12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Congestion Control in ATM <strong>Networks</strong> <strong>and</strong> the Internet 111scheme uses NN to estimate the traffic-accumulation rate <strong>and</strong> uses thisestimate to design a congestion controller, in contrast with other schemes(Floyd <strong>and</strong> Fall 1999, Sastry <strong>and</strong> Lam 2005), where the accumulation isassumed to be known beforeh<strong>and</strong>. This scheme is implemented in NS-2,<strong>and</strong> the simulation results justify theoretical conclusions. The simulationuses measurements of buffer occupancy, packet arrival, <strong>and</strong> service ratesat the destination, to determine the source data rates for congestion control.The proposed work appears to provide better results in a wide rangeof networking conditions compared to TCP friendly schemes.3.4.1 Network ModelFigure 3.20 illustrates an end-to-end network configuration for evaluatingthe proposed congestion control schemes. Congestion happens wheneverthe input rate ( Ini)is more than the available link capacity at the ingressnode, or when the network has a congested node inside the network. InFigure 3.20, qk ( ) denotes the network modeled as a single buffer, I r refersto the rate at which packets arrive at the egress node, Uk is the feedbackvariable from the destination, Xd is the desired buffer occupancy at theegress node buffer, S r refers to the departure rate of the packets to thedestination, <strong>and</strong> Vk is the departure rate of the packets into the networkfrom the ingress node.Most congestion schemes consist of adjusting the input rates to matchthe available link capacity (or rate) (Jain 1996) or carefully admit newtraffic (Qiu 1997, Bae <strong>and</strong> Suda 1991). Depending upon the duration ofcongestion, different schemes can be applied. For long-term congestion,Ingress nodeIniSVkUkq(k)Feedback (Xk, Ir, Sr)IrEgress nodeSrXd DXkFIGURE 3.20End-to-end network configuration.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!