1 2 3
146 88 10966 35 335
1 2 3
104 91 8841 30 40Jains fairness index 0.9579 0.9946
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
1
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Sou
rce
2
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Temps (s)
Source
3
(pqts/s)
Fig. 14. PI strategy: sending rates of sources, expected rates for fairness0 = 83/.
APPENDIX ANOTATIONS:
For two symmetric matrices, and , > () meansthat is (semi-) positive definite. denotes thetranspose of. and denote respectively the identitymatrix of size and null matrix of size . If the contextallows it, the dimensions of these matrices are often omitted.We also define the set 2 [0, +) = 2 consisting of allmeasurable functions : + such that the following
norm 2
= (
0 (()()))1/2
< is bounded. Note
that this norm is related to the inner product defined as
, =+0
()(). Hence, the norm is also defined
as 22 = , . Finally, diag(, ) stands for the block
diagonal matrix: diag(, ) =
00
.
APPENDIX BLINEARIZATION OF THE FLUID-FLOW MODEL
In this appendix, we linearize the equations (2) around theequilibrium point defined in (3). First, let us recall the model
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
9/12
ARIBA et al.: FEEDBACK CONTROL FOR ROUTER MANAGEMENT AND TCP/IP NETWORK STABILITY 263
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
1
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Source
2
(pqts/s)
0 10 20 30 40 50 60 70 800
50
100
150
200
Temps (s)
Source
3
(pqts/s)
Fig. 15. Our state feedback strategy with different QoS: sending rates ofsources, expected rates 10 = 50/, 20 = 80/ and 30 =120/
0 50 100 1500
100
200
300
400
Queuesize(pkts)
0 50 100 1500
100
200
300
400
Queuesize(pkts)
0 50 100 1500
100
200
300
400
Time (s)
Queuesize(pkts)
10 unexpected sources: 5Mbps
6 unexpected sources: 3Mbps
1 unexpected sources: 0.5Mbps
Fig. 16. Our state feedback strategy with unexpected traffic (UDP) between80 and 100 sec
and introduce functions and :
() =( )
()(()
+ )2
(1 ( )
( )()
2(
)
=1 ( )
() + () +
()()
+ ,
=((), ( ), (
), (), (
)),
() = +
=1( ),
=((
)).
Now, we evaluate the partials of and , w.r.t. theirarguments, at the equilibrium point
()
=
[0(1 0)
2020
+00
2+
0
1
0
]
=
[(1 0)
200+
002
],
( ) =(1 0)
020
00
2
= 0,
( )
= 00
,
()
=
[020
0
220+
0(1 0)2
030
],
= (1 0)2
30,
( )
= 0
020
20
2,
( )
=
with =
=1 0 . Hence, for small variations around theequilibrium, model (2) can be approximate by the followinglinear time-delay system:
() =
[(1 0)
200+
002
]()
00
=1
( )
(1 0)2
30()
[1
20+
202
](
),
() =
=1
( ),
where = 0 , = 0 and = 0represent the variations of , and , respectively, aroundthe operating point (3).
APPENDIX CPROOF OF THEOREM 2
In this appendix, we detail the proof of the main resultconcerning the stabilization of the closed-loop system (10).First, let us write this system as
[ ()() ] = [ ()() ] + [ 1()() ]
+ 12() + 2
( 1)...
( )
where
() =
1()...
()
, 1() =
1( 1 )
...
( )
,
2() = 1( 1)
...( )
.
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
10/12
264 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 6, NO. 4, DECEMBER 2009
Secondly, we aim to transform this latter model as an inter-connection of the form of the Figure 4 in order to apply thestability criterion of Theorem 1. It is required foremost todefine operators that characterize the system:
:()
0
(),
:() ( ),
(1 ) :() =
().(14)
Operators and correspond to the integral operator anddelay operator, respectively. Note that traditional Laplacenotations (1 and ) cannot be used since delays are time-varying. The third operator is another delay-related operatorwhich will be used to provide rate-independent and delay-dependent stability condition. Hence, no information on thedelay variations will be required [32], [20] and maximalupperbounds on delays will be used [19]. Then, defining
the set of delay-related operators
1 =
(1 1
)
. . .
(1
)
,
2 =
(1 1). . .
(1 )
,
3 =
(1
1
). . .
(1
)
,
we can reconstruct the different signals that compose thesystem:
()
()
=
()
()
,
() 1() =1(),
() 2() =2(),
() ( 1)
.
..() ( )
=3 ()
.
..()
.
Finally, the model (10) is reworded in equivalent way as aninterconnected system with
()
() 1()() 2()
() ( 1)...
() ( )
=
1
2
3
()()
()
()
()...
()
and the linear equation (16) where
1 =[
1
], 2 =
1...1
,
= + + 11 + 22.
(15)
It can be shown [19], [20] that for a such interconnection the
following separator fulfills the second inequality (7)
=
11
2233
1
23
(17)where and for = {1, 2, 3} are positive definite matricesand
1 =diag21 ,...,2 ,2 =diag
21 ,...,
2
,
3 =diag
2
1 ,...,2
,
(18)
() ,
and () are maximal ad-
missible delays. Note that is invariant but may be uncertainand provides an upperbound. Invoking Theorem 1, theabove interconnection, and thus system (10), is asymptoticallystable if the second requirement (6) is satisfied with , and defined in (16) and (17). Indeed, the second one (7) beingverified (by construction of ), the first inequality provides
the criterion to be tested. Some basic calculations show thatthis latter condition can be developed as the following one
1 (11 + 22)1 2 332
where
=
+ 1
1 1
1
1 1 2 2
2 3
2 3
=1 11 +
1 21 +
2 32,
1 =[
1 11 11 12
],
2 =[
2 21 21 22
].
(19)At last, applying the Schur complement yields in the condition(11) of Theorem 2 which concludes the proof.
REFERENCES
[1] V. Jacobson, Congestion avoidance and control," in ACM SIGCOMM,Stanford, CA, Aug. 1988, pp. 314-329.
[2] B. Braden, D. Clark, and J. Crowcroft, Recommendations on queuemanagement and congestion avoidance in the internet," RFC 2309, Apr.1998.
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
11/12
ARIBA et al.: FEEDBACK CONTROL FOR ROUTER MANAGEMENT AND TCP/IP NETWORK STABILITY 265
112
(
()
()
()
()
()...
()
) =
1 1 2
()
() 1()() 2()
() ( 1 )...
() ( )
(16)
[3] L. Le, J. Aikat, K. Jeffay, and F. Donelson Smith, The effects of activequeue management on web performance," in ACM SIGCOMM, Aug.2003, pp. 265-276.
[4] K. K. Ramakrishnan and S. Floyd, A proposal to add explicit conges-tion notification (ECN) to IP," RFC 2481, Jan. 1999.
[5] S. Floyd and V. Jacobson, Random early detection gateways forcongestion avoidance," IEEE/ACM Trans. Networking, vol. 1, pp. 397-413, Aug. 1993.
[6] S. Athuraliya, D. Lapsley, and S. Low, An enhanced random earlymarking algorithm for internet flow control," in Proc. IEEE INFOCOM,Dec. 2000, pp. 1425-1434.
[7] S. Kunniyur and R. Srikant, Analysis and design of an adaptivevirtual queue (AVQ) algorithm for active queue management," in ACM
SIGCOMM, San Diego, CA, USA, aug 2001, pp. 123-134.[8] S. Ryu, C. Rump, and C. Qiao, Advances in active queue management
(AQM) based TCP congestion control," Telecommun. Syst., vol. 4, pp.317-351, 2004.
[9] V. Misra, W. Gong, and D. Towsley, Fluid-based analysis of a networkof AQM routers supporting TCP flows with an application to RED," in
ACM SIGCOMM, Aug. 2000, pp. 151-160.[10] C. V. Hollot, V. Misra, D. Towsley, and W. Gong, Analysis and design
of controllers for AQM routers supporting TCP flows," IEEE Trans.Automat. Control, vol. 47, pp. 945-959, June 2002.
[11] Y. Fan, F. Ren, and C. Lin, Design a PID controller for active queuemanagement," in Proc. IEEE International Symp. Computers Commun.(ISCC), vol. 2, 2003, pp. 985-990.
[12] P. F. Quet and H. zbay, On the design of aqm supporting TCP flowsusing robust control theory," IEEE Trans. Automat. Control, vol. 49, pp.1031-1036, June 2004.
[13] Y. Ariba, Y. Labit, and F. Gouaisbaut, Design and performance evalu-ation of a state-space based AQM," in Proc. IARIA International Conf.Commun. Theory, Reliability, Quality Service, July 2008, pp. 89-94.
[14] S. Manfredi, M. di Bernardo, and F. Garofalo, Robust output feedbackactive queue management control in TCP networks," in Proc. IEEEConf. Decision Control, Dec. 2004, pp. 1004-1009.
[15] D. Wang and C. V. Hollot, Robust analysis and design of controllersfor a single TCP flow," in Proc. IEEE International Conference onCommunication Technology (ICCT), vol. 1, Apr. 2003, pp. 276-280.
[16] K. B. Kim, Design of feedback controls supporting TCP based on thestate space approach," in IEEE Trans. Automat. Control, vol. 51, no. 7,July 2006.
[17] H. Han, C. V. Hollot, Y. Chait, and V. Misra, TCP networks stabilizedby buffer-based AQMs," in Proc. IEEE INFOCOM, Mar. 2004, pp. 964-974.
[18] H. S. Low, F. Paganini, and J. Doyle, Internet Congestion Control,"IEEE Control Syst. Mag., Feb. 2002, vol. 22, pp. 28-43.[19] F. Gouaisbaut and D. Peaucelle, A note on stability of time delay
systems," in 5 IFAC Symp. Robust Control Design (ROCOND06),Toulouse, France, July 2006.
[20] Y. Ariba, F. Gouaisbaut, and D. Peaucelle, Stability analysis oftime-varying delay systems in quadratic separation framework," in
International Conf. Mathematical Problems Engineering, Aerospace
Sciences (ICNPAA08), Gene, Italie, June 2008. [Online]. Available:http://hal.archives-ouvertes.fr/hal-00357766/fr/.
[21] J. Lfberg, Yalmip : A toolbox for modeling and optimization inMATLAB," in Proc. CACSD Conf., Taipei, Taiwan, 2004. [Online].Available: http://control.ee.ethz.ch/ joloef/yalmip.php
[22] D. Supratim and R. Srikant, Rate-based versus queue-based models ofcongestion control," IEEE Trans. Automat. Control, vol. 51, pp. 606-619, Apr. 2006.
[23] P. Barford and D. Plonka, Characteristics of network traffic flowanomalies," in Proc. ACM SIGCOMM Internet Measurement Workshop,Nov. 2001, pp. 69-73.
[24] S. Niculescu, Delay Effects on Stability: A Robust Control Approach,ser. Lecture Notes Control Information Sciences. Heildelberg: Springer-Verlag, 2001, vol. 269.
[25] K. Gu, V. L. Kharitonov, and J. Chen, Stability of Time-Delay Systems.Birkhuser Boston, 2003, Control Engineering.
[26] S. Xu and J. Lam, A survey of linear matrix inequality techniques instability analysis of delay systems," Intern. J. Syst. Sci., vol. 39, no. 12,pp. 1095-1113, 2008.
[27] E. Fridman and U. Shaked, An improved stabilization method for lineartime-delay systems," IEEE Trans. Automat. Control, vol. 47, pp. 1931-1937, Nov. 2002.
[28] D. Peaucelle, D. Arzelier, D. Henrion, and F. Gouaisbaut, Quadraticseparation for feedback connection of an uncertain matrix and an
implicit linear transformation," Automatica, vol. 43, no. 5, pp. 795-804,2007.[29] I. Maki, G. Hasegawa, M. Murata, and T. Murase, Performance analysis
and improvement of tcp proxy mechanism in tcp overlay networks," inProc. IEEE International Conf. Commun. (ICC05), vol. 1, May 2005,pp. 184-190.
[30] M. Kocvara and M. Stingl, Bilinear Matrix Inequalities: PENBMI,"PENOPT GbR. [Online]. Available: http://www.penopt.com/.
[31] R. Jain, D. Chiu, and W. Hawe, A quantitative measure of fairnessand discrimination for resource allocation in shared computer systems,"Technical Report TR301, Digital Equipment Corp, 1984.
[32] E. Fridman and U. Shaked, Input-output approach to stability and 2-gain analysis of systems with time-varying delays," Systems Control
Lett., vol. 55, pp. 1041-1053, Sept. 2006.
Yassine Ariba was born in Marrakech, Maroc,in November 13, 1983. He received the Masterdegree from the Paul Sabatier University, Toulouse,France, in July 2006. From October 2006 to Novem-ber 2009, he was a Ph.D. student at the Laboratoryfor Analysis and Architecture of Systems (LAAS)in Toulouse, France. In November 2009, he receivedthe Ph.D. degree from the Paul Sabatier University,Toulouse. He is currently assistant professor at theUniversity Paul Sabatier and researcher at LAAS inToulouse. His research activity concerns time delay
systems, robust analysis and network control.
Frdric Gouaisbaut was born in Rennes (France)in April 26, 1973. He received the "DiplmedIngnieur" (Engineers degree) from the EcoleCentrale de Lille, France, in September 1997 andthe "Diplme dEtudes Approfondies" (Masters De-gree) from the University of Science and Technologyof Lille, France, in September 1997. From October1998 to October 2001 he was a Ph.D. student atthe Laboratoire dAutomatique, Gnie Informatiqueet Signal (LAGIS) in Lille, France. He receivedthe "Diplme de Doctorat" (Ph.D. degree) from the
Ecole Centrale de Lille, France, in october 2001. Since October 2003, he isan associate professor at the Paul Sabatier University, Toulouse. His researchinterests include robust control, time delay systems, networked systems andsliding mode control.
AlultIXDoM1a1UfIX Ra
7/31/2019 Feedback_control_for_router_management_and_TCPIP_network_stability-JdP.pdf
12/12
266 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 6, NO. 4, DECEMBER 2009
Yann Labit was born in Lorient, France, in 1976.He received the Masters Degree (Diplme dEtudesApprofondies) from the University of Science PaulSabatier in Toulouse, France, in June 1999. FromOctober 1999 to October 2001 he was a Ph.D. Stu-dent at the Laboratoire dAnalyse et dArchitecturedes Systmes of the Centre National de la RechercheScientifique (LAAS-CNRS), Toulouse, France. Hereceived the Ph.D. Degree from INSAs School,Toulouse, France, in October 2002. Since October
2002, he is associate professor at the Paul SabatierUniversity, Toulouse. Yann Labits research interests are monitoring andsecurity in networks, networked systems, time delay systems and robustcontrol.