12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Congestion Control in ATM <strong>Networks</strong> <strong>and</strong> the Internet 115Substituting the buffer error dynamics Equation 3.42 in Equation 3.47yields( v )2 2∆J ≤− 1−k max |( e k)|.(3.48)The closed-loop system is globally asymptotically stable.COROLLARY 3.4.1Let the desired buffer length x d be finite <strong>and</strong> the network disturbancebound, d M be equal to zero. Let the source rate for Equation 3.37 be provided byEquation 3.41, then the packet losses ek ( ) approach zero asymptotically.REMARK 1This theorem shows that in the absence of bounded disturbing traffic patterns,the error in buffer length ek ( ) <strong>and</strong> packet losses converges to zero asymptotically,for any initial condition. The rate of convergence <strong>and</strong> transmission delays <strong>and</strong>network utilization depends upon the gain matrix k v .THEOREM 3.4.2 (GENERAL CASE)Let the desired buffer length x d be finite <strong>and</strong> the disturbance bound d M be a knownconstant. Take the control input for Equation 3.37 as Equation 3.41 with anestimate of network traffic such that the approximation error, ̃f (), ⋅ is boundedabove by f , then the error in buffer length ek ( ) is GUUB, providedM0 < k < Iv(3.49)PROOF Let us consider the following Lyapunov function c<strong>and</strong>idate,Equation 3.46, <strong>and</strong> substitute Equation 3.42 in the first difference Equation3.47 to getTT∆J = ( k e+ f̃+ d) ( k e+ f̃+ d) −e ( k) e( k).vv(3.50)∆J ≤ 0 if <strong>and</strong> only if( k | e| + f̃+ d ) < | e|vmaxM(3.51)or| e|>f +M dM( 1− k )vmax(3.52)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!