Next Article in Journal
Condensation and Crystal Nucleation in a Lattice Gas with a Realistic Phase Diagram
Previous Article in Journal
A Robust Protocol for Entropy Measurement in Mesoscopic Circuits
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Hurst-Sensitive Active Queue Management

1
Faculty of Automatic Control, Electronics and Computer Science, Department of Distributed Systems and Informatic Devices, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
2
Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(3), 418; https://doi.org/10.3390/e24030418
Submission received: 25 December 2021 / Revised: 8 March 2022 / Accepted: 11 March 2022 / Published: 17 March 2022

Abstract

:
An Active Queue Management (AQM) mechanism, recommended by the Internet Engineering Task Force (IETF), increases the efficiency of network transmission. An example of this type of algorithm can be the Random Early Detection (RED) algorithm. The behavior of the RED algorithm strictly depends on the correct selection of its parameters. This selection may be performed automatically depending on the network conditions. The mechanisms that adjust their parameters to the network conditions are called the adaptive ones. The example can be the Adaptive RED (ARED) mechanism, which adjusts its parameters taking into consideration the traffic intensity. In our paper, we propose to use an additional traffic parameter to adjust the AQM parameters—degree of self-similarity—expressed using the Hurst parameter. In our study, we propose the modifications of the well-known AQM algorithms: ARED and fractional order P I α D β and the algorithms based on neural networks that are used to automatically adjust the AQM parameters using the traffic intensity and its degree of self-similarity. We use the Fluid Flow approximation and the discrete event simulation to evaluate the behavior of queues controlled by the proposed adaptive AQM mechanisms and compare the results with those obtained with their basic counterparts. In our experiments, we analyzed the average queue occupancies and packet delays in the communication node. The obtained results show that considering the degree of self-similarity of network traffic in the process of AQM parameters determination enabled us to decrease the average queue occupancy and the number of rejected packets, as well as to reduce the transmission latency.

1. Introduction

To properly evaluate the performance of computer networks, it is necessary to develop appropriate models of network mechanisms and a realistic model of packet traffic. Models used for computer network evaluation can be analytical or, as an alternative, they can use discrete event simulation. In the case of computer network modeling, analytical models based on queueing theory are often found in the literature [1,2]. The obtained results are then used in the design phase of network mechanisms to evaluate and compare the created mechanisms with existing solutions, as well as in the operation phase to adjust the configuration of network devices and parameters of network protocols to the required objectives [3,4,5,6].
There are two basic principles for managing queue occupancy in the Internet transmission. The first one—a traditional approach—assumes that packets arriving in the buffer are dropped only when the buffer is completely full. Active Queue Management (AQM) approaches are based on the idea of preemptively dropping packets even if there is still space to store incoming packets. These packets are dropped randomly according to a calculated probability function, which allows for increasing the network throughput and providing fair access to the link. It also eliminates the problem of global synchronization. The performance of the TCP protocol is closely related to the AQM algorithm implemented in the router. The first and still the most popular [7,8] AQM algorithm is Random Early Detection (RED), proposed in 1993 by Sally Floyd and Van Jacobson [9]. A great number of works exist in which the effect of changing its parameters has been studied, and which modifications of this mechanism have been presented to improve transmission performance.
The RED mechanism maintains a reasonable queue length and acceptable transmission latency. Nevertheless, it is necessary to choose its parameters properly [10]. Otherwise, the TCP/RED system becomes unstable [11]. Research related to the attempts to increase the performance of the RED mechanism has been presented in [12]. Our earlier work [13] showed that a more detailed study of the previous queue occupancy and a change in the implementation of the weighted average queue length can also improve the transmission performance.
Most of the RED type algorithms are based on preventive packet dropping when the queue occupancy is between certain predetermined thresholds ( M i n t h , M a x t h ). Its idea is based on a dropping function yielding a probability of packet rejection. The existing versions of the RED algorithm mostly differ in the way of defining the packet dropping probability function [14,15,16]. Proper selection of the parameters of this function is extremely important and should depend on network conditions. For the RED algorithm, the average queue length oscillates around the minimum threshold M i n t h for a small load or when high values of parameter P m a x (the maximum value of packet dropping probability function) are used. For high load or low values of P m a x , the average queue length is close to or even exceeds the threshold M a x t h .
In an operating network, the traffic intensity is highly variable. Thus, the AQM parameters should also change. Algorithms whose parameters change during operation are called the adaptive ones. The first algorithm of this type was ARED (Adaptive RED). For the ARED algorithm parameter, P m a x varies during the router operation, so that the queue occupancy is maintained between values M i n t h and M a x t h . Such approach reduces the variability of the queue delays and minimizes the amount of rejected packets [17,18].
Unfortunately, in the first ARED algorithm, adaptation of P m a x is time-consuming; therefore, matching queue parameters also takes a lot of time [19]. The existing types of the ARED algorithm mostly differ in the method of parameter values estimation [20]. Ref. [21] discusses the problem of real-time video transmission and its self-similar nature. The work shows that such traffic characteristics cause large delays. They postulate the necessity of creating new AQM mechanisms because traditional algorithms (such as RED or ARED) are not recommended in this case.
Parameters of Adaptive AQM algorithms are set based on intensity of network traffic. In our paper, we propose to set them not only based on intensity but also to incorporate the degree of traffic self-similarity to the selection process. Many studies have shown that the network traffic exhibits self-similarity (defined in Section 3), which has a large impact on a network performance: enlarges the queue occupancy and increases the number of the dropped packets in the nodes [22]. Unfortunately, the algorithms for calculating the degree of traffic self-similarity are computationally complex. Long computation time makes them unsuitable for this type of application. The paper proposes modifications of the Hurst estimation method, in which some of the computation procedures (collecting traffic information) are performed in a continuous manner, regardless of the Hurst estimation process. The proposed modifications make it possible to use it in queue scheduling in the router. In our paper, we examine how incorporation of Self-Similarity degree sensing into different AQMs affects the queue behavior. In our experiments, we modify two families of AQM mechanisms: ARED and non-integer order P I α D β controller and compare the performance with their basic equivalents. We apply artificial neural networks to tune the AQM mechanisms’ parameters.
The remainder of the paper is organized as follows: In Section 2, we describe the related works. Section 3 provides the background regarding LRD, self-similarity and Hurst parameter calculation. Section 4 and Section 5 describes different AQM mechanisms, neural network tuning of their parameters and theoretical basis for non-integer P I α D β controller. Section 6 presents experiments and discusses numerical results. Conclusions can be found in Section 7.

2. State of the Art

The original RED algorithm and its later modifications, such as Nonlinear RED (NLRED) [23] or Double Slope RED (DSRED) [14]), tend to be very sensitive to the network traffic properties (such as intensity or degree of self-similarity). When the network nodes are overloaded [24], these mechanisms cannot be used to maintain the intended queue length and frequently the maximum queue size is exceeded [13,23,25]. For this reason, they are not suitable for the proposed solution.
To analyze the performance and dynamics of Internet connections, the control theory methods can be used. They can contribute to the improvement of network stability and reduction of the reaction time. Some feedback control mechanisms have been proposed in the literature. In work [26], a dynamic Fluid Flow TCP/RED network model based on stochastic differential equations has been presented. This work contributed to the creation of several AQM algorithms based on different control theory approaches. In ref. [27], a mechanism based on a Proportional-Integral (PI) controller was proposed. In ref. [28], an adaptive Proportional (P) and Proportional-Integral (PI) controller were created. The conclusion was that the PI controller can easily adapt to the Internet traffic fluctuation. In ref. [29], a new variant of the RED mechanism, Proportional-Derivative-RED (PD-RED), was proposed. It was proven that the presented mechanism performed better than the Adaptive RED. In ref. [30], a Proportional-Integral-Differential (PID) controller was presented. The aim was to accelerate the responsiveness of the system. In the domain of control theory-based AQMs, the PI controllers are frequently used due to their implementation and computation simplicity [11]. In ref. [31], a self-tuning compensated PID controller was proposed, and the authors put the emphasis on the simplicity of the method. In ref. [32], the authors have proven that the key advantage of the Fractional–Order PID controller is its insensitivity to the parameters of the systems. As a result, these methods can ensure a stable performance.
Ref. [33] compares AQM mechanisms based on a PID controller and RBF neural networks. Less fluctuation in queue occupancy and faster steady-state time were observed for the neural network approach.
The advantages of using new concepts to create AQM mechanisms based on the reinforcement learning for network resource management have been described in [34]. This paper highlights that such mechanisms automatically adapt to changing network conditions without using additional tuning parameters.
The issues of TCP/AQM congestion control along with the occurring UDP streams have been addressed in [35]. The authors proposed a modification of the PID mechanism by implementing the disturbance and the time delay compensation in an integrated manner.
In addition, the increased interest in the use of AQM mechanisms is due to their use in 5G networks. Ref. [36] presents the problem of packet dropping and queuing delay for mobile 5G networks. In this paper, the authors present a new CoDel-based AQM mechanism that does not require information about the current network state.

3. Hurst Estimation Methods

Many studies, both theoretical and empirical, have shown that one of the important problems that should be taken into account when network solutions are analyzed are the traffic self-similarity and long-range dependence [37,38,39,40,41]. The occurrence of this phenomena in network traffic increases the queue lengths and the number of dropped packets in the routers [22]. Ignoring them may cause an underestimation of performance measures [42,43]. Our previous work has shown how the traffic self-similarity affects the behavior of the AQM queues [44,45]. In addition, the selection of the optimal AQM parameters depends on the degree of self-similarity [46].
The term “self-similar” was first introduced by Benoit Mandelbrot in 1967 [47]. Self-similarity means that a continuous stochastic process and the rescaled one have the same distribution [48]. The condition that a continuous stochastic process Y ( t ) is self-similar can be written as follows [48]:
Y ( t ) = d a H Y ( a t ) , f o r t 0 , a 0 a n d 0 < H < 1 ,
where H is the Hurst parameter—a measure used to estimate the degree of self-similarity and a is any positive stretching factor. In the case of the network traffic, we usually represent the data in a time series form and not a continuous process [49]. We measure the traffic in specified time slots. Such an obtained discrete-time stochastic process X 1 , X 2 , X k , is self-similar when for the aggregated (the original series X is averaged over non-overlapping blocks of size m) sequence X k ( m ) [50]:
X k ( m ) = 1 m ( X k m m + 1 + + X k m ) ,   where   m > 1   and   k 1
and the variance equals [50]:
V a r [ X ( m ) ] = V a r [ X ] m β , where 0 < β < 1 , H = 1 β / 2
or
log Var ( X k ( m ) ) log Var ( X ) β log m
In the literature, the notions of self-similarity and long-range dependence (LRD) are often used as equivalents. Its not true [51]. When the process exhibits LRD, it is an asymptotically second-order self-similar process. The occurrence of LRD means that the temporal similarities can be observed in data. The self-similar intensity of traffic in computer networks is affected in periods of intensive traffic. During such periods, queue occupancy increases. Therefore, we can observe increased waiting times and massive losses of packets. The classical approach to the LRD analysis is based on statistical methods. They are utilised to estimate the value of the Hurst exponent, denoted as H:
  • H ( 0 ; 0.5 ) —the process is negatively correlated, which means that the Long-Range Dependence does not occur;
  • H = 0.5 —the process is uncorrelated;
  • H ( 0.5 ; 1 ) —the process is positively correlated, which means that the LRD occurs.
The traditional estimation methods are, among others, aggregated variance, R/S plot, the periodogram-based method, detrended fluctuation analysis or local Whittle’s estimator. These methods use different principles to estimate the Hurst parameter value, thus the obtained values can significantly differ [37,41,52,53]. The big disadvantage of all mentioned methods is their complexity. Due to time-consuming calculations, they cannot be used to manage network traffic in real time. In this paper, we propose some modifications to one of the algorithms that allows us to use it for an Adaptive AQM mechanism.
One of the most popular algorithms of Hurst estimation is the Aggregate Variance method. This method is based on the formulas presented below. A stationary time series of length N, which shows long-term dependencies, is characterized by an average variance of samples of the order N 2 H 2 [48]. Hence, the following algorithm for determining the Hurst parameter value can be used:
Step 1: Divide the time series into blocks of length m (where m takes the values between 2 and N 2 ), and then compute the mean value for each k-th block [48]:
X ¯ ( m ) ( k ) = 1 m t = ( k 1 ) m + 1 k m X ( t )
for k = 1 , 2 , , N m
Step 2: Compute the variance of the averaged process X ¯ ( m ) ( k ) (for every m) [48]:
σ m 2 = 1 N m 1 k = 1 N m ( X ¯ ( m ) ( k ) μ ) 2
Step 3: Using the least squares method, we determine the approximation line for the values of logarithm of σ m 2 as a function of the logarithm of m.
Step 4: We determine the Hurst parameter value from the expression below:
H = 1 ζ 2 ,
where ζ is the slope of the approximated straight line.
The input data of the described algorithm are the intervals between arrival times of successive packets. As an output, we obtain the Hurst parameter value.
In this paper, we propose some modifications to this Hurst estimation method. Our goal is to carry out some calculations in the background. To achieve this objective, we changed the computation procedure in the first two steps of the above algorithm.
In the first step, instead of mean values, the sum for each k-th block is determined:
X ( m ) ( k ) = t = ( k 1 ) m + 1 k m X ( t ) , f o r k = 1 , 2 , , N m
This simple trick allows us to modify all k-blocks with each new packet arrival; see Figure 1. We collect information about the number of packets that came in a single time slot. Then, at the end of each time slot, a slot with information about the number of packets from that time slot is added to the first block ( 2 k for k = 1). If two new slots with packets appear in the k-th block, a new slot is created in the k+1 block with the sum of the values from these two new slots from the k-th block. With this modification, when more packets arrive in the pessimistic case, k + 1 summations must be performed.
Additionally, we modify the formula of variance calculation:
σ m 2 = 1 N m 1 k = 1 N m ( X ( m ) ( k ) 2 ) μ 2 ,
where μ is a mean value. As can be observed, the first part of the formula can also be calculated with block modification. Since most of the data are computed all the time (in background) and the number of blocks is small, the rest of the calculations (calculation of the mean value and approximation of obtained variances) are less time-consuming.
Table 1 compares the Hurst estimation results obtained using a standard Aggregate Variance method and our proposition. The results are identical, which confirms that calculating the sum values instead of mean values does not affect the estimation of the degree of self-similarity. Table 2 presents times of Hurst estimations depending on the length of the sample. The first column (Method 1) presents times for the standard Aggregate Variance method. Column 2 (method 2 (ver. 1)) presents results for our method. Presented times are slightly larger (despite the profit which should be gained by resigning from calculating average values in blocks). The increased time is caused by building the structures needed to store information in blocks. The advantage of our solution is that modifications of blocks and partial computation of variances can take place in the background. Column 3 (method 2 (ver. 2)) shows the computation times without operations possible in the background. As can be seen, the presented results are small enough to use the proposed Hurst estimation in the queuing mechanisms.

4. Adaptive AQM

In the case of the RED algorithm, the queue is divided into three areas. According to this rule, M i n t h and M a x t h values are the assumed queue size threshold values necessary for the proper operation of the RED algorithm [17], whereas Avg is an average queue occupancy.
The dropping probability P is growing linearly from 0 to P m a x :
P = 0 for   A v g < M i n t h a v g M i n t h M a x t h M i n t h P m a x for   M i n t h < = A v g < = M a x t h 1 for   A v g > M a x t h
The argument Avg is a weighted moving average queue length estimated based on current and past queue lengths. Its value is calculated at the arrival of each packet. The recommended value of P m a x is 0.1 [54].
The fixed setting of the RED algorithm parameters in the case of variable network traffic may cause its instability (alternately empty and full queue). For the ARED algorithm, the parameter P m a x changes adaptively (ranging from 0 to 0.5) according to the measured traffic [55]. There are plenty of papers regarding the modification of RED that shows the impact of changes in the determination of the packet rejection probability function on the efficiency of these mechanisms and perform a comparison of efficiency of different algorithms. Such a comparison can be found in [25].
In the algorithm, two parameters are defined: α and β . The first one defines how much P m a x increases and the second one—how much P m a x decreases ( P m a x = P m a x + α or P m a x = P m a x β ). The decision about a possible P m a x increase or decrease depends on the T a r g e t parameter, where:
T a r g e t ( t ) [ M i n t h + 0.4 · ( M a x t h M i n t h ) , M i n t h + 0.6 · ( M a x t h M i n t h ) ]
If the average queue length exceeds the target value and P m a x is less or equal to 0.5, the parameter P m a x is increased by a factor α defined as the lower value of 0.01 and P m a x / 4 ; otherwise, the P m a x is reduced by a factor β (authors of the ARED algorithm proposed 0.9). The P m a x parameter changes between 0.01 and 0.5, which causes an increase in the packet rejection rate in the case of the growing traffic intensity (when compared to traditional RED). The disadvantage of the algorithm is a relatively slow correction of P m a x . The algorithm needs 10 to 20 s to stabilise the parameter values. In the case of large variability in traffic, the algorithm may have difficulty obtaining optimal performance.
Our modification of the ARED algorithm incorporates adjusting the changes of P m a x parameter in accordance with the degree of self-similarity of the examined traffic. We propose to change the T a r g e t parameter depending on the Hurst parameter value:
T a r g e t ( t ) [ t m i n + ( 0.4 ( H u r s t ( k ) 0.5 ) ) · ( t m a x t m i n ) , t m i n + ( 0.6 ( H u r s t ( k ) 0.5 ) ) · ( t m a x t m i n ) ]
The second AQM we present in this paper is based on the Fractional Order P I α D β controller. Fractional Order Derivatives and Integrals (FOD/FOI) are extensions of the well-known integrals and derivatives. A proportional-integral-derivative controller (PID controller) is a traditional mechanism used in many feedback control systems. The non-integer order controllers can have better behavior than the classic controllers [56]. Refs. [57,58,59,60] show the advantages of such a mechanism used for queue control. They also describe how to use the P I α D β (non-integer integral order) as an AQM mechanism. In our solution, we use the controller response as the dropping packet probability function.
The probability of a packet loss is given by the following formula:
P = m a x { 0 , ( K P e k + K I Δ α e k + K D Δ β e k ) }
where K P , K I and K D are the tuning parameters (they correspond to the proportional, integral and derivative parameters, respectively), e k is the error in a current slot e k = Q k Q , i.e., the difference between current queue Q k and desired queue Q.
The dropping probability function depends on five parameters: the coefficients for the proportional and integral terms ( K P , K I , K D ) and the integral and derivative orders ( α , β ).
In adaptive approaches, these parameters should change regardless of network intensity and the value of the Hurst parameter. The computation of the PID parameters and the packet loss probability is performed in the discrete moments (at the arrival of a new packet). Such models can be considered as a discrete system. The most popular method of the calculations of discrete differ-integrals of non-integer order is a solution based on the generalization used in the Grünwald–Letnikov (GrLET) formula [61,62].
For a sequence f 0 , f 1 , , f j , , f k
q f k = j = 0 k ( 1 ) j q j f k j
where q R is a non-integer fractional order, f k is a differentiated discrete function and q j is a generalized Newton (for real numbers) symbol defined in the following manner:
q j = 1 for   j = 0 q ( q 1 ) ( q 2 ) ( q j + 1 ) j ! for   j = 1 , 2 ,

5. Selection of the AQM Parameters with the Use of Neural Networks

This section presents the artificial intelligence algorithms used to select the proper AQM parameters. In the presented methods, the neuron’s input data are queue and network traffic parameters. The target of the mechanism is to select such AQM parameter values in order to keep the assumed queue length.

Adaptive Neuron AQM

In ref. [63], a method to adjust the AQM parameters was proposed. This solution is named Adaptive Neuron AQM (AN-AQM) and uses the single neuron to calculate the probability of packet dropping. Based on this method, we propose the method of setting the AQM parameters.
The new value of parameter A is calculated for each incoming packet and can be obtained as follows:
A ( k ) = A ( k 1 ) + Δ A ( k )
where Δ A ( k ) reflects changes in parameter A. The value of A depends on state of neuron, which can be described as:
Δ A ( k ) = K i = a b w i ( k ) x i ( k )
where K is the proportional coefficient of the neuron. K has to take values greater than zero. x i ( k ) for i = a , a + 1 , b ) is the neuron’s input. Parameters a and b define the subset of neuron inputs, which affects the parameter A. Weight w i ( k ) is a connection weight of x i ( k ) . The weights are set according to the learning rule.
With the arrival of each packet, the algorithms calculate the error e ( k ) , which can be presented as a difference between actual queue occupancy q ( k ) and the desired queue length Q:
e ( k ) = q ( k ) Q
Paper presents two different types of Adaptive AQM mechanisms. The first one makes the parameters dependent only on the intensity of the network traffic intensity. The second one additionally takes into account the degree of self-similarity (expressed using the Hurst parameter).
For the first type, the inputs of the neuron, we set the following input values: x 1 ( k ) = e ( k ) e ( k 1 ) , x 2 ( k ) = e ( k ) e ( k 2 ) , x 3 ( k ) = e ( k 1 ) e ( k 2 ) , x 4 ( k ) = e ( k ) , x 5 ( k ) = e ( k ) 2 e ( k 1 ) + e ( k 2 ) , x 6 ( k ) = γ ( k ) , x 7 ( k ) = γ ( k 1 ) and x 8 ( k ) = γ ( k 2 ) .
We use the following input values for the neuron in the case of the Hurst-depended algorithm: x 1 ( k ) = e ( k ) e ( k 1 ) , x 2 ( k ) = e ( k ) e ( k 2 ) , x 3 ( k ) = e ( k 1 ) e ( k 2 ) , x 4 ( k ) = e ( k ) , x 5 ( k ) = e ( k ) 2 e ( k 1 ) + e ( k 2 ) , x 6 ( k ) = γ ( k ) , x 7 ( k ) = γ ( k 1 ) , x 8 ( k ) = γ ( k 2 ) and x 9 ( k ) = H u r s t ( k ) , where: γ ( k ) is a normalized error rate:
γ ( k ) = r ( k ) C 1
where r ( k ) is the input rate of the buffer at the bottleneck link, and C is the capacity of the bottleneck link.
The learning rule of a neuron can be presented using the following formula [64]:
w i ( k + 1 ) = w i ( k ) + d i y i ( k )
where d i > 0 is the learning rate, and y i ( k ) is the learning strategy. Ref. [64] recommends to use the following learning strategy:
y i ( k ) = e ( k ) p ( k ) x i ( k ) .
where e ( k ) is a teacher signal.
Such strategy implies that an adaptive neuron self-organizes regardless of e ( k ) and γ ( k ) .
We propose two methods of mapping of the neuron response to the ARED P m a x parameter. The first method does not consider self-similarity:
P m a x ( k ) = m a x ( 0 , m i n ( i = a b w i ( k ) x i ( k ) , 0.5 ) ) ,
and the second one is sensitive to Hurst parameter values:
P m a x ( k ) = m a x ( 0 , m i n ( i = a b w i ( k ) x i ( k ) , 0.5 ) ) ( 0.5 + H u r s t ( k ) )
The neural mechanism of choosing the PI controller parameters for multi-plant models has been presented in refs. [64,65]. Ref. [66] presents the adaptation of the previously proposed solution to the problem of Active Queue Management.
Mapping of the neuron response to P I α D β is similar to the Adaptive ARED solution. The formulas below (24)–(33) show how to determine the values of the coefficients for the proportional and integral terms ( K P , K I , K D ) and the integral and derivative orders ( α , β ). As can be observed, these values are determined by the neuron weights selected for a given parameter.
The solution for a mechanism that does not consider self-similarity of traffic can be defined as follows:
K P ( t ) = k 1 w 1 ( t ) w 6 ( t ) i + 1 n w i ( t )
K I ( t ) = k 2 w 4 ( t ) w 7 ( t ) i + 1 n w i ( t )
K D ( t ) = k 3 w 5 ( t ) w 4 ( t ) i + 1 n w i ( t )
λ ( t ) = k 4 w 2 ( t ) w 5 ( t ) w 8 ( t ) i + 1 n w i ( t )
β ( t ) = k 5 w 3 ( t ) w 4 ( t ) w 6 ( t ) i + 1 n w i ( t )
where k 1 k 5 are the constant proportional coefficients and w i ( k ) for i = 1 8 are connection weights that depend on corresponding neuron inputs and the learning rule.
For the second Hurst-sensitive solution, the terms and the derivative orders are calculated as follows:
K P ( t ) = k 1 w 9 ( t ) w 1 ( t ) w 6 ( t ) i + 1 n w i ( t )
K I ( t ) = k 2 w 9 ( t ) w 4 ( t ) w 7 ( t ) i + 1 n w i ( t )
K D ( t ) = k 3 w 9 ( t ) w 5 ( t ) w 4 ( t ) i + 1 n w i ( t )
λ ( t ) = k 4 w 9 ( t ) w 2 ( t ) w 5 ( t ) w 8 ( t ) i + 1 n w i ( t )
β ( t ) = k 5 w 9 ( t ) w 3 ( t ) w 4 ( t ) w 6 ( t ) i + 1 n w i ( t ) ,
where k 1 k 5 are the constant proportional coefficients and w i ( k ) for i = 1 9 are connection weights. Weight w 9 is associated with an input to which the self-similarity degree of the network stream is specified.

6. Results

Paper presents the results for two different base AQM models. The simulation models of ARED, P I α and P I α D β AQM mechanisms allowed us to show the influence of traffic self-similarity on the behavior of queue. The Fluid Flow approximation models allowed us to show the cooperation of AQM with TCP transport protocol. We investigate the impact of Adaptive AQM mechanisms on the transmission performance. We study how the degree of self-similarity affects the queue behavior. In addition, we aim to show that adjusting AQM parameters to the degree of self-similarity can improve the queue characteristics. In addition, we want to show that adjusting AQM parameters to the degree of self-similarity can improve network transmission.
In the simulation method, a self-similar source approximates a large number of TCP sources. For the Fluid Flow approximation, the number of TCP/UDP streams was specified. During the experiments, different AQM mechanisms implemented in the node were used. In the simulation case, this source is equivalent to the TCP streams, for which we also changed the value of the Hurst parameter. In the Fluid Flow analysis, we changed the number of TCP/UDP senders.

6.1. Fluid Flow Analysis

A diagram of the Fluid Flow analytical model has been shown in Figure 2. In ref. [67], we presented a Fluid Flow model that can be used to model multiple TCP/UDP streams. The model created for the purpose of the current study considers a packet stream that can consist of a single TCP stream. As shown in Figure 2, packet losses affect the TCP sender and reduce its transmission intensity.
The fluid flow model [26] can be used to demonstrate the dynamics of the TCP protocol. It ignores the TCP timeout mechanisms. The TCP NewReno model is based on the nonlinear differential equation presented below [68]:
d W i ( t ) d t = 1 R i ( t ) W i ( t ) 2 W i ( t R ( t ) ) R i ( t R i ( t ) ) p ( t R i ( t ) )
The equation describes the evolution of the congestion window size. The next equation is related to the queue evolution of the congested router:
d q ( t ) d t = i = 1 N W i ( t ) R i ( t ) C ,
where:
  • W i is the expected TCP congestion window size (in packets) for the i-th flow. It defines a number of packets that may be sent without waiting for the acknowledgements of the reception of previous packets;
  • R i is the round-trip time, R i = q / C + T p , the sum W i R i denotes the total input flow to the congestion router;
  • q is queue length (in packets);
  • C is link capacity (packets/time unit), the constant output flow of the router;
  • T p is propagation delay;
  • N is the number of TCP sessions passing through the router;
  • p is the packet drop probability.
For numerical Fluid Flow computations, the software written in Python was used. The detailed description of the methods can be found in [69]. The examined model considers the independent TCP/UDP connections (such models were described in [70]. In experiments, the following TCP/UDP connection parameters were considered:
  • transmission capacity of AQM router: C = 0.075 ;
  • propagation delay for i-th flow: T p i = 2 ;
  • starting time for i-th flow (TCP and UDP);
  • the number of packets sent by i-th flow (TCP and UDP).
We used the following ARED parameters:
  • M i n t h = 10 ;
  • M a x t h = 15 ;
  • buffer size (measured in packets) = 20 ;
  • P m a x = 0.1 ;
  • eight parameter w = 0.007 .
The P I α D β setpoint equals = 10 .
In our analysis, the TCP stream starts at time t = 0 and finishes at time t = 80.
Figure 3 presents the TCP and UDP intensity and queue lengths in the case of queue controlled by ARED and ANRED algorithm. The figures on the left present the version of algorithm which does not consider the value of the Hurst parameter. The figures on the right show the results for the mechanism considering the degree of self-similarity. The positioning of the figures described below is the same for all Fluid Flow results.
As can be observed, the ARED Hurst-sensitive algorithm version decreases the queue occupancy. The obtained average queue length for this algorithm is 13.8. In the case of the insensitive algorithm, the average queue size grows to the level of 17.6. Decreasing the average queue size results in a decrease in packet delays.
The Fluid Flow approximation results for the ANRED algorithm controlled by a single neuron are presented at the bottom of Figure 3. The desired queue length is set to 10 packets. This algorithm is robust. Switching on the UDP streams causes changes in the node load, resulting in the TCP congestion mechanism modifying the intensity of its stream. In the figures, it can be observed as fluctuations in the queue occupancy. For both types of algorithms (Hurst-sensitive and insensitive), the obtained average queue lengths are about 10. Nevertheless, it can be noticed that, for the Hurst-sensitive algorithm, stabilization of the queue (reaching the desired queue size) is a little bit faster.
Figure 4 presents the results obtained for AQM mechanisms based on fractional order P I α and P I α D β controllers. In the case of P I α , three parameters have been changed during the operation of the mechanism ( K P , K I and the fractional order α ). In the case of P I α D β , the neuron sets two additional parameters ( K D and the derivative order β ). The queue behavior for both controllers is quite similar (barely visible). However, a careful analysis of the results shows that, in the case of a controller with the derivative term, the queue reaches its final length a bit faster. For both types of controllers, their Hurst-sensitive versions allowed us to reach a stable state faster and to obtain smaller queue occupancy.

6.2. Simulation

The simulation model used for the purpose of the current study has been implemented in Python. The Python module SimPy is based on Python generators and allows us to prepare process-based discrete-event simulations [71]. SimPy is released under the MIT License and is frequently used in the area of network simulation [72,73].
Figure 5 presents the simulation model used in the study. Using such a model, the behavior of a single node connected to a large network can be analyzed. A source of packets with a given intensity and Hurst parameter replicates the Internet traffic corresponding to the sum of multiple TCP and UDP streams.
We analyse the following parameters of a transmission with AQM: the length of the queue and the number of rejected packets. The following parameters of simulations have been used: input traffic intensities, service time and Hurst parameter of input traffic. Input traffic intensity is λ = 0.5 . We have been changing the degree of self-similarity. We used the following values of the Hurst parameter: 0.5, 0.7, 0.8 and 0.9.
The distribution of service time is geometric. We consider three different values of its parameter. We obtain a large node load for μ = 0.25 and medium for μ = 0.25 .
The traffic is considered small when μ = 0.75 . To improve the readability of the paper, we present the results only for the largest network load case. The parameters μ and λ reflect the load and the parameters of the input and output link. The case in which λ = 0.5 and μ = 0.25 means that the output bandwidth is two times smaller. The parameters of queues and AQM mechanisms are identical to those used in the Fluid Flow approximation. In the simulation experiments, we analyze the following queue parameters: queue average occupancy, queue average delay and minimum and maximum packet delays.
The top part of Figure 6 presents the queue behavior in the case of the standard ARED algorithm and overloaded buffer. An increase in the Hurst parameter value significantly changes the queue behavior. More detailed results have been presented in Table 3. Regardless of the load, the number of dropped packets increases with the Hurst parameter. In the case of a heavily loaded system, the number of dropped packets may exceed 50%.
Figure 6 shows that queue occupancy decreases. It is especially visible for the traffic with a high degree of self-similarity. Even more interesting behavior has been presented in Table 4. Regardless of the buffer load, the average queue lengths obtained are smaller than those obtained for the standard ARED algorithm. These differences between standard ARED and the Hurst-sensitive ARED become even more significant when the degree of traffic self-similarity increases.
Figure 7 presents the queue behavior for the ANRED algorithm. The parameter P m a x for this solution is set by a single neuron. In the case of a heavily loaded queue, this parameter (regardless of the Hurst parameter value) quickly reaches its maximum value. The detailed results (presented in Table 5) confirm the aggressive behavior of the proposed mechanism.
In the case of a neuron-controlled Hurst-sensitive mechanism, the obtained mean queue lengths are even more similar regardless of the degree of self-similarity of the traffic. This dependence is the most visible for the heavily loaded system (bottom part of Figure 7 and Table 6). Contrary to the previous Hurst-insensitive method, this process is more time-consuming and differs depending on the traffic self-similarity degree. The importance of the additional Hurst-sensitive neuron input decreases the load of the system.
The previously discussed Adaptive AQM mechanisms based on the RED mechanism modify a single parameter. In the case of AQM based on a PID controller, the number of parameters increases. When we consider a P I α controller, we can modify three parameters. The P I α D β controller allows us to modify five parameters. The same as in the previous part of the paper, we compare the Hurst-sensitive selection of the PID parameters results with the non-sensitive ones. Additionally, the next part of our paper presents the impact of the degree of the traffic self-similarity on the evolution of controller parameters.
The impact of the Hurst parameter value on the queue lengths is presented in Figure 8. The figure presents the situation of an overloaded router. For all cases, the queue after a certain period of instability is set to the desired level. The obtained average queue lengths are similar regardless of the Hurst parameter value. By comparing the PI controller with the ARED algorithm, it can be concluded that it leads to a smaller queue length with a similar number of losses. Figure 9 presents changes in parameters K P , K I and λ . As can be seen, the bursty nature of traffic causes greater variability in parameters. The detailed results have been presented in Table 7.
The bottom part of Figure 8 presents queue lengths in the case of the Hurst-sensitive P I α controller. This controller needs less time to reach optimal queue occupancy. This is achieved due to the high variability of the controller parameters (see the bottom part in Figure 9). This variability is greater for the larger Hurst parameter values. By comparing with the previous mechanism, it can be seen that the average queue lengths are smaller with a similar rate of packet rejection (see Table 8).
The last results obtained show the behavior of the fractional order P I α D β controller (see Figure 10).
In the case of this controller, we have been changing two additional parameters related to the derivative term. Figure 10 compares the obtained queue length values in the case of Hurst-insensitive P I α D β and Hurst-sensitive P I α D β controllers. For both versions of the controller, the obtained differences (compared to the P I α controller) are not significant. However, the detailed results presented in Table 9 and Table 10 show advantages of the P I α D β controller. In the case of the controller with the derivative term, with the same number of rejected packets, the number of packets dropped due to queue overflow has been reduced.

7. Conclusions

The performance of the AQM mechanism depends on the selection of its parameters. This selection may be difficult. Proper parameters depend on traffic intensity and degree of traffic self-similarity (expressed in Hurst parameter) [46]. The problem of parameter value search can be solved by an adaptive selection during the operation of the router. This paper proposes Adaptive AQM mechanisms in which the parameter selection process depends on the degree of self-similarity of the network traffic (expressed using the Hurst parameter). The authors have proposed the modifications of the well-known AQM algorithms: standard ARED, ARED with neuron tuning parameters and fractional order P I α D β with neuron tuning parameters and built into them an analysis of the degree of self-similarity of network traffic.
The performance of the examined AQM mechanisms has been investigated with the use of two methods: Fluid Flow approximation (closed-loop control) and simulation (open loop scenario). The Fluid Flow approximation has allowed us to test the cooperation of the TCP NewReno protocol with AQM mechanisms. The simulation has been used to verify the operation of AQM mechanisms in the case of traffic of varying intensity and degree of self-similarity. The experiments have been carried out for the four degrees of traffic self-similarity and three different levels of router load.
The analytical results presented in this paper demonstrate how the AQM queues evolve. It can be clearly seen that, for AQM mechanisms that adapt their parameters also to the characteristics of the network traffic, the queues reach a certain steady state faster.
For the simulation results, the proposed model allows the evaluation of a router used in the transmission of a large number of TCP and UDP streams. Experiments have shown the advantages of Hurst-sensitive AQM mechanism. For all described algorithms, Hurst-sensitive modifications led to a decrease in the average queue lengths and reduction of the differences in queue sizes in the case of different levels of Hurst parameter of the network traffic.
Depending on the chosen AQM solution (ARED, P I α lub P I α D β ) and the use of Hurst-sensitive AQM, a reduction in transmission latency values between 11.8% and 18.7% has been observed for traffic without LRD and for traffic characterized by a low degree of LRD (for parameter values H = 0.5 and H = 0.6, respectively). On the other hand, for traffic characterized by a high degree of LRD (H = 0.9), a decrease in delays between 14% and 16.1% was recorded. Similarly to the observed delays, the average queue occupancy has also changed. The decreases between 2.7% and 29% for traffic without LRD (H = 0.5) and between 13.5% and 28.7% for traffic with high LRD (H = 0.9) have been observed. In the case of the P I α and P I α D β , a significant reduction in the number of dropped packets can also be observed. This number decreased for traffic without LRD (H = 0.5) by about 86% for the first controller and by 92% for the second controller. For traffic characterized by a high degree of LRD (H = 0.9), these decreases were 81.6% and 85.6%, respectively. The only case, in which the use of the Hurst-sensitive mechanism did not significantly affect the results, was the ANRED mechanism. This mechanism in all of the examined cases exhibited a high severity of performance, resulting in a significant number of rejected packets.
The Hurst parameter calculating is computationally complex. The well-known methods of calculating this parameter are too slow to be used in actual routers. The authors of the paper propose a modification of the aggregated variance method. We propose some mathematical simplifications that allow us to perform a large part of the calculations in the background. Information about each incoming packet is stored in a special structure which stores information about the number of packets at different timescales. Such preliminary data preparation significantly speeds up the Hurst parameter value calculation process. Despite the simplifications made to limit the number of computationally-demanding operations, the AQM algorithms used in this paper are still undoubtedly more computationally intensive than the simplest algorithms from the RED family, but at the same time offer better queue management. We believe that, with further development of the technology and introduction of more powerful routers, it will be possible to fully use such solutions in the near future.

Author Contributions

Conceptualization, D.M. and J.S.; Methodology, J.S. and A.D.; Software, D.M. and J.S.; Investigation, D.M., J.S. and A.D.; Validation, J.D. and D.M.; Project administration, D.M.; Formal analysis, J.D., J.S. and K.F.; Data duration, J.S. and D.M.; Writing—original draft preparation, J.S., J.D., A.D., K.F., D.M. and M.S.; Writing—review and editing, J.S. and J.D.; Visualization, J.S. and D.M.; Supervision, A.D. All authors have read and agreed to the published version of the manuscript.

Funding

This publication was supported by the Excellence Initiative–Research University programme implemented at the Silesian University of Technology, in year 2020/2021, Grant No.: 02/110/SDU/10-22-01.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Larionov, A.; Vishnevsky, V.; Semenova, O.; Dudin, A. A multiphase queueing model for performance analysis of a multi-hop IEEE 802.11 wireless network with DCF channel access. In Proceedings of the International Conference on Information Technologies and Mathematical Modelling, Saratov, Russia, 26–30 June 2019; Springer: Berlin, Germany, 2019; pp. 162–176. [Google Scholar]
  2. Chisci, G.; ElSawy, H.; Conti, A.; Alouini, M.S.; Win, M.Z. Uncoordinated massive wireless networks: Spatiotemporal models and multiaccess strategies. IEEE/ACM Trans. Netw. 2019, 27, 918–931. [Google Scholar] [CrossRef]
  3. Swami, N.; Bairwa, A.; Choudhary, M. A Literature Survey of Network Simulation Tools. In IJCRT International Conference Proceeding ICCCT; Association for Computing Machinery: New York, NY, USA, 2017; Volume 5, pp. 206–208. [Google Scholar]
  4. Borboruah, G.; Nandi, G. A Study on Large Scale Network Simulators. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 7318–7322. [Google Scholar]
  5. Dou, Y.; Liu, H.; Wei, L.; Chen, S. Design and simulation of self-organizing network routing algorithm based on Q-learning. In Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium (APNOMS), Daegu, Korea, 22–25 September 2020; pp. 357–360. [Google Scholar] [CrossRef]
  6. Guo, X.; Guo, B.; Li, K.; Fan, C.; Yang, H.; Huang, S. A SDN-enabled Integrated Space-Ground Information Network Simulation Platform. In Proceedings of the 18th International Conference on Optical Communications and Networks (ICOCN), Huangshan, China, 5–8 August 2019; pp. 1–3. [Google Scholar] [CrossRef]
  7. Adamu, A.; Shorgin, V.; Melnikov, S.; Gaidamaka, Y. Flexible Random Early Detection Algorithm for Queue Management in Routers. In Proceedings of the International Conference on Distributed Computer and Communication Networks, Moscow, Russia, 14–18 September 2020; Springer: Berlin, Germany, 2020; pp. 196–208. [Google Scholar]
  8. Bisoy, S.K.; Pattnaik, P.K. A neuron-based active queue management scheme for internet congestion control. Int. J. Reason.-Based Intell. Syst. 2020, 12, 238–247. [Google Scholar]
  9. Floyd, S.; Jacobson, V. Random Early Detection gateways for congestion avoidance. IEEE/ACM Trans. Netw. 1993, 1, 397–413. [Google Scholar] [CrossRef]
  10. Tan, L.; Zhang, W.; Peng, G.; Chen, G. Stability of TCP/RED systems in AQM routers. IEEE Trans. Autom. Control 2006, 51, 1393–1398. [Google Scholar] [CrossRef]
  11. Unal, H.; Melchor-Aguilar, D.; Ustebay, D.; Niculescu, S.I.; Ozbay, H. Comparison of PI controllers designed for the delay model of TCP/AQM. Comput. Commun. 2013, 36, 1225–1234. [Google Scholar] [CrossRef]
  12. Hassan, M.; Jain, R. High Performance TCP/IP Networking—Concepts, Issues and Solutions; Pearson Education Inc.: Boston, MA, USA, 2004. [Google Scholar]
  13. Domańska, J.; Domański, A.; Augustyn, D.; Klamka, J. A RED modified weighted moving average for soft real-time application. Int. J. Appl. Math. Comput. Sci. 2014, 24, 697–707. [Google Scholar] [CrossRef] [Green Version]
  14. Zheng, B.; Atiquzzaman, M. DSRED: An active queue management scheme for next generation networks. In Proceedings of the 25th Annual IEEE Conference on Local Computer Networks, Tampa, FL, USA, 8–10 November 2000. [Google Scholar]
  15. Athuraliya, S.; Low, S.; Li, V.; Yin, Q. REM: Active queue management. IEEE Netw. 2001, 15, 48–53. [Google Scholar] [CrossRef] [Green Version]
  16. Zhou, K.; Yeung, K.; Li, V. Nonlinear RED: A simple yet efficient Active Queue Management scheme. Comput. Netw. Int. J. Comput. Telecommun. Netw. 2006, 50, 3784–3794. [Google Scholar] [CrossRef]
  17. Floyd, S.; Gummadi, R.; Shenker, S. Adaptive RED: An Algorithm for Increasing the Robustness of RED’s Active Queue Management. 2001. Available online: www.icir.org/floyd/papers/adaptiveRed.pdf (accessed on 25 February 2022).
  18. Verma, R.; Iyer, A.; Karandikar, A. Towards an Adaptive RED Algorithm for Archiving Dale-Loss Performance. Available online: https://www.ee.iitb.ac.in/~karandi/assets/attachment/verma_iyer_karandikar_IEEproc03.pdf (accessed on 25 February 2022).
  19. Lin, D.; Morris, R. Dynamics of Random Early Detection. In Proceedings of the ACM SIGCOMM ’97 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. Association for Computing Machinery, Cannes, France, 14–18 September 1997; pp. 127–137. [Google Scholar] [CrossRef]
  20. Abdel-jaber, H.; Mahafzah, M.; Thabtah, F.; Woodward, M. Fuzzy logic controller of Random Early Detection based on average queue length and packet loss rate. In Proceedings of the 2008 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Edinburgh, UK, 16–18 June 2008; pp. 428–432. [Google Scholar]
  21. de Morais, W.; Santos, C.; Pedroso, C. Application of active queue management for real-time adaptive video streaming. Telecommun. Syst. 2021, 79, 260–270. [Google Scholar] [CrossRef]
  22. Stallings, W. High-Speed Networks: TCP/IP and ATM Design Principles; Prentice-Hall: New York, NY, USA, 1998. [Google Scholar]
  23. Domańska, J.; Augustyn, D.; Domański, A. The choice of optimal 3-rd order polynomial packet dropping function for NLRED in the presence of self-similar traffic. Bull. Pol. Acad. Sci. Tech. Sci. 2012, 60, 779–786. [Google Scholar] [CrossRef]
  24. Chydzinski, A. On the structure of data losses induced by an overflowed buffer. Appl. Math. Comput. 2022, 415, 126724. [Google Scholar] [CrossRef]
  25. Domański, A.; Domańska, J.; Czachórski, T. The Impact of the Degree of Self-Similarity on the NLREDwM Mechanism with Drop from Front Strategy. In Proceedings of the CN: International Conference on Computer Networks, Brunów, Poland, 14–17 June 2016; pp. 192–203. [Google Scholar] [CrossRef]
  26. Misra, V.; Gong, W.; Towsley, D. Fluid-based analysis of network of AQM routers supporting TCP flows with an application to RED. Comput. Commun. Rev. 2000, 30, 151–160. [Google Scholar] [CrossRef]
  27. Hollot, C.V.; Misra, V.; Towsley, D. Analysis and design of controllers for AQM routers supporting TCP flows. IEEE Trans. Autom. Control. 2002, 47, 945–959. [Google Scholar] [CrossRef] [Green Version]
  28. Hong, Y.; Yang, O.W.W. Adaptive AQM controllers for IP routers with a heuristic monitor on TCP flows. Int. J. Commun. Syst. 2006, 19, 17–38. [Google Scholar] [CrossRef]
  29. Sun, J.; Ko, K.-T.; Chen, G.; Chan, S.; Zukerman, M. PD-RED: To improve the performance of RED. IEEE Commun. Lett. 2003, 7, 406–408. [Google Scholar]
  30. Fan, Y.; Ren, F.; Lin, C. Design a PID controller for Active Queue Management. In Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), Kemer-Antalya, Turkey, 3 July 2003; Volume 2, pp. 985–990. [Google Scholar]
  31. Kahe, G.; Jahangir, A.H. A self-tuning controller for queuing delay regulation in TCP/AQM networks. Telecommun. Syst. 2019, 71, 215–229. [Google Scholar] [CrossRef]
  32. Bingi, K.; Ibrahim, R.; Karsiti, M.; Hassan, S. Frequency Response Based Curve Fitting Approximation of Fractional–Order PID Controllers. Int. J. Appl. Math. Comput. Sci. 2019, 29, 311–326. [Google Scholar] [CrossRef] [Green Version]
  33. Zhang, W.; Jing, Y. Active Queue Management Algorithm Based on RBF Neural Network Controller. In Proceedings of the 2020 Chinese Control And Decision Conference (CCDC), Hefei, China, 22–24 August 2020; pp. 2289–2293. [Google Scholar] [CrossRef]
  34. AlWahab, D.A.; Gombos, G.; Laki, S. On a Deep Q-Network-based Approach for Active Queue Management. In Proceedings of the 2021 Joint European Conference on Networks and Communications 6G Summit (EuCNC/6G Summit), Porto, Portugal, 8–11 June 2021; pp. 371–376. [Google Scholar] [CrossRef]
  35. Hotchi, R.; Chibana, H.; Iwai, T.; Kubo, R. Active Queue Management Supporting TCP Flows Using Disturbance Observer and Smith Predictor. IEEE Access. 2020, 8, 173401–173413. [Google Scholar] [CrossRef]
  36. Jung, S.; Kim, J.; Kim, J.H. Intelligent Active Queue Management for Stabilized QoS Guarantees in 5G Mobile Networks. IEEE Syst. J. 2021, 15, 4293–4302. [Google Scholar] [CrossRef]
  37. Kaur, G.; Saxena, V.; Gupta, J. Detection of TCP targeted high bandwidth attacks using self-similarity. J. King Saud Univ. Comput. Inf. Sci. 2020, 32, 35–49. [Google Scholar] [CrossRef]
  38. Deka, R.K.; Bhattacharyya, D.K. Self-similarity based DDoS attack detection using Hurst parameter. Secur. Commun. Netw. 2016, 9, 4468–4481. [Google Scholar] [CrossRef]
  39. Park, C.; Hernández-Campos, F.; Le, L.; Marron, J.S.; Park, J.; Pipiras, V.; Smith, F.D.; Smith, R.L.; Trovero, M.; Zhu, Z. Long-range dependence analysis of Internet traffic. J. Appl. Stat. 2011, 38, 1407–1433. [Google Scholar] [CrossRef] [Green Version]
  40. Pramanik, S.; Datta, R. Self-Similarity of Data Traffic in a Delay Tolerant Network. In 2017 Wireless Days; IEEE: Porto, Portugal, 2017. [Google Scholar]
  41. Xu, Y.; Li, Q.; Meng, S. Self-similarity Analysis and Application of Network Traffic. In Proceedings of the International Conference on Mobile Computing, Applications, and Services, Hangzhou, China, 14–15 June 2019; pp. 112–125. [Google Scholar] [CrossRef]
  42. Kim, Y.; Min, P. On the prediction of average queueing delay with self-similar traffic. In Proceedings of the IEEE Global Telecommunications Conference GLOBECOM ’03, San Francisco, CA, USA, 1–5 December 2003; Volume 5, pp. 2987–2991. [Google Scholar] [CrossRef]
  43. Gorrasi, A.; Restaino, R. Experimental comparison of some scheduling disciplines fed by self-similar traffic. In Proceedings of the IEEE International Conference on Communications (ICC ’03), Anchorage, AK, USA, 11–15 May 2003; Volume 1, pp. 163–167. [Google Scholar] [CrossRef]
  44. Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Szyguła, J.; Marek, D. The IoT gateway with active queue management. Int. J. Appl. Math. Comput. Sci. 2021, 31, 165–178. [Google Scholar] [CrossRef]
  45. Szyguła, J.; Domański, A.; Domańska, J.; Marek, D.; Filus, K.; Mendla, S. Supervised Learning of Neural Networks for Active Queue Management in the Internet. Sensors 2021, 21, 4979. [Google Scholar] [CrossRef]
  46. Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Marek, D.; Szyguła, J. The Influence of the Traffic Self-similarity on the Choice of the Non-integer Order PIα Controller Parameters. In Proceedings of the 32nd International Symposium, ISCIS 2018, Poznan, Poland, 20–21 September 2018; Volume 935, pp. 76–83. [Google Scholar] [CrossRef]
  47. Mandelbrot, B. How Long Is the Coast of Britain? Statistical Self-Similarity and Fractional Dimension. Science 1967, 156, 636–638. [Google Scholar] [CrossRef] [Green Version]
  48. Beran, J. Statistics for Long-Memory Processes, 1st ed.; Chapman Hall/Routledge: Boston, MA, USA, 1994; Volume 61. [Google Scholar] [CrossRef]
  49. Czachórski, T.; Domańska, J.; Pagano, M. On stochastic models of internet traffic. In Proceedings of the International Conference on Information Technologies and Mathematical Modelling, Anzhero-Sudzhensk, Russia, 18–22 November 2015; pp. 289–303. [Google Scholar]
  50. Cox, D. Long-range dependance: A review. In Statistics: An Appraisal; Iowa State University Press: Ames, IA, USA, 1984; pp. 55–74. [Google Scholar]
  51. Domańska, J.; Domański, A.; Czachórski, T. Estimating the Intensity of Long-Range Dependence in Real and Synthetic Traffic Traces. Commun. Comput. Inf. Sci. 2015, 522, 11–22. [Google Scholar]
  52. Li, Q.; Wang, S.; Liu, Y.; Long, H.; Jiang, J. Traffic self-similarity analysis and application of industrial internet. Wirel. Netw. 2020, 1–15. [Google Scholar] [CrossRef]
  53. Barsukov, I.S.; Bobreshov, A.M.; Riapolov, M.P. Fractal Analysis based Detection of DoS/LDoS Network Attacks. In Proceedings of the 2019 International Russian Automation Conference (RusAutoCon), Sochi, Russia, 8–14 September 2019; pp. 1–5. [Google Scholar]
  54. Floyd, S. Discussions of Setting Parameters. 1997. Available online: http://www.icir.org/floyd/REDparameters.txt (accessed on 20 December 2021).
  55. Xu, Y.D.; Wang, Z.Y.; Wang, H. ARED: A novel adaptive congestion controller. In Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 18–21 August 2005; Volume 2, pp. 708–714. [Google Scholar] [CrossRef]
  56. Podlubny, I. Fractional order systems and PIλDμ controllers. IEEE Trans. Autom. Control. 1999, 44, 208–214. [Google Scholar] [CrossRef]
  57. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J. Self-similarity Traffic and AQM Mechanism Based on Non-integer Order PIαDβ Controller. Commun. Comput. Inf. Sci. 2017, 718, 336–350. [Google Scholar] [CrossRef]
  58. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J. The use of a non-integer order PI controller with an Active Queue Management Mechanism. Int. J. Appl. Math. Comput. Sci. 2016, 26, 777–789. [Google Scholar] [CrossRef] [Green Version]
  59. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J.; Szyguła, J. The AQM Dropping Packet Probability Function Based on Non-integer Order PIαDβ Controller. In Non-Integer Order Calculus and Its Applications; Lecture Notes in Electrical Engineering; Springer International Publishing: Cham, Switzerland, 2019; Volume 496, pp. 36–48. [Google Scholar] [CrossRef]
  60. Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Marek, D.; Szyguła, J. GPU Accelerated Non-integer Order PIαDβ Controller Used as AQM Mechanism. In Computer Networks Information Science; Springer: Berlin, Germany, 2018; Volume 860, pp. 286–299. [Google Scholar] [CrossRef]
  61. Podlubny, I. Fractional Differential Equations; Academic Press: San Diego, CA, USA, 1999; Volume 198. [Google Scholar]
  62. Ciesielski, M.; Leszczynski, J. A Numerical Method for Solution of Ordinary Differential Equations of Fractional Order. In Proceedings of the Parallel Process. Appl. Mathematics; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2328, pp. 695–702. [Google Scholar] [CrossRef]
  63. Sun, J.; Zukerman, M. An Adaptive Neuron AQM for a Stable Internet. In Proceedings of the NETWORKING. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, 14–18 May 2007; Springer: Berlin, Germany, 2007; Volume 4479, pp. 844–854. [Google Scholar] [CrossRef] [Green Version]
  64. Ping, Y.; Wang, N. A PID controller with neuron tuning parameters for multi-model plants. In Proceedings of the 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826), Shanghai, China, 26–29 August 2004; Volume 6, pp. 3408–3411. [Google Scholar] [CrossRef]
  65. Ning, W.; Shuqing, W. Neuro-intelligent coordination control for a unit power plant. In Proceedings of the IEEE International Conference on Intelligent Processing Systems (Cat. No.97TH8335), Beijing, China, 28–31 October 1997; Volume 1, pp. 750–753. [Google Scholar] [CrossRef]
  66. Szyguła, J.; Domański, A.; Domańska, J.; Czachórski, T.; Marek, D.; Klamka, J. AQM Mechanism with Neuron Tuning Parameters. In Intelligent Information and Database Systems; Springer International Publishing: Cham, Switzerland, 2020; pp. 299–311. [Google Scholar] [CrossRef]
  67. Domańska, J.; Domański, A.; Czachórski, T.; Klamka, J. Fluid flow approximation of time-limited TCP/UDP/XCP streams. Bull. Pol. Acad. Sci. Tech. Sci. 2014, 62, 217–225. [Google Scholar] [CrossRef] [Green Version]
  68. Hollot, C.; Misra, V.; Towsley, D. A control theoretic analysis of RED. In Proceedings of the IEEE/INFOCOM 2001, Anchorage, AK, USA, 22–26 April 2001; pp. 1510–1519. [Google Scholar]
  69. Domańska, J.; Domański, A.; Czachórski, T. Comparison of AQM Control Systems with the Use of Fluid Flow Approximation. Commun. Comput. Inf. Sci. 2012, 291, 82–90. [Google Scholar] [CrossRef]
  70. Domański, A.; Domańska, J.; Czachórski, T.; Klamka, J.; Szyguła, J.; Marek, D. Diffusion Approximation Model of TCP NewReno Congestion Control Mechanism. Springer Nat. Comput. Sci. 2020, 1, 43. [Google Scholar] [CrossRef] [Green Version]
  71. SimPy Documentation. Available online: https://simpy.readthedocs.io/en/latest/ (accessed on 23 December 2021).
  72. Tinini, R.I.; dos Santos, M.R.P.; Figueiredo, G.B.; Batista, D.M. 5GPy: A SimPy-based simulator for performance evaluations in 5G hybrid Cloud-Fog RAN architectures. Simul. Model. Pract. Theory 2020, 101, 102030. [Google Scholar] [CrossRef]
  73. Karanjkar, N.; Tejasvi, P.C.; Amrutur, B. A simpy-based simulation testbed for smart-city IoT applications. In Proceedings of the International Conference on Internet of Things Design and Implementation, Montreal, QC, Canada, 15–18 April 2019; pp. 273–274. [Google Scholar]
Figure 1. Hurst calculation algorithm.
Figure 1. Hurst calculation algorithm.
Entropy 24 00418 g001
Figure 2. TCP/UDP streams in the adopted Fluid Flow approximation.
Figure 2. TCP/UDP streams in the adopted Fluid Flow approximation.
Entropy 24 00418 g002
Figure 3. Router average queue length values, Fluid Flow approximation, ARED Hurst-insensitive 1 TCP stream (left, top), ARED Hurst-sensitive 1 TCP stream (right, top) and ANRED Hurst-insensitive 1 TCP stream (left, bottom), ANRED with Hurst-sensitive 1 TCP stream (right, bottom).
Figure 3. Router average queue length values, Fluid Flow approximation, ARED Hurst-insensitive 1 TCP stream (left, top), ARED Hurst-sensitive 1 TCP stream (right, top) and ANRED Hurst-insensitive 1 TCP stream (left, bottom), ANRED with Hurst-sensitive 1 TCP stream (right, bottom).
Entropy 24 00418 g003
Figure 4. Router average queue length values, Fluid Flow approximation, A N P I α Hurst-insensitive 1 TCP stream (left, top), A N P I α Hurst-sensitive 1 TCP stream (right, top) and A N P I α D β Hurst-insensitive 1 TCP stream (left, bottom), A N P I α D β Hurst-sensitive 1 TCP stream (right, bottom).
Figure 4. Router average queue length values, Fluid Flow approximation, A N P I α Hurst-insensitive 1 TCP stream (left, top), A N P I α Hurst-sensitive 1 TCP stream (right, top) and A N P I α D β Hurst-insensitive 1 TCP stream (left, bottom), A N P I α D β Hurst-sensitive 1 TCP stream (right, bottom).
Entropy 24 00418 g004
Figure 5. Network node topology in the adopted simulation method.
Figure 5. Network node topology in the adopted simulation method.
Entropy 24 00418 g005
Figure 6. Router queue length values, μ = 0.25, ARED Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H = 0.9 (right, top) and ARED Hurst-sensitive algorithm, α = 0.5 , H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Figure 6. Router queue length values, μ = 0.25, ARED Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H = 0.9 (right, top) and ARED Hurst-sensitive algorithm, α = 0.5 , H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Entropy 24 00418 g006
Figure 7. Router queue length values, μ = 0.25, ANRED Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H = 0.9 (right, top) and ANRED Hurst-sensitive algorithm, α = 0.5 , μ = 0.25, H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Figure 7. Router queue length values, μ = 0.25, ANRED Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H = 0.9 (right, top) and ANRED Hurst-sensitive algorithm, α = 0.5 , μ = 0.25, H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Entropy 24 00418 g007
Figure 8. Queue lengths, μ = 0.25, P I α Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H = 0.9 (right, top) and P I α Hurst-sensitive algorithm, α = 0.5 , H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Figure 8. Queue lengths, μ = 0.25, P I α Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H = 0.9 (right, top) and P I α Hurst-sensitive algorithm, α = 0.5 , H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Entropy 24 00418 g008
Figure 9. Parameters evolution, μ = 0.25, P I α Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H=0.9 (right, top) and P I α Hurst-sensitive algorithm, α = 0.5 , H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Figure 9. Parameters evolution, μ = 0.25, P I α Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H=0.9 (right, top) and P I α Hurst-sensitive algorithm, α = 0.5 , H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Entropy 24 00418 g009
Figure 10. Queue length values, μ = 0.25, P I α D β Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H = 0.9 (right, top) and P I α D β Hurst-sensitive algorithm, α = 0.5 , H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Figure 10. Queue length values, μ = 0.25, P I α D β Hurst-insensitive algorithm, α = 0.5 , H = 0.5 (left, top), H = 0.9 (right, top) and P I α D β Hurst-sensitive algorithm, α = 0.5 , H = 0.5 (left, bottom), H = 0.9 (right, bottom).
Entropy 24 00418 g010
Table 1. Assumed and estimated Hurst parameter. Length of the sample 2 18 .
Table 1. Assumed and estimated Hurst parameter. Length of the sample 2 18 .
HMethod 1Method 2
0.50.49750.4975
0.60.59180.5918
0.70.71240.7124
0.80.80980.8098
0.90.91080.9108
Table 2. Time of calculating Hurst estimation.
Table 2. Time of calculating Hurst estimation.
nMethod 1Method 2 (ver. 1)Method 2 (ver. 2)
2 10 0.0009920.0009950.000009
2 12 0.0039680.0044540.000010
2 14 0.0153760.0188480.000011
2 16 0.0624620.0763830.000013
2 18 0.2623800.3114510.000014
Table 3. ARED Hurst-insensitive queue, μ = 0.25 .
Table 3. ARED Hurst-insensitive queue, μ = 0.25 .
HurstMeanLostNo. of Dropped PacketsDelay
Queue Length AQMQueueAverageMin–Max
0.522.930.49%19,2612660.0922.04 · 10 2 –0.18
0.623.050.49%19,2703410.0933.12 · 10 3 –0.19
0.723.550.54%22,9506050.0893.14 · 10 4 –0.18
0.823.310.57%25,9439190.0861.80 · 10 4 –0.20
0.922.560.65%34,0407170.0811.46 · 10 6 –0.18
Table 4. Hurst-sensitive ARED queue, μ = 0.25 .
Table 4. Hurst-sensitive ARED queue, μ = 0.25 .
HurstMeanLostNo. of Dropped PacketsDelay
Queue Length AQMQueueAverageMin–Max
0.522.300.49%19,3912900.0916.94 · 10 3 –0.18
0.620.990.50%19,3063590.0825.49 · 10 3 –0.18
0.719.920.54%23,2753640.0733.24 · 10 4 –0.18
0.819.170.58%26,8732680.0722.21 · 10 5 – 0.21
0.919.510.65%34,873470.0682.52 · 10 6 –0.16
Table 5. ANRED Hurst-insensitive, μ = 0.25 .
Table 5. ANRED Hurst-insensitive, μ = 0.25 .
HurstMeanLostNo. of Dropped PacketsDelay
Queue Length AQMQueueAverageMin–Max
0.518.240.50%19,4982970.0737.47 · 10 3 –0.16
0.618.140.50%19,1795900.0739.25 · 10 3 –0.18
0.718.550.55%22,8659440.0701.33 · 10 4 –0.18
0.818.640.58%25,59114090.0688.04 · 10 5 –0.16
0.919.190.65%33,78612720.0672.05 · 10 5 –0.18
Table 6. ANRED Hurst-sensitive, μ = 0.25 .
Table 6. ANRED Hurst-sensitive, μ = 0.25 .
HurstMeanLostNo. of Dropped PacketsDelay
Queue Length AQMQueueAverageMin–Max
0.518.370.50%19,2904760.0735.39 · 10 2 –0.17
0.618.060.49%18,7905860.0731.27 · 10 2 –0.18
0.718.450.55%22,9649160.0702.08 · 10 4 –0.18
0.818.090.58%26,12412470.0691.46 · 10 5 –0.19
0.918.490.65%34,1959340.0696.22 · 10 5 –0.19
Table 7. P I α Hurst-insensitive algorithm, μ = 0.25 .
Table 7. P I α Hurst-insensitive algorithm, μ = 0.25 .
HurstMeanLostNo. of Dropped PacketsDelay
Queue Length AQMQueueAverageMin–Max
0.514.400.49%189426550.0483.77 · 10 3 –0.12
0.614.450.49%186557050.0484.38 · 10 4 –0.11
0.714.570.54%2262810510.0479.87 · 10 6 –0.12
0.814.550.58%2586711470.0441.33 · 10 5 –0.10
0.914.410.66%3421510270.0441.62 · 10 6 –0.13
Table 8. P I α Hurst-sensitive algorithm, μ = 0.25 .
Table 8. P I α Hurst-sensitive algorithm, μ = 0.25 .
HurstMeanLostNo. of Dropped PacketsDelay
Queue Length AQMQueueAverageMin–Max
0.510.260.50%19622890.0391.68 · 10 4 –0.10
0.610.270.49%19417810.0391.26 · 10 4 –0.10
0.710.240.54%23562520.0384.94 · 10 5 –0.10
0.810.310.59%272453160.0371.10 · 10 5 –0.10
0.910.270.66%351451890.0374.76 · 10 6 –0.10
Table 9. P I α D β Hurst-insensitive algorithm, μ = 0.25 .
Table 9. P I α D β Hurst-insensitive algorithm, μ = 0.25 .
HurstMeanLostNo. of Dropped PacketsDelay
Queue Length AQMQueueAverageMin–Max
0.514.480.50%19,1637720.0495.29 · 10 3 –0.13
0.614.520.50%18,9357550.0491.30 · 10 4 –0.11
0.714.590.54%22,59010410.0484.76 · 10 5 –0.15
0.814.570.58%25,87011960.0451.11 · 10 5 –0.11
0.914.320.65%34,0008670.0432.51 · 10 5 –0.13
Table 10. P I α D β Hurst-sensitive algorithm, μ = 0.25 .
Table 10. P I α D β Hurst-sensitive algorithm, μ = 0.25 .
HurstMeanLostNo. of Dropped PacketsDelay
Queue Length AQMQueueAverageMin–Max
0.510.280.50%19,806620.0401.19 · 10 5 –0.12
0.610.270.51%20,096550.0391.97 · 10 4 –0.10
0.710.250.54%23,688700.0382.23 · 10 4 –0.10
0.810.330.59%27,2123550.0372.04 · 10 5 –0.10
0.910.230.65%35,0781250.0376.33 · 10 6 –0.12
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Marek, D.; Szyguła, J.; Domański, A.; Domańska, J.; Filus, K.; Szczygieł, M. Adaptive Hurst-Sensitive Active Queue Management. Entropy 2022, 24, 418. https://doi.org/10.3390/e24030418

AMA Style

Marek D, Szyguła J, Domański A, Domańska J, Filus K, Szczygieł M. Adaptive Hurst-Sensitive Active Queue Management. Entropy. 2022; 24(3):418. https://doi.org/10.3390/e24030418

Chicago/Turabian Style

Marek, Dariusz, Jakub Szyguła, Adam Domański, Joanna Domańska, Katarzyna Filus, and Marta Szczygieł. 2022. "Adaptive Hurst-Sensitive Active Queue Management" Entropy 24, no. 3: 418. https://doi.org/10.3390/e24030418

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop