Professional Documents
Culture Documents
WCE2010 pp1679-1685
WCE2010 pp1679-1685
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/45534655
CITATION READS
1 29
4 authors, including:
All in-text references underlined in blue are linked to publications on ResearchGate, Available from: Teresa Alvarez
letting you access and read them immediately. Retrieved on: 23 June 2016
Proceedings of the World Congress on Engineering 2010 Vol III
WCE 2010, June 30 - July 2, 2010, London, U.K.
controller so that it can be guaranteed with a level of Thus, given ̂ , , and m, it is possible to establish a
confidence ̂ that the chosen controller works properly number N of representative scenarios that are enough to
according to the design parameters; that is, , , N ˆ . guarantee that the controller works properly with a
confidence level of ̂ . There are several ways to find the
D. Case of one controller under test value of N that validate (5). For the example in this paper, a
For simplicity, it will first be assumed that the controller is numerical bisection method was programmed.
the only element in a set of cardinality 1, that is, Remark. Notice that (5) admits other possible applications.
ˆ .Without loss of generality; it can be assumed that the For instance, it can also be used to determine possible
controller verifies: probability bounds given a set N of possible simulations and
controllers to be tested.
E g (?) Pr w W : g , w 1 ?, , Remark. The finite cardinality assumption holds for cases
that is, the chosen controller fails with probability ˆ for such as when there is a random number of samples in the
a scenario w W . In other words, we assume that the space of design parameters according to a given probability
controller does not fulfil the design requirements in (1). With ([21]-[23]).
this assumption, we can calculate the probability that a bad
controller has to successfully pass the tests in (2). It is
III. TCP/IP NETWORK PROBLEM
obvious that a controller that fails with ˆ in (1) has a
bigger chance of passing the tests in (2) and therefore this This section presents simulation results that demonstrate
case, the most restrictive one, will be used to establish the the method developed in section II. In general, the dynamics
bound. of an AQM router are complex due to the number of variables
When the controller is tested with the N scenarios the goal that come into play: packet sources, protocols, etc.
is to verify (2), which can be transformed into: Nevertheless, it is possible to obtain a nonlinear model that
represents the dynamics of the system [6] considering that the
g ˆ, w N ,
N
N
200
100
0
0 50 100 150 200 250 300
C
1000
500
0
0 50 100 150 200 250 300
p: mean
1
0.5
0
0 50 100 150 200 250 300
q: mean
200
100
0
0 50 100 150 200 250 300
q: std
100
50
0
0 50 100 150 200 250 300
Figure 3: All experiments for controller kp= -0,0009, Ti= 1.5,Td= 3
N
200
100
0
0 20 40 60 80 100 120 140 160 180
C
1000
500
0
0 20 40 60 80 100 120 140 160 180
p: mean
0.4
0.2
0
0 20 40 60 80 100 120 140 160 180
q: mean
125
120
115
0 20 40 60 80 100 120 140 160 180
q: std
50
0
0 20 40 60 80 100 120 140 160 180
Figure 4: Valid experiments for controller kp= -0,0009, Ti= 1.5,Td= 3
160
140
120
100
80
20 25 30 35 40 45 50 55 60 65 70
160
140
120
100
80
20 25 30 35 40 45 50 55 60 65 70
160
140
120
100
80
20 25 30 35 40 45 50 55 60 65 70
Figure 5: Simulation results
Thus, we have a total of 54 possible controllers. The given set, all of them are put to the test and the one that
simulations will be satisfactory if the queue size, whose offers the best results is kept. In our experiments, the
reference will be at 120 packets, has a mean value in the resulting number of different scenarios needed to obtain a
interval [116, 124] and its mean deviation is smaller than successful controller was 168 simulations. Notice that,
17. These are the bounds that define the function g with an increment in the number of simulations, the
introduced in section II. The procedure consists in testing probability bounds could also be improved.
one controller after another until one is found that fulfills Remark. In the case that none of the controllers should
the design requirements. The number of samples needed to pass the simulation tests, the requirements would have to
test each controller depends on the number of controllers be relaxed or the controlling scheme changed.
being tested. For example, if controller 1 fails then After the simulations finished, it can be concluded that
controller 2 and controller 1 are put to the test with a the controller with kp= -0,0009, Ti=1.5 and Td=3
bigger number of scenarios. This is repeated until a successfully passed the tests: therefore its performance is
controller that fulfills all the requirements is obtained. statistically guaranteed within the range established. Figs.
To this end, (5) was used to establish the desired 3 and 4 show, respectively, all the scenarios and the ones
properties for the controllers, fixing the following that passed the specifications, for the selected controller
parameters: (the one that fulfills the initial performance specifications).
0.05 , that is, we admit that the controller may not
fulfil, in 5% of the cases, the criteria used in the testing TABLE I
SIMULATION DATA
algorithm proposed in Section 2.
0.01 , that is, for each 100 scenarios simulated, NTCP C Q MEAN Q STD
only one failure is tolerated. A failure here means that 10 1000 120.33 6.6
the controller being tested has not achieved the required
performance in the chosen metric for a given simulation 180 1000 121.92 16.1
scenario. 30 500 118.258 16.3
ˆ 0.1 , that is, a maximum of 10% of the scenarios
may not be valid (repeated simulations, non realistic
scenarios, etc).
m=54, that is, 54 different controllers are considered Real simulation results are shown in Fig. 5 under three
to be tested. different situations (see Table 1). The queue size in
In this case, (5) is used to establish the number of packets is the depicted variable.
required simulations for each controller, so that the desired
properties can be statistically guaranteed. As we are
interested in finding the best possible controller within the
IV. CONCLUSIONS [16] Quet, P.-F., H. Özbay (2004). On the design of AQM supporting
TCP flows using robust control theory. IEEE Transactions on
A methodology to statistically guarantee the properties Automatic Control, 49, 1031-1036.
of a family of controllers has been presented in this paper. [17] Al-Hammouri, A.T., V. Liberatore, M.S. Branicky and S.M.
Phillips (2006). Complete stability region characterization for
The proposed method does not depend on the family of
PI-AQM. ACM SIGBED Review, 3, 1-6.
controllers considered, as it is very flexible. For instance, it [18] Aweya, J., M. Ouelette, D.Y. Montuno and K. Felske (2008).
can be used to determine probability bounds or establish a Design of rate-based controllers for active queue management in
minimum number of simulations required to accept or TCP/IP networks. Computer Communications, 31, 3344-3359.
[19] R. Tempo, G. Calafiore and F. Dabbene. Randomized Algorithms
reject a controller. for Analysis and Control of Uncertain Systems. Communication and
The importance of this result yields, in fact, that it Control Engineering Series. Springer-Verlag, London, 2005.
allows some properties to be guaranteed with a given [20] T. Alamo, R. Tempo and E. F. Camacho. Randomized strategies for
probabilistic solutions of uncertain feasibility and optimization
probability level in cases where there is a great difficulty, problems. IEEE Transactions on Automatic Control, accepted for
or even an impossibility, to demonstrate the cited publication, 2009.
properties. This is especially useful in this area, as it is [21] T. Alamo, R.Tempo and A. Luque. On the sample complexity of
probabilistic analysis and design methods. Perspectives in
common to find design procedures in the literature that are Mathematical System Theory, Control and Signal Processing.
only tested in a few cases with no guarantee that the Lecture Notes in Control and Information Sciences. Springer,
controller behavior will be similar in other scenarios. accepted for publication 2010.
[22] Y. Fujisaki and Y. Kozawa. Probabilistic robust controller design:
probable near minimax value and randomized algorithms.
ACKNOWLEDGMENT Probabilistic and Randomized Methods for Desigh under
Authors thank Prof. F. Tadeo for so many fruitful Uncertainty. Springer, London 2006.
[23] M. Vidyasagar. Randomized algorithms for robust controller
discussions. synthesis using statistical learning theory. Automatica,
37:1515-1528,2001.
REFERENCES [24] T. Alvarez and S. Cristea, AQM Control of TCP/IP Networks using
Generalized Predictive Control, in Proc. UKACC International
[1] Azuma, T., T. Fujita, M. Fujita (2006). Congestion control for Conference on Control 2008, Manchester, UK, Sep 2-4, 2008.
TCP/AQM networks using State Predictive Control. Electrical [25] Ramakrishnan, K., S. Floyd (1999). Explicit Congestion
Engineering in Japan, 156, 1491-1496. Notification. ACM SIGCOMM Computer Communications Review,
[2] Xiong, N., Y. He, Y. Yang, B. Xiao, X. Jia (2005). On designing a 24, 8-23.
novel PI controller for AQM routers supporting TCP flows. [26] .EcosimPro. The El Modelling language. www.ecosimpro.com.
APWEB 2005, 991-1002. [27] K. J. Aström and T. Hägglund, Advanced PID control. ISA. NC,
[3] Deng, X., S. Yi, G. Kesidis. C.R. Das (2003). A control theoretic 2006.
approach for designing adaptive AQM schemes. GLOBECOM’03, [28] Network Simulator, NS-2, http:/www.isi.edu/nsnam/ns/
5, 2947 – 2951. [29] W.-K. Chen, Linear Networks and Systems (Book style). Belmont,
[4] Jacobson, V. (1988). Congestion avoidance and control. ACM CA: Wadsworth, 1993, pp. 123–135.
SIGCOMM’88. [30] Comer, Douglas E. (2006). Internetworking with TCP/IP, 5,
[5] Ryu, S., C. Rump, C. Qiao (2004). Advances in Active Queue Prentice Hall: Upper Saddle River, NJ.
Management (AQM) based TCP congestion control. [31] G. O. Young, “Synthetic structure of industrial plastics (Book style
Telecommunication Systems, 25, 317-351. with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters,
[6] Hollot, C.V., V. Misra, D. Towsley, W. Gong (2002). Analysis and Ed. New York: McGraw-Hill, 1964, pp. 15–64.
Design of Controllers for AQM Routers Supporting TCP flows. [32] W.-K. Chen, Linear Networks and Systems (Book style). Belmont,
IEEE Transactions on Automatic Control, 47, 945-959. CA: Wadsworth, 1993, pp. 123–135.
[7] Hayes. M.J., S.M. Mahdi Alavi, P. Van de Ven (2007). An [33] H. Poor, An Introduction to Signal Detection and Estimation. New
Improved Active Queue Management scheme using a York: Springer-Verlag, 1985, ch. 4.
two-degree-of-freedom feedback controller. European Control [34] B. Smith, “An approach to graphs of linear forms (Unpublished
Conference (ECC 2007), July 2-5, 2007, Kos, Greece. work style),” unpublished.
[8] Sun, J., S. Chan, K.-T. Ko, G. Chen, M. Zukerman (2007). [35] E. H. Miller, “A note on reflector arrays (Periodical
Instability effects of two-way traffic in a TCP/AQM system. style—Accepted for publication),” IEEE Trans. Antennas
Computer Communications, 30, 2172-2179. Propagat., to be published.
[9] Floyd, S., V. Jacobson (1993). Random early detection gateways for [36] J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays
congestion avoidance. IEEE/ACM Transactions on Networking, 1, (Periodical style—Submitted for publication),” IEEE J. Quantum
397-413. Electron., submitted for publication.
[10] Athuraliya, S., S.H. Low, V.H. Li, Q. Yin (2001). REM: active [37] C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO,
queue management. IEEE Networking, 15, 48-53. private communication, May 1995.
[11] Kelly, F. (2001). Mathematical Modeling of the Internet, in [38] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron
Mathematics Unlimited-2001 and beyond, B. Enquist and W. spectroscopy studies on magneto-optical media and plastic substrate
Schmid, Eds, Berlin, Germany, Springer-Verlag. interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn.,
[12] Misra, V., W.B. Gong, D. Towsley (2000). Fluid Based Analysis of vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
a network of AQM routers supporting TCP flows with an Japan, 1982, p. 301].
application to RED. ACM/SIGCOMM 2000, 151-160. [39] M. Young, The Techincal Writers Handbook. Mill Valley, CA:
[13] Pagano, M., R. Secchi (2004). A survey on TCP performance University Science, 1989.
evaluation and modelling. Proc. of Int'l Working Conf. on [40] (Basic Book/Monograph Online Sources) J. K. Author. (year,
Performance Modelling and Evaluation of Heterogeneous month, day). Title (edition) [Type of medium]. Volume(issue).
Networks (HET-NET 2004), Ilkley, UK. Available: http://www.(URL)
[14] Sun, J., M. Zukerman and M. Palaniswami (2007). Stabilizing RED [41] J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available:
using a fuzzy controller. Proc. Of ICC’07, Glasgow, United http://www.atm.com
Kingdom. [42] (Journal Online Sources style) K. Author. (year, month). Title.
[15] Durresi, A., P. Kandikuppa, M. Sridharan, S. Chellappan, L. Journal [Type of medium]. Volume(issue), paging if given.
Barolli, R. Jain (2006). LED: Load Early Detection: A Congestion Available: http://www.(URL)
Control Algorithm based on Router Traffic Load. Journal of [43] R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as
Information Processing Society of Japan, 47, 94 – 107. electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online].
21(3). pp. 876—880. Available:
http://www.halcyon.com/pub/journals/21ps03-vidmar