Next Article in Journal
Hand Grasp Pose Prediction Based on Motion Prior Field
Next Article in Special Issue
Cushioning Performance of the Biomimetic Cobweb Cushioning Silicone Pad
Previous Article in Journal
Robot Programming from Fish Demonstrations
Previous Article in Special Issue
Chair Size Design Based on User Height
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

WOA-Based Robust Congestion Control Scheme with Two Kinds of Propagation Latencies and External Disturbance in Software-Defined Wireless Networks

1
State Key Laboratory of Precision Blasting, Jianghan University, Wuhan 430056, China
2
School of Artificial Intelligence, Jianghan University, Wuhan 430056, China
3
Artificial Intelligence Institute, Jianghan University, Wuhan 430056, China
4
Wuhan Chaoxing Digital Library Education Technology Co., Ltd., Wuhan 430050, China
*
Author to whom correspondence should be addressed.
Biomimetics 2023, 8(2), 249; https://doi.org/10.3390/biomimetics8020249
Submission received: 5 April 2023 / Revised: 3 June 2023 / Accepted: 4 June 2023 / Published: 10 June 2023
(This article belongs to the Special Issue Learning from Nature: Bionics in Design Practice)

Abstract

:
This paper proposes a novel WOA-based robust control scheme with two kinds of propagation latencies and external disturbance implemented in Software-Defined Wireless Networks (SDWNs) to maximize overall throughput and enhance the stability of the global network. Firstly, an adjustment model developed using the Additive-Increase Multiplicative-Decrease (AIMD) adjustment scheme with propagation latency in device-to-device paths and a closed-loop congestion control model with propagation latency in device–controller pairs are proposed, and the effect of channel competition from neighboring forwarding devices is analyzed. Subsequently, a robust congestion control model with two kinds of propagation latencies and external disturbance is established. Then, a new WOA-based scheduling strategy that considers each individual whale as a specific scheduling plan to allocate appropriate sending rates at the source side is presented to maximize the global network throughput. Afterward, the sufficient conditions are derived using Lyapunov–Krasovskii functionals and formulated using Linear Matrix Inequalities (LMIs). Finally, a numerical simulation is conducted to verify the effectiveness of this proposed scheme.

1. Introduction

With the rapid development of large-scale network deployments, traditional wireless networks, such as Wi-Fi or cellular networks, have adopted a distributed architecture, where network intelligence is embedded in each access point or base station. This makes it difficult to manage and configure a network as a whole, especially in large-scale deployments. Software-Defined Networking (SDN) is an architectural approach that separates the control plane and data plane in network devices, thereby enabling centralized control and management of the network through a programmable software controller [1,2,3,4,5]. Software-Defined Wireless Networking (SDWN) is a concept that extends the principles of SDNs to wireless communication networks, which apply these principles to wireless networks, enabling greater flexibility, scalability, and control over wireless infrastructure.
In SDWNs, similar to SDN, the control plane is separated from the data plane [1,2,3,4,5,6,7,8]. The control plane consists of a centralized software controller that manages and orchestrates the network resources, makes decisions about network policies and configurations, and dynamically controls the behavior of the wireless network infrastructure. The data plane comprises the wireless access points or base stations that handle the transmission and reception of data. The control plane of each forwarding device can only operate correctly when connected to SDWN-centralized controllers [1,2,3,4,5,6,7,8,9].
With the continuous expansion of the scale of networks and user populations, an excessive number of network services may cause network congestion in SDWNs [10,11], which has provoked research into effectively controlling network congestion and stabilizing networks [12,13]. Congestion control is a crucial technology used in wireless networks to manage and prevent network congestion, employing congestion control mechanisms to regulate the sending rate when there is a high demand for wireless network resources that exceeds the available capacity. Congestion control technologies play a vital role in maintaining the stability, efficiency, and performance of wireless networks, thus ensuring that wireless network resources are utilized optimally. Stability congestion control, which is intended to maximize the throughput and enhance the stability of global networks, has drawn widespread attention and research interest [14,15]. Propagation latency and external disturbance are often considered to constitute two critical factors that affect global network stability. Propagation latency may lead to additional network costs and unreliability [16], while the variability of external disturbance based on the relevant wireless characteristics leads to abrupt structural variations [17]. Even if a wireless network is stable via stability congestion control, the global network may become unstable again because of these two factors and may not be able to maintain long-term stability.
Therefore, it is essential to restabilize SDWNs’ network parameters with optimal values to maintain long-term stability. Robust control, which maintains a global network under long-term control with propagation latency and external disturbance, is likely a solution with which to tackle this re-stabilization problem. Thus, robust congestion control is defined as a robust control scheme acting on network congestion in order to enable higher network efficiency and lower network congestion.
Some existing solutions favor the adoption of traditional network control methods to analyze the congestion control problem in SDWNs. A traditional network control system is modeled using stochastic network-induced latency [18], in which the analytical study of network stability has been implemented to solve network-induced latency and design feedback control algorithms. In the SDWN architecture, a global network controller is responsible for the rate management of each OpenFlow device [1,2,19,20,21,22,23]. In the separation of the control and data planes, control plane unification is implemented for different kinds of networks, including wired Internet Protocol (IP) networks [5,6,8,20,23], Wavelength-Division Multiplexings (WDMs) [24], and wireless networks [25,26,27]. In recently published works, the AIMD adjustment scheme has been further optimized using Lyapunov–Krasovskii functionals for network congestion control in SDWNs [28,29]. In terms of the congestion control framework, the Additive-Increase Multiplicative-Decrease (AIMD) adjustment scheme is used to tackle network congestion control problems through the execution of proper source adjustments in SDWNs [30,31,32]. In terms of robust control algorithms, various forwarding information control algorithms have been proposed through analyses of SDWN-centralized controllers with respect to improving network robustness and reacting to failures [2,23,33,34,35]. In [36,37,38], robust congestion control schemes have been proposed in order to achieve maximal network throughput in device-to-device paths by using Lyapunov–Krasovskii functionals. In terms of meta-heuristic optimization algorithms, several meta-heuristic optimization algorithms, such as the Social Spider Optimization (SSO) algorithm [39], Bat Algorithm [40], and Particle Swarm Optimization (PSO) algorithm [41], have been utilized in wireless networks to greatly reduce the number of network data required to solve the network congestion problem [42]. In this paper, we use the Whale Optimization Algorithm (WOA) to more effectively achieve optimization objectives using a new global scheduling strategy for solving the network congestion problem. The WOA algorithm, which simulates the foraging behavior of humpback whales, was first proposed in [43]. It is often used to find the optimal solution for global optimization problems in various fields, among which those covered in reviews include engineering, clustering, classification, robot paths, image processing, networks, task scheduling, and other engineering applications [44,45,46,47,48].
However, these solutions are limited by the following aspects.
(i)
The control laws are separated from the centralized controllers but integrated into the forwarding devices in the form of flow tables;
(ii)
An SDWN architecture with two kinds of propagation latency is seldom considered for robust congestion control;
(iii)
The traditional theories are not compatible with the robust congestion control theory pertaining to SDWNs.
The major contributions of this paper are summarized as follows:
(i) First, we provide a novel sending rate adjustment model with propagation latency in device-to-device paths as the fundamental model in the forwarding layer. Then, we establish a closed-loop congestion control model with propagation latency in device–controller pairs as a supplementary model. The propagation latency strengthens the veracity of the stability analysis, and its influence is considered in both device-to-device paths and device–controller pairs from a global perspective. Moreover, we consider channel competition near the forwarding devices in order to more effectively design the congestion control model based on the broadcasting nature of the wireless medium.
(ii) We design a new, weighted, fair scheduling strategy to pre-set the control objective of the stability congestion control scheme in order to solve the global robust congestion problems faced by SDWNs, which is utilized to calculate the optimized values of network parameters. Moreover, external disturbance is also considered for robust congestion control. To eliminate external disturbance from the global network system, the stability congestion control model had to be converted into a robust congestion control model; consequently, the optimized status was maintained via the transformation of two closed-loop congestion control models into a normal robust H control model.
(iii) An interdisciplinary effort is made to construct a robust congestion control scheme by combining stability analysis theory and congestion control principles in SDWNs. Exploiting the applicability of Lyapunov–Krasovskii functionals in stability analysis, this paper constructs novel optimized Lyapunov–Krasovskii functionals acting on the robust H control model to achieve the desired global robust control system for solving network congestion.
(iv) We design experiments on both the variations of error states and the energy trajectories for a robust H control scheme implemented in the SDWN, including the AIMD adjustment scheme and the information-forwarding and control algorithm acting as benchmark algorithms. To evaluate the control performance, ablation experiments were conducted, which demonstrated the superiority of our proposed robust control scheme over the AIMD adjustment scheme and the information-forwarding and control algorithm with respect to maximizing the global SDWN throughput to maintain long-term stability with two kinds of propagation latencies and external disturbance.
In SDWNs, the forwarding devices first record their congestion state information and explicitly advertise it to the centralized controllers. The centralized controllers provide some control policies and send control instructions to the forwarding devices. Next, the forwarding devices follow these control instructions and make proper adjustments to the sending rates at the source-side. Previous works, such as [36,37,38], studied the robust congestion control scheme with propagation latency in device–controller pairs, while this paper defines the propagation latency in both device–controller pairs and device-to-device paths as an upper bound of latency. Thus, two closed-loop congestion control models are established for the further research of the robust congestion control scheme. In our study, the AIMD adjustment scheme is still initially adopted to analyze network congestion with propagation latency in device–controller pairs, and two basic congestion control models are established. Next, a novel WOA-based scheduling strategy that considers each individual whale as a specific scheduling plan to allocate appropriate sending rates at the source side is proposed in the SDWN-centralized controllers to make proper adjustments in each forwarding device. Then, a novel robust congestion control model is proposed through the use of Lyapunov–Krasovskii functionals [49,50], and a theorem is proposed to determine the sufficient conditions for the robust control. These sufficient conditions are expressed as Linear Matrix Inequalities (LMIs). Finally, numerical instances are provided to demonstrate the effectiveness of our proposed scheme, which is able to more realistically analyze robust congestion control schemes under the influence of propagation latencies and external disturbance, over traditional schemes and those from previous works.
The following are also discussed in the remaining sections of this paper. Section 2 presents a brief overview of related works. In Section 3, an analytical network model, which was developed by implementing an AIMD adjustment scheme, is established to adjust the sending rate at the source side, and a WOA-based scheduling strategy that considers each individual whale as a specific scheduling plan to allocate appropriate sending rates at the source side is presented to address the error states of the sending rate. Section 4 proposes a robust congestion control problem formulation, and some preliminaries are introduced. Section 5 addresses network congestion control by using Lyapunov–Krasovskii functionals and calculates sufficient conditions. Section 6 reports the results of a numerical network simulation to demonstrate the effectiveness of our proposed robust congestion control scheme, and comparisons with other congestion control approaches applied in SDWNs are also provided. Section 7 presents the conclusions and directions for future work.

2. Related Works and Problem Motivation

2.1. Related Works

SDN is a network paradigm separating the control and data planes of a network. The OpenFlow protocol was first introduced at Stanford University in 2008 [1]. Since then, SDN controllers and the OpenFlow protocol have been advanced to improve network performance [2,3,4,5,6]. SDWN has applications in various domains, including enterprise networks, campus environments, public Wi-Fi facilitation, Internet of Things (IoT) networks, and 5G cellular networks. By leveraging the principles of SDN, SDWN offers a more flexible, manageable, and scalable approach to wireless network management, thereby paving the way for innovation and improved performance in wireless communications [5,6,7,8,9].
To solve the network congestion problem experienced by SDWNs, the traditional robust control methods rely on either an AIMD adjustment scheme or an information-forwarding and control algorithm.

2.1.1. AIMD Adjustment Scheme

As a traditional form of network control, the AIMD adjustment scheme is often employed at the source side. It has been researched for decades, and many reliable robust control solutions have been proposed for SDWNs. By utilizing improved AIMD adjustment schemes and queue congestion management, the author of [30] proposed an SDN-based Explicit-Deadline-Aware Transmission Control Protocol (TCP) mechanism for cloud data center networks. In [31], the authors adopted the AIMD adjustment scheme and introduced an Additive-Decrease Multiplicative-Increase (ADMI) approach to preserve bandwidth. The author of [30] proposed a load balancer application using an AIMD adjustment scheme based on various features of SDN and OpenFlow. In recently published works, Lyapunov–Krasovskii functionals were utilized, along with the AIMD adjustment scheme, for network congestion control in SDNs. In [28], the authors modeled a multi-objective minimization allocation scheme of energy and delay using traditional Lyapunov–Krasovskii functionals. The authors of [29] proposed a queueing model and solved a problem regarding long-term network utility maximization using traditional Lyapunov–Krasovskii functionals. However, the key limitation of these approaches is that congestion control was implemented at the source side, which does not allow for the achievement of network robustness with a global view of SDWN.

2.1.2. Information-Forwarding and Control Algorithm

The SDWN architecture provides logically centralized controllers for receiving updates and implementing control policies. Most of the current reliable robust control solutions are information-forwarding and control algorithms. In [2], Vissicchio and Cittadini introduced an operational sequences computation algorithm to compute operational sequences that preserves the correctness of forwarding and policies to ensure the robustness of SDN updates. During the update, this algorithm robustly implements unpredictable factors, such as delayed message delivery and processing. In [23], the authors proposed a distributed OpenFlow-based routing protocol to improve network robustness, reaction to failures, and controller scalability. This protocol can provide robustness for topological failures and rapidly reduce the path stretch. The authors of [31] presented a congestion-aware and robust, reliable multicast method for small groups in data centers that can dynamically bypass congested and failing links and then achieve high efficiency and robustness. In [34], the author analyzed the requirements of a secure, robust, and resilient controller for providing security improvements. The authors of [35] proposed a fault-prone, concurrent control scheme for robust policy implementation in distributed SDNs. The authors of [36,37,38] proposed robust congestion control schemes for achieving maximal network throughput by considering the propagation latency in device-to-device paths.
However, propagation latency, especially in device–controller pairs, must be further considered and discussed as a key factor for robust congestion control in SDWNs. Simultaneously, external disturbance needs to be analyzed as the other key factor. Moreover, previous approaches to addressing network congestion implemented the robust control of partial networks instead of considering a global view of SDWN.
Despite the abundant literature on SDWNs, both approaches are limited in terms of implementing global robust congestion control in the presence of propagation latency and external disturbance.

2.2. Motivation

Due to an SDWN’s characteristics, its wireless environment is susceptible to network congestion due to its limited available spectrum and bandwidth, shared medium, and varying channel conditions. SDWNs have finite bandwidth, in which network congestion can significantly impact data rates and throughput. By effectively controlling network congestion in SDWNs, bandwidth utilization can be optimized by allocating the network resources reasonably in order to facilitate the fair sharing of available bandwidth between all the devices. Moreover, the network congestion in SDWNs may lead to wasteful retransmissions and inefficient utilization of all network resources. By mitigating congestion in SDWNs, our method can reduce unnecessary retransmissions and improve overall resource efficiency, thereby enhancing network sustainability.
Therefore, this paper focuses on solving the re-stabilization problem pertaining to a typical SDWN architecture with two kinds of propagation latency and external disturbance via the robust congestion control scheme, aiming to maximize global network throughput and re-stabilize network parameters at their optimal values. This can better address the network congestion problem in SDWNs, which is essential to ensure the network’s optimal performance and reliability. By leveraging an SDWN’s centralized control and dynamic management capabilities, network congestion can be proactively managed, and network resources can be reasonably allocated to enhance the efficiency and effectiveness of SDWN operations.
(i) To maximize the global SDWN throughput, this paper presents a novel WOA-based scheduling strategy that considers each individual whale as a specific scheduling plan in order to pre-set the network parameters at optimal values. The sending rate at the source side, constituting a key network parameter, is the target of the robust congestion control scheme for network congestion control.
(ii) To re-stabilize the network parameters at their optimal values, the differences between the current and optimized states are first assigned to the error states. Next, the robust congestion control problem with propagation latency and external disturbance is viewed as a robust control problem. Finally, the robust control problem based on the error states is addressed by referencing Lyapunov–Krasovskii functionals.

3. Model and Analysis

A typical SDWN architecture with two kinds of propagation latency is presented in Figure 1. Two kinds of propagation latency exist in SDWN: (1) propagation latency in the device-to-device path, and (2) propagation latency in device–controller pairs, which divides the entirety of SDWN into two closed-loop networks for analyzing network congestion. SDWN-centralized controllers consist of a series of controllers with distributed designs for enhancing network reliability, scalability, and resiliency [35]. The OpenFlow-based forwarding devices at the source side advertise their state information to the centralized controllers via a wireless channel and properly adjust their sending rates via the AIMD adjustment scheme after receiving the control instructions from the centralized controllers. These control instructions are provided to process individual network services by means of the WOA-based scheduling strategy. In order to maintain the network parameters’ long-term stability in the SDWN, this paper focuses on maximizing the global SDWN throughput and stabilizing global network parameters at their optimal values under the robust congestion control scheme with two kinds of propagation latency and external disturbance. Thus, a new WOA-based scheduling strategy that considers each individual whale as a specific scheduling plan to allocate appropriate sending rates at the source side is adopted to optimize global network performance by properly arranging the network parameters. There is an optimized stable state constituting a key network parameter in each forwarding device for the robust congestion control scheme.
The analysis of these two closed-loop congestion control systems is classified into four parts in the subsections below.

3.1. A Sending Rate Adjustment Model with Propagation Latency in Device-to-Device Paths

First, in order to analyze the sending rate adjustment at the source side, the following assumptions and definitions are proposed.
Assumption 1.
There exist infinite flows at the source side that await transmission.
Definition 1.
There exists an ideal queue length x l * that has been verified as being capable of achieving the best performance with respect to the sending rate arrangement after multiple experiments.
Assumption 2.
Define two queue lengths in any forwarding device, where one is the current queue length x l and the other is the ideal queue length x l * . At the source side, the variation in the sending rate is represented as the difference of the queue length x ¯ l , x ¯ l = x l x l * . If the difference value x ¯ l > 0 , the sending rate additively increases; otherwise, when x ¯ l < 0 , the sending rate multiplicatively decreases. The magnitude of the difference value positively correlates with the level of rate variation at the source side. An AIMD adjustment scheme is implemented in every forwarding device based on the difference value x ¯ l .
Assumption 3.
The neighboring forwarding devices record their congestion state information and periodically send them to the SDWN-centralized controllers. Then, the centralized controllers optimize some control laws via the congestion state information and send them to the source-forwarding device according to the control instructions. We assume the existence of a local Congestion State (CS) value that is incorporated into the control instruction. This feedback control instruction shows the CS reflected in the current condition of the neighboring links in the whole round-trip. The CS is either non-positive ( x ¯ l > 0 , i.e., no congestion occurred) or positive ( x ¯ l < 0 , i.e., congestion occurred).
Figure 2 presents an example of the data transmission process with propagation latency in device-to-device paths in the SDWN, which can be modeled as a closed-loop congestion control system. By incorporating the CS feedback from the centralized controllers and using the AIMD adjustment scheme to tackle the congestion control problems, the AIMD parameters are analyzed, and the basic network congestion model is established as a linear continuous closed-loop congestion control system.
In the SDWN, the neighboring forwarding devices shift their congestion state information to the centralized controllers, in which the global network traffic state messages are concentrated. After an essential analysis, the centralized controllers optimize their control laws and make proper adjustments to every sending rate at the source side. If network congestion has occurred in the neighboring forwarding devices, said devices feed control instructions (CS > 0) back to the source forwarding devices within fixed time intervals to communicate the adjustments of the sending rates; when a state of non-congestion occurs in the neighboring forwarding devices, they feed control instructions (CS < 0) back.
At the source side, suppose that the CS occurs at the moment t , t 0 , for which the time-varying sending rate is denoted as r ( t i ) . τ r ( t ) and τ f ( t ) denote process latency and forward channel propagation latency, respectively. Using the AIMD adjustment scheme, this section considers the fixed constant weight A f as indicating an additive-increase and D f as indicating a multiplicative-decrease, respectively. At the source side, if the CS is non-positive, the sending rate increases by weight A r ; otherwise, CS is positive, and the sending rate decreases by weight D r . Thus, the behavioral equation can be expressed as follows:
r ( t i ) = r ( t i 1 ) { A r [ 1 η ( x l ( t τ r ( t ) ) x l * ) ] D r r ( t ) [ η ( x l ( t τ r ( t ) ) x l * ) ] } ,
Then, we obtain
r ( t i ) r ( t i 1 ) t i t i 1 = 1 t i t i 1 { A r [ 1 η ( x l ( t τ r ( t ) ) x l * ) ] D r r ( t ) [ η ( x l ( t τ r ( t ) ) x l * ) ] } = B r r ( t i τ ( t ) ) { A r [ 1 η ( x l ( t τ r ( t ) ) x l * ) ] D r r ( t ) [ η ( x l ( t τ r ( t ) ) x l * ) ] } ,
where B r is defined as a fixed constant weight, B r r ( t i τ ( t ) ) = 1 t i t i 1 . η is the sensitivity degree of the adjustment, η ( x l x l * ) denotes the probability parameter, x l ( t ) represents instantaneous queue length, and t is the current moment.
Let a = A r B r , b = D r B r , and suppose r = c , x l = x l * in an equilibrium state; thus, the following is yielded:
{ r ˙ ( t ) = ( a c η b c 2 η ) ( x l ( t τ r ( t ) ) ) b c ( a a + b c r ( t ) ) , x ˙ l ( t ) = r ( t τ f ( t ) ) .
Eliminating x l ( t )  from (1) yields the second-order differential equation
r ¨ ( t ) + κ r ˙ ( t ) + ϑ r ( t τ 1 ( t ) ) = 0 ,
where κ = a b c a + b c , ϑ = c η ( a + b c )  are the parameters of this second-order system, and  τ 1 ( t ) = τ r ( t ) + τ f ( t )  denotes the round-trip of propagation latency from the source forwarding device to the destination. Note that the second-order dynamic Equation (2) can be rewritten in a matrix form, as follows.
r ˙ ( t ) = ( 0 1 0 κ ) r ( t ) + ( 0 0 ϑ 0 ) r ( t τ 1 ( t ) ) .
Note that A ^ = ( 0 1 0 κ ) ,   A d = ( 0 0 ϑ 0 ) are the weights of the network parameters. Thus, Equation (3) can be converted into
r ˙ ( t ) = A ^ r ( t ) + A d r ( t τ 1 ( t ) ) .
In this section, Equation (4), as the state variable equation, represents a closed-loop congestion control system, which utilizes an AIMD adjustment scheme at the source side after receiving state feedback. Obviously, the congestion control system shown in Figure 2 can be modeled using Equation (4). Solving Equation (4) yields the solution to the congestion control problem.

3.2. A Closed-Loop Congestion Control Model with Propagation Latency in Device–Controller Pairs

As shown in Figure 3, the propagation latency from a forwarding device to the centralized controllers (DC) and that from the centralized controllers to a forwarding device (CD) are defined as τ d c ( t ) and τ c d ( t ) , respectively. Assume that the centralized controllers can monitor τ d c ( t ) and that the forwarding devices can receive the CS from the centralized controllers with τ c d ( t ) . Let τ 2 ( t ) = τ d c ( t ) + τ c d ( t ) , which is termed propagation latency in device–controller pairs.
When a flow joins the SDWN or is generated in an OpenFlow forwarding device, it is first placed in a queue, in which is waits to be processed and sent. When a communication channel is free, the centralized controllers establish a device-to-device path after receiving all communications from the whole network. Then, they design a control policy and sends the control instructions to adjust the sending rate at the source side. The whole process is described as follows.
First, the flow entry in the source forwarding device sends a complete or partial copy of the sending rate r ( t ) to the centralized controllers (a packet-in message). Next, the centralized controllers calculate the state of the forwarding device by means of the packet-in message, classify the global state information, and create a control policy to stabilize the sending rate. The control policy is utilized to re-stabilize the sending rate via control instructions u ¯ ( t ) . Then, the controllers adjust the weighted matrix (matrix B u , B u n × n ) accordingly, where B u represents the completion of the flow (which generates the packet-in message) associated with the control instructions.
Therefore, the SDWN architecture with propagation latency in device–controller pairs can be modeled as
r ˙ ( t ) = A ¯ r ( t ) + B u u ¯ ( t ) ,
where A ¯ is the matrix of the network parameters.
Let the control instruction u ( t ) = K r ( t ) ,     K n × n is denote control strength, and the control instruction be represented as u ¯ ( t ) = K r ( t t k ) ,   t [ t k , t k + 1 ) , where u ¯ ( t ) is the control input in the forwarding device, and t k is the sample time at moment k . Rewrite r ( t ) as r ( t l ) = r ( t ( t t k ) ) = r ( t τ 2 ( t ) ) ,   t [ t k , t k + 1 ) , where τ 2 ( t ) = τ d c ( t ) + τ c d ( t ) denotes the entirety of propagation latency in the device–controller pairs.
Substitute r ( t τ 2 ( t ) ) into Equation (5); consequently, the SDWN architecture with propagation latency in device–controller pairs becomes a linear closed-loop congestion control system.
r ˙ ( t ) = A ¯ r ( t ) + B u u ¯ ( t ) = A ¯ r ( t ) + B u K r ( t τ 2 ( t ) ) , t [ t k , t k + 1 ) .

3.3. Effect of Channel Competition from Neighboring Forwarding Devices

The problem of wireless channel competition is a critical issue impacting the sending rate adjustment at the source side in the SDWN. The centralized controllers contain information on global topology. Due to the broadcasting nature of the wireless medium, the forwarding devices cannot use and occupy the same wireless channel at the same moment. The other forwarding devices around the source forwarding device may contain data that can be transmitted simultaneously. Thus, every forwarding device needs to compete for the shared channel in order to send data, as shown in Figure 4. Optimizing the sending rates of the different source forwarding devices is essential in a period of channel competition. By centralizing control in the SDWN, the effect of coupling connection is reflected in the control instructions received from the centralized controllers. All network information is aggregated, and the control laws are designed in the centralized controllers to control network congestion.
Figure 4 shows an instance of channel competition in the SDWN. When there are data that have been sent from the forwarding device A to the forwarding device B, A provides updated information to the centralized controllers. At this moment, forwarding device C communicates with forwarding device D, occupying the wireless channel. Thus, forwarding device A receives the control instructions and must wait until the wireless channel is free. Meanwhile, when forwarding device E coupled with forwarding device F also have data to transmit, they must also compete with forwarding device A. The centralized controllers require all information and make proper adjustments of the control laws of the different forwarding devices, which feed this information back to the forwarding devices via the control instructions.
Assumption 4.
The coupled forwarding devices are defined as the reciprocal channel effect in SDWNs. The whole network is diffusively coupled, and all network information is sent to the centralized controllers. Define L = ( l ij ) N × N as the Laplace coupling matrix, whose diagonal elements are considered to correspond to l i i = Σ j = 1 , j i N l i j ,   l i j 0 . This represents the network topology of the global SDWN. If there is a connection between forwarding device i and j (i.e., i and j are neighbors), l i j = l j i = 1 ; otherwise, l i j = l j i = 0   ( i j ) . The row sum of L is zero. The whole SDWN is connected, and matrix L is irreducible.
Based on the Laplace coupling matrix L in Assumption 4, the control policies u ^ i ( t ) in the forwarding device i that represent the topology relationship between all neighbor forwarding devices can be described as follows
u ^ i ( t ) = K { Σ i = 1 N l i j [ G r j ( t ) + G d r j ( t τ 1 ( t ) ) ] } ,
where appropriate dimensions G , G d denote the coupling weights of the proper adjustments. The information on global network topology and wireless channel competition with propagation latency in the device-to-device path τ 1 ( t ) is used to update the information sent to the centralized controllers. Then, the centralized controllers send the control instructions to the forwarding device at the source side based on analyzing the global network topology and wireless channel competition with a global view.
Therefore, all control instructions in the centralized controllers are expressed by Equation (7) to implement stable congestion control in the SDWN, which consists of topology information and the influence of the other forwarding devices with propagation latency in device-to-device paths.
Now, when the forwarding device at the source side receives the control instructions from the centralized controllers, the propagation latency in the device–controller pairs τ 2 ( t ) must be considered. This means that the forwarding device makes an adjustment in latency τ 2 ( t ) behind the centralized controllers sending the control instructions. Additionally, considering the presence of external disturbance, this closed-loop congestion control model can be converted into a robust control model. In addition, by combining Equations (4) with (6) as a data transmission process model and considering the global topology expressed by Equation (7), the linear closed-loop SDWN architecture incorporating the external disturbance can be described as follows
{ r ˙ i ( t ) = A r i ( t ) + A d r i ( t τ 1 ( t ) ) + B u u i ( t ) + B w w ( t ) , u i ( t ) = K { r ( t τ 2 ( t ) ) + Σ i = 1 N l i j [ G r j ( t ) + G d r j ( t τ 1 ( t ) ) ] } ,
where A is the weight of the network parameters, and B w is the weight of the external disturbance. Let A r i ( t ) = A ^ r i ( t ) + A ¯ r i ( t ) and u i ( t ) = u ^ i ( t ) + u ¯ ( t ) .
Therefore, the congestion control system with two kinds of propagation latencies is converted into a robust congestion control model, which can be modeled by Equation (8).

3.4. A WOA-Based Scheduling Strategy Designed to Maximize Global SDWN Throughput

This section describes a WOA-based scheduling strategy designed to maximize global SDWN throughput, which can be non-preemptively pre-set to determine the network parameters of each forwarding device stabilization process.

3.4.1. Whale Optimization Algorithm

First, the WOA algorithm, used as a preliminary strategy, is briefly introduced as follows. The WOA is a meta-heuristic optimization algorithm that simulates the foraging behavior of humpback whales, including their encircling of prey, bubble-net attacking strategies, and prey detection behavior [37,38,39,40].

Encircling Prey

Humpback whales have the capacity to identify the location of prey and hem them in. Owing to the optimal position designed such that it is not a priori, this paper assumes that the current best candidate solution is the location of prey. Each whale tries to update their position with respect to approaching to the prey. This foraging behavior can be modeled as follows.
D = C · | X * ( k ) X ( k ) | , X ( k + 1 ) = X * ( k ) A · D ,
where k indicates the k th iteration, A and C are coefficient vectors, the position vector of prey X * signifies the best solution, X * is the position vector, | · | presents the absolute value, and · represents Hadamard’s product of vectors. In addition, X * should be updated in each iteration if there is a better solution.
The vectors A and C are described as follows.
A = 2 a · r , C = 2 r ,
where r [ 0 , 1 ] is a random vector, and a [ 0 , 2 ] is convergence vector from 2 to 0 with the iterations.
a = ( 2 2 k / K m a x ) ,
where K m a x is the maximum number of the iterations.

Bubble-Net Attacking

Figure 5 presents an image of the humpback whale’s hunting strategy, in which it prefers to attack its prey close to the surface. It swims down, generates bubbles in a spiral shape around its prey, and then dives up toward the surface to consume them.
While engaging in this foraging behavior, the whale generates distinctive bubbles arranged in a circle, including a coral loop, a lobtail, and a capture loop.
The WOA can be divided into two approaches:
  • Shrinking Encircling Mechanism
By analyzing the value of a , our study can mathematically model the foraging behavior of a humpback whale.
2.
Spiral Updating Position
By calculating the distance between the current position of the whale and the location of its prey, this approach mathematically simulates the whale’s foraging behavior, which can be expressed as follows.
X ( k + 1 ) = D · e b l · cos ( 2 π l ) + X * ( k ) ,
where D = | X * ( k ) X ( k ) | represents the distance of the i th whale to its prey; b , as a constant, indicates the shape of the logarithmic spiral; and l [ 0 , 1 ] is a random number. It has been reported that the whale swims around the prey within a shrinking circle and along a spiral-shaped path simultaneously.
Then, we assume that both the shrinking encircling mechanism and the spiral updating position can be selected with a probability of 50 % to optimize the position of the whale.
Therefore, the bubble-net attacking method can be modelled as follows
X ( k + 1 ) = { X * ( k ) A · D i f   p < 0.5 , D · e b l · cos ( 2 π l ) + X * ( k ) i f   p 0.5 ,
where p [ 0 , 1 ] is a random value.

Search for Prey

As discussed in the above-mentioned analysis, the variation of the vector A is considered to be a critical parameter with respect to the random search for prey according to the position of each whale. Consequently, the whale should be forced to move far away from a reference position if | A | > 1 . The position of the whale is updated according to a randomly selected whale rather than the best solution, for which a global search is performed. The model is described as follows.
D = C · | X r a n d ( k ) X ( k ) | , X ( k + 1 ) = X r a n d ( k ) A · D ,
where X r a n d ( k ) is a random position vector of a whale, which is selected from the current population.

3.4.2. The Details of the WOA-Based Scheduling Strategy

The centralized controllers are considered to constitute a criterion device, in which a scheduling problem must be pre-set in order to solve the network congestion problem. Hence, each individual whale is considered to represent a specific scheduling plan in order to allocate appropriate sending rates at the source side based on the control instructions from the centralized controllers. After multiple iterations, the optimal individual whale output is selected as the best scheduling scheme according to an evaluation of the effectiveness of each scheduling scheme.
Ideally, the sending rate in each forwarding device remains stable and needs to be optimized under congestion control in order to maximize the global SDWN throughput with limited wireless network resources.
The specific steps of the WOA-based scheduling strategy are as follows.
Step 1. Represent the number of whales as N for defining all specific scheduling plans and consider a set of n forwarding devices f 1 , f 2 , , f n that has a maximum processing capacity of C i , i = 1 , 2 , , n . Suppose that only n levels of the sending rate exist at the source side with a weight w i , i = 1 , 2 , , n .
Step 2. Configurate a set of m data flows P j ( t ) ,   j = 1 , 2 , , m waiting to be processed at the moment t . All of them must be processed and then transmitted to the destination.
Step 3. Suppose that 0 < C 1 C n < + and ignore the process latency of the forwarding devices to simplify the optimized scheduling model.
Step 4. Process each data flow P j using a series of forwarding devices (not all forwarding devices). Thus, define the processing data flow P j of these forwarding devices as u i j { f 1 , , f n } , for which the maximum process capability is C u i j , i , j = 1 , 2 , , n , respectively.
Step 5. To maximize the global throughput, the optimized whale with an appropriate ideal rate of each forwarding device is denoted as S i ( t ) ,   i = 1 ,   2 ,   ,   n . Define S ( t ) = { S 1 ( t ) , S 2 ( t ) , , S n ( t ) } .
Therefore, the optimization problem can be described as follows.
max w i > 0 , S i ( t ) > 0 i S i ( t ) s . t .   S i = j C u i j C i , 0 C u i j min { C i } = C 1 , s 1 ( t ) W 1 = = s i ( t ) w i = = s k ( t ) w k j C u i j = P j ( t ) , S i ( t ) , P j ( t ) , C i 0 .
The optimized whale with an appropriate ideal rate S i ( t ) of forwarding devices can be set under the above-mentioned constraints before data transmission in Equation (9). Initially, the optimized problem of maximizing the global SDWN throughput can be easily solved, and an uncomplicated allocated weighted proportion is defined as an ideal, optimized pre-set state by calculating each S i ( t ) . Therefore, the WOA-based scheduling strategy has been presented to pre-set the goal of the stability congestion control scheme.
Based on the above-mentioned analysis, the stability congestion control model can be established. Then, external disturbance is incorporated to convert the stability congestion control model into a robust congestion control model in order to develop our global robust congestion control algorithm.
Remark 1.
In this section, our study utilizes the WOA algorithm to implement the weighted fair scheduling strategy, which provides the control target of maximizing the global SDWN throughput for stability congestion control. The WOA algorithm can obtain solutions of required precision due to its low computational complexity and time consumption. Furthermore, a WOA algorithm that must be pre-set only provides the goal of the robust congestion control before executing the robust congestion control algorithm, which means that the WOA algorithm cannot be used in discussion regarding robust H control performance.

4. Problem Formulation of Robust Congestion Control

This section proposes a continuous, robust congestion control scheme with two kinds of propagation latencies in the SDWN. Its specific steps are as follows.
Step 1. The AIMD adjustment scheme is analyzed based on the congestion control system with propagation latency in device-to-device paths, and the values κ and ϑ are calculated after receiving the CS at the source side.
Step 2. A closed-loop congestion control model with propagation latency in device–controller pairs is proposed, and the data transmission process model is analyzed to provide decisions regarding control instructions in the centralized controllers.
Step 3. The effect of channel competition between neighboring forwarding devices is analyzed. Based on the global network topology and considering the effect of channel competition, all control instructions in the centralized controllers are expressed to stabilize congestion control.
Step 4. The WOA-based scheduling strategy is analyzed to calculate each optimized parameter value S i ( t ) , and the target of the congestion control stability procedure is proposed in order to maximize the global SDWN throughput.
Step 5. Based on the first four steps, the stability congestion control model is established. Then, external disturbance is accounted for to convert the stability congestion control model into a robust congestion control model.
Step 6. A novel, robust H control model is proposed to solve the robust congestion control model, thereby necessitating the determination of a robustness condition.
At the current stage, this paper focuses on establishing the robust H control model and determining its robustness condition, which are introduced in the following two subsections.

4.1. Sending Rates at Source Side Approaching the Ideal Optimized Rates

Our study first considers the sending rates at the source side approaching the ideal optimized rates for establishing the robust H control model. By means of optimized scheduling, the data flows are assigned for maximizing the throughput of global SDWN under the aforementioned satisfactory conditions. Then, the problem becomes keeping the optimization model network stable in the SDWN, which maintains an allocated weighted proportion at the source side according to the ideal optimized state S ( t ) . If the global SDWN achieves robustness, it is stable at the maximal network throughput influenced by propagation latencies and external disturbance. Therefore, when S ( t ) is calculated and achieved, the sending rate of each forwarding device needs to approach its value.
It is preferred to keep the ideal optimized state S ( t ) stable under robust congestion control. The sending rate of each forwarding device needs to be unified as follows: r 1 ( t ) S 1 ( t ) , r 2 ( t ) S 2 ( t ) , , r n ( t ) S n ( t ) ( r i ( t ) S i ( t ) , which means l i m t + | | r i ( t ) S i ( t ) | | = 0 ).
To unify the sending rates at the source side, the variable x ( t ) = { [ r 1 ( t ) S 1 ( t ) ] T , [ r 2 ( t ) S 2 ( t ) ] T , , [ r n ( t ) S n ( t ) ] T } is defined as the error state. Thus, the robust congestion control system (modeled by Equation (8)) can be converted into a global error system of the robust congestion control, which is described below:
x ˙ i ( t ) = A x i ( t ) + A d x i ( t τ 1 ( t ) ) + B u K { x ( t τ 2 ( t ) ) + Σ i = 1 N l i j [ G x j ( t ) + G d x j ( t τ 1 ( t ) ) ] } ) .

4.2. Robust H∞ Control Model

Our study also considers the linear closed-loop SDWN with two kinds of propagation latency and external disturbance as the robust H control model, which is described as follows.
{ x ˙ i ( t ) = A x i ( t ) + A d x i ( t τ 1 ( t ) ) + B u u i ( t ) + B w w ( t ) u i ( t ) = K { x ( t τ 2 ( t ) ) + Σ i = 1 N l i j [ G x j ( t ) + G d x j ( t τ 1 ( t ) ) ] } z ( t ) = I x ( t ) x ( t ) = ϕ ( t ) ,
where x i ( t ) n is the error state denoting the state of the difference between the real-time state and the ideal optimized pre-set state; u i ( t ) n represents the control instruction in the centralized controllers; z ( t ) is the controlled output, which can reflect the energy trajectory; w ( t ) is the external disturbance with a covariance matrix equal to w and expectation equal to zero; and τ i ( t ) , i = 1 , 2 as the continuous time satisfies
0 τ i h i ,   μ m i , τ ˙ ( t ) μ M i ,
where μ m i , μ M i , and h i , i = 1 , 2 are constants.
At this stage, definitions required for the analysis of the robust H control model are provided as follows.
Definition 2.
There exists a description of the energy relation between the controlled output z ( t ) and the external disturbance output w ( t ) . By considering the real SDWN, the energy relationship of these two outputs is believed to be 0 { z T ( t ) z ( t ) γ 2 w T ( t ) w ( t ) } d t ,   || T w z ( z ) || < γ , where γ is a prescribed positive scalar. This shows that the energy of the external disturbance has been absorbed after being controlled, which implies that robust H control has been achieved.
Lemma 1 (Kronecker product):
Let denote the notation of Kronecker product. Accordingly, the following properties are satisfied in appropriate dimensions:
(i) 
( α A ) B = A ( α B ) ,
(ii) 
( A + B ) C = A C + B C ,
(iii) 
( A B ) ( C D ) = ( A C ) ( B D ) .
Lemma 2
[51]: For any matrix R > 0 and a vector function x : [ α , β ] n , if the integrals concerned are well defined, the following inequality holds:
{ [ α β x T ( s ) d s ] R [ α β x ( s ) d s ] ( β α ) α β x T ( s ) R x ( s ) d s .
Lemma 3
[52]: For any matrices R n × n ,   Y 2 n × n , and X 2 n × 2 n with [ X Y R ] 0 , and a vector function x : [ α , β ] n , if the integrals concerned are well defined, then the following inequality holds:
α β x ˙ T ( s ) R x ˙ ( s ) ϑ T [ H e { Y Π } + ( β α ) X ] ϑ ,
Lemma 4
[53]: For any matrix R > 0 and a differentiable signal x in [ α , β ] n , the following inequality holds:
α β x ˙ T ( s ) R x ( s ) d s ϖ T Ω ^ ϖ / ( β α ) ,
where
Ω ^ = [ 4 R 2 R 6 R 4 R 6 R 12 R ] ,
ϖ = [ x T ( β )   x T ( α )   α β x T ( s ) d s / ( β α ) ] .
Lemma 5
[54]: Let x be a differentiable function: [ α , β ] n . For symmetric matrices R n × n and Z 1 ,   Z 3 3 n × 3 n , and any matrices Z 2 3 n × 3 n and N 1 ,   N 2 3 n × n satisfying
Ψ ¯ = [ Z 1 Z 2 N 1 Z 3 N 2 R ] 0 ,
the following inequality holds:
α β s ˙ T ( t ) R x ˙ ( s ) d s ϖ T Ω ¯ ϖ ,
where
Ω ¯ = ( β α ) ( Z 1 + Z 3 / 3 ) + H e { N 1 Π 1 ¯ + N 2 Π 2 ¯ } , Π ¯ 1 = e ¯ 1 e ¯ 2 ,   Π ¯ 2 = 2 e ¯ 3 e ¯ 1 e ¯ 2 , e ¯ 1 = [ I   0   0 ] ,   e ¯ 2 = [ 0   I   0 ] ,   e ¯ 3 = [ 0   0   I ] ,
and ϖ is similarly defined in Lemma 4.

5. Criterion and Robustness Condition of Robust H Control Model in the SDWN

In this section, a new criterion of a robust H control model in the SDWN is proposed to determine a robustness condition using matrix-based integral inequality. The criterion is first established based on the LMI control toolbox. We provide the following definition:
A ˜ = I N A ,   A ˜ d = I N A d ,   B ˜ = I N B w ,   B ˜ u = I N B u , G ˜ = G L ,   G ˜ d = G d L .
According to the Kronecker product, the second-order system can be rewritten as a new, robust H control model.
{ x ˙ ( t ) = A ˜ x ( t ) + A ˜ d x ( t τ 1 ( t ) ) + u ( t ) + B ˜ w ( t ) u ( t ) = K { B ˜ u x ( t τ 2 ( t ) ) + G ˜ x ( t ) + G ˜ d x ( t τ 1 ( t ) ) } z ( t ) = I N x ( t ) x ( t ) = ϕ ( t ) .
The following nomenclature for vectors and matrices simplifies the representation:
η 1 ( t ) = [ η 3 T t τ 1 ( t ) t x T ( s ) d s t h 1 t τ 1 ( t ) x T ( s ) d s ] T , η 2 ( t ) = [ x T ( t ) x ˙ T ( t ) ] T , η 3 ( t ) = [ x T ( t ) x T ( t τ 1 ( t ) )   x T ( t h 1 )   x T ( t τ 2 ( t ) )   x T ( t h 2 ) ] T , η 4 ( t ) = [ x ˙ T ( t )   x ˙ T ( t τ 1 ( t ) )   x ˙ T ( t h 1 )   x ˙ T ( t τ 2 ( t ) )   x ˙ T ( t h 2 ) ] T , η 5 ( t ) = [ t τ 1 ( t ) t x T ( s ) d s / τ 1 ( t )   t h 1 t τ 1 ( t ) x T ( s ) d s / ( h 1 τ 1 ( t ) ) ] T , η 6 ( t ) = [ t τ 2 ( t ) t x T ( s ) d s / τ 2 ( t )   t h 2 t τ 2 ( t ) x T ( s ) d s / ( h 2 τ 2 ( t ) ) ] T , ξ ( t ) = [ η 3 T ( t )   η 4 T ( t )   η 5 T ( t )   η 6 T ( t ) ] T , ξ ( t ) = [ ξ ¯ T ( t )   w T ( t ) ] T , e i = [ 0 n × ( i 1 ) n   I n   0 n × ( 15 i ) n ] , i = 1 , 2 , , 15 .
Theorem 1.
For given scalars h 1 , h 2 > 0 and μ 11 < d ˙ 1 ( t ) < μ 12 < 1 , μ 21 < d ˙ 2 ( t ) < μ 22 < 1 , the global error system is robust under robust congestion control if there exist appropriate dimension matrices P > 0 ,   Q i 0 and R > 0 , i = 1 , 2 , appropriate dimension symmetrical matrices X 11 ( i ) , X 13 ( i ) , X 21 ( i ) , X 23 ( i ) , i = 1 , 2 , and any matrices X 12 ( i ) , X 22 ( i ) , N 11 ( i ) , N 12 ( i ) , N 21 ( i ) , N 21 ( i ) , i = 1 , 2 , thus allowing the following conditions in (12) to (13) to hold:
Ξ < 0 ,
Ψ 1 ( 1 ) = [ X 11 ( 1 ) X 12 ( 1 ) N 11 ( 1 ) X 13 ( 1 ) N 12 ( 1 ) R 1 ] 0 , Ψ 2 ( 1 ) = [ X 21 ( 1 ) X 22 ( 1 ) N 21 ( 1 ) X 23 ( 1 ) N 22 ( 1 ) R 1 ] 0 , Ψ 1 ( 2 ) = [ X 11 ( 2 ) X 12 ( 2 ) N 11 ( 2 ) X 13 ( 2 ) N 12 ( 2 ) R 2 ] 0 , Ψ 2 ( 2 ) = [ X 21 ( 2 ) X 22 ( 2 ) N 21 ( 2 ) X 23 ( 2 ) N 22 ( 2 ) R 2 ] 0 ,
where
Ξ = H e { Π 1 T P Π 18 + Π 6 T N 11 ( 1 ) Π 10 + Π 6 T N 12 ( 1 ) Π 11 + Π 7 T N 21 ( 1 ) Π 12 + Π 7 T N 22 ( 1 ) Π 13 + Π 8 T N 11 ( 2 ) Π 14 + Π 8 T N 12 ( 2 ) Π 15 + Π 9 T N 21 ( 2 ) Π 16 + Π 9 T N 12 ( 2 ) Π 17 } ( 1 τ ˙ ( t ) ) Π 4 T ( Q 1 Q 2 ) Π 4 Π 5 T Q 2 Π 5 + j = 1 2 h j e 6 T R j e 6 γ 2 e 15 e 15 T + τ 1 ( t ) Π 6 T ( X 11 ( 1 ) + X 13 ( 1 ) 3 ) Π 6 + ( h 1 τ 1 ( t ) ) Π 7 T ( X 21 ( 1 ) + X 23 ( 1 ) 3 ) Π 7 + τ 2 ( t ) Π 8 T ( X 11 ( 2 ) + X 13 ( 2 ) 3 ) Π 8 + ( h 1 τ 1 ( t ) ) Π 9 T ( X 21 ( 2 ) + X 23 ( 2 ) 3 ) Π 9 + Π 1 T P Π 19 + Π 1 T P Π 20 + Π 1 T P Π 21 + Π 3 T Q 1 Π 3 + Π 22 T Π 22 + e 1 T e 1
and
Π 1 = [ e 1 T e 2 T e 3 T e 4 T e 5 T τ 1 ( t ) e 11 T ( h τ 1 ( t ) ) e 12 T ] T , Π 2 = [ e 6 T e 7 T e 8 T e 9 T e 10 T e 1 T ( 1 τ ˙ ( t ) ) e 2 T   ( 1 τ ˙ ( t ) ) e 2 T e 3 T ] T , Π 3 = [ e 1 T e 4 T ] T , Π 4 = [ e 2 T e 5 T ] T , Π 5 = [ e 3 T e 6 T ] T , Π 6 = [ e 1 T e 2 T e 11 T ] T , Π 7 = [ e 2 T e 3 T e 12 T ] T , Π 8 = [ e 1 T e 4 T e 13 T ] T , Π 9 = [ e 4 T e 5 T e 14 T ] T , Π 10 = e 1 e 2 , Π 11 = 2 e 11 e 1 e 2 , Π 12 = e 2 e 3 , Π 13 = 2 e 12 e 2 e 3 , Π 14 = e 1 e 4 , Π 15 = 2 e 13 e 1 e 4 , Π 16 = e 4 e 5 , Π 17 = 2 e 14 e 4 e 5 , Π 18 = [ ( A ˜ + G ˜ ) e 1 T e 7 T e 8 T e 9 T e 10 T e 1 T ( 1 τ ˙ ( t ) ) e 2 T ( 1 τ ˙ ( t ) ) e 2 T e 3 T ] T , Π 19 = [ ( A ˜ d + G ˜ d ) e 2 T e 7 T e 8 T e 9 T e 10 T e 1 T ( 1 τ ˙ ( t ) ) e 2 T ( 1 τ ˙ ( t ) ) e 2 T Π 20 = [ K B ˜ u e 4 T e 7 T e 8 T e 9 T e 10 T e 1 T ( 1 τ ˙ ( t ) ) e 2 T ( 1 τ ˙ ( t ) ) e 2 T e 3 T ] T , Π 21 = [ B ˜ e 15 T e 7 T e 8 T e 9 T e 10 T e 1 T ( 1 τ ˙ ( t ) ) e 2 T ( 1 τ ˙ ( t ) ) e 2 T e 3 T ] T , Π 22 = [ e 1 T e 15 T ] T .
Proof: 
Consider the following Lyapunov–Krasovskii functionals acting on this closed-loop robust H control model:
V ( t ) = η 1 T ( t ) P η 1 ( t ) + t τ 1 ( t ) t x T ( s ) Q 1 x ( s ) d s + t h 1 t τ 1 ( t ) x T ( s ) Q 2 x ( s ) d s + j = 1 2 h j 0 t + θ t x ˙ T ( s ) R j x ˙ ( s ) d s d θ .
The derivative of V ( t ) is
V ˙ ( t ) = ξ ¯ T ( t ) { H e Π 1 P Π 2 + Π 3 T Q 1 Π 3 ( 1 τ ˙ ( t ) ) Π 4 T ( Q 1 Q 2 ) Π 4 Π 5 T Q 2 Π 5 + j = 1 2 h j e 6 T R j e 6 } ξ ¯ ( t ) j = 1 2 t h j t x ˙ T ( s ) R j x ˙ ( s ) d s = ξ ¯ T ( t ) Ξ 1 ξ ¯ ( t ) j = 1 2 t h j t x ˙ T ( s ) R j x ˙ ( s ) d s .
Since Ψ j ( i ) 0 , i , j = 1 , 2 in Lemma 5, the following is yielded:
j = 1 2 t h j t x ˙ T ( s ) R j x ˙ ( s ) d s = t τ 1 ( t ) t x ˙ T ( s ) R j x ˙ ( s ) d s t h 1 t τ 1 ( t ) x ˙ T ( s ) R j x ˙ ( s ) d s t τ 2 ( t ) t x ˙ T ( s ) R j x ˙ ( s ) d s t h 2 t τ 2 ( t ) x ˙ T ( s ) R j x ˙ ( s ) d s ξ ¯ T ( t ) { τ 1 ( t ) Π 6 T ( X 11 ( 1 ) + X 13 ( 1 ) / 3 ) Π 6 + ( h 1 τ 1 ( t ) ) Π 7 T ( X 21 ( 1 ) + X 23 ( 1 ) / 3 ) Π 7 + τ 2 ( t ) Π 8 T ( X 11 ( 2 ) + X 13 ( 2 ) / 3 ) Π 8 + ( h 1 τ 1 ( t ) ) Π 9 T ( X 21 ( 2 ) + X 23 ( 2 ) / 3 ) Π 9 + H e { Π 6 T N 11 ( 1 ) Π 10 + Π 6 T N 12 ( 1 ) Π 11 + Π 7 T N 21 ( 1 ) Π 12 + Π 7 T N 22 ( 1 ) Π 13 + Π 8 T N 11 ( 2 ) Π 14 + Π 8 T N 12 ( 2 ) Π 15 + Π 9 T N 21 ( 2 ) Π 16 + Π 9 T N 12 ( 2 ) Π 17 } } ξ ¯ ( t )
Thus, the continuous linear closed-loop congestion control system (10) is considered, and the derivative of V ( t ) is
V ˙ ( t ) = ξ ( t ) Ξ ¯ ξ ( t ) + γ 2 w T ( t ) w ( t ) = ξ T ( t ) { Ξ ¯ + Π 22 T Π 22 } ξ ( t ) ,
where
Ξ ¯ = H e { Π 1 T P Π 18 + Π 6 T N 11 ( 1 ) Π 10 + Π 6 T N 12 ( 1 ) Π 11 + Π 7 T N 21 ( 1 ) Π 12 + Π 7 T N 22 ( 1 ) Π 13 + Π 8 T N 11 ( 2 ) Π 14 + Π 8 T N 12 ( 2 ) Π 15 + Π 9 T N 21 ( 2 ) Π 16 + Π 9 T N 12 ( 2 ) Π 17 } + Π 1 T P Π 19 + Π 1 T P Π 20 + Π 1 T P Π 21 + Π 3 T Q 1 Π 3 ( 1 τ ˙ ( t ) ) Π 4 T ( Q 1 Q 2 ) Π 4 Π 5 T Q 2 Π 5 + j = 1 2 h j e 6 T R j e 6 γ 2 e 15 e 15 T + τ 1 ( t ) Π 6 T ( X 11 ( 1 ) + X 13 ( 1 ) / 3 ) Π 6 + ( h 1 τ 1 ( t ) ) Π 7 T ( X 21 ( 1 ) + X 23 ( 1 ) / 3 ) Π 7 + τ 2 ( t ) Π 8 T ( X 11 ( 2 ) + X 13 ( 2 ) / 3 ) Π 8 + ( h 1 τ 1 ( t ) ) Π 9 T ( X 21 ( 2 ) + X 23 ( 2 ) / 3 ) Π 9 .
The following H performance index J is considered:
J = 0 { z T ( t ) z ( t ) γ 2 w T ( t ) w ( t ) } d t , || T w z ( z ) || < γ ,
where γ is a prescribed positive scalar.
H  performance index J displays the energy relationship between the controlled output and the external interference. J < 0 indicates that the energy of external interference has been expended under the control law and that robust control has been achieved.
Consider w ( t ) 0 , where the following relation bas been obtained:
V ˙ ( t ) + z T ( t ) z ( t ) γ 2 w T ( t ) w ( t ) ξ T ( t ) { Ξ ¯ + Π 22 T Π 22 + e 1 T e 1 } ξ ( t ) = ξ T ( t ) Ξ ξ ( t ) .
Following from inequalities (12) and (13) and the Schur Complement Lemma, we obtain
V ˙ ( t ) + z T ( t ) z ( t ) γ 2 w T ( t ) w ( t ) < 0 .
Sum t from 0 to so that
0 { z T ( t ) z ( t ) γ 2 w T ( t ) w ( t ) } d t < V ( 0 ) V ( ) .
With the zero initial condition V ( 0 ) = 0 , we obtain
0 { z T ( t ) z ( t ) γ 2 w T ( t ) w ( t ) } d t < 0 .
Based on the Lyapunov–Krasovskii theory, the continuous linear delay closed-loop system with external interference can achieve robust control J < 0 with a desirable H performance index | | T w z ( z ) | | < γ according to (12) and (13).
Thus, the proof is complete. □

6. Simulation

In Section 6, a numerical network simulation is conducted to illustrate the effectiveness of our proposed robust congestion control scheme in the SDWN scenario and the robustness conditions given in Theorem 1. Furthermore, a comparison with the AIMD adjustment scheme and the scheme incorporating information-forwarding and the control algorithm is given to demonstrate the superiority of our proposed robust congestion control scheme over the other congestion control approaches that are applied in SDWNs to maximize global SDWN throughput and thus maintain long-term stability with two kinds of propagation latency and external disturbance.

6.1. Scenario Establishment

An SDWN scenario is established for the numerical simulation (as shown in Figure 6), which consists of a group of SDWN-centralized controllers and four forwarding devices. Each forwarding device is connected to one another and the centralized controllers by a wireless channel. In the wireless channel, the influence of propagation latency and external disturbance is present in every device-to-device path and device–controller pair. Thus, the forwarding devices first record their CS information and periodically broadcast it to the centralized controllers. Next, the centralized controllers yield control policies for robust congestion control and send control instructions to the four forwarding devices. Finally, the four forwarding devices follow these control instructions and make proper adjustments to the sending rates at the source side in order to achieve the desired global robust control for network congestion in the SDWN.

6.2. Parameter Description

Now, to analyze Theorem 1 (inequations (12) and (13)), the parameters in Equation (11) are considered as follows.
k = 1.55 , ϑ = 16.5 , A = [ 0 1 0 k ] , A d = [ 0 0 ϑ 0 ] ,
and B w = ( 2.2 , 1.4 , 3.6 , 2.8 , 1.2 , 2.4 , 0.6 , 1.8 ) T . The inner coupling matrices are defined as G = d i a g { 3 , 2 } , G d = d i a g { 3 , 5 } , and the coupling matrix L is as follows
k = 1.55 ,   ϑ = 16.5 , A = [ 0 1 0 k ] , A d = [ 0 0 ϑ 0 ] ,
and B w = ( 2.2 , 1.4 , 3.6 , 2.8 , 1.2 , 2.4 , 0.6 , 1.8 ) T . Define the inner coupling matrices as G = d i a g { 3 , 2 } , G d = d i a g { 3 , 5 } , and the coupling matrix L is as follows.
L = [ 3 1 1 1 1 2 1 0 1 1 3 1 1 0 1 2 ] .
A robust congestion control scheme in SDWN is researched in this paper. In addition, recall that an essential precondition for solving the re-stabilization problem is determined by global asymptotic stability. As a necessary condition for global asymptotic stability, x ( t ) indicates that the error state satisfies l i m t 0   x ( t ) = 0 . Therefore, we consider a stability congestion control pattern with zero initial conditions to correspond to x ( t ) = ( 0 0 0 0 0 0 0 0 ) T .
A four-dimensional matrix is proposed to describe four forwarding devices under robust H control in the SDWN. There exists a feasible solution to LMIs (inequations (12) and (13)) according to Theorem 1. Now, suppose the control strength K = d i a g { 2.5 , 1.2 , 1.8 , 1.6 , 2 , 2.5 , 2.2 , 5 } and the control instruction B u = [ 1 2 0.3 2 ] .
To render the simulation tractable, the external disturbance output is denoted as follows:
w ( t ) = { 1 0 t 1 , 0 o t h e r w i s e ,
which is a function with limited energy and duration.

6.3. Simulation Results

We conducted experiments on both the variations in the error states and the energy trajectories in the robust H control scheme in the SDWN. The experiments included the AIMD adjustment scheme and the information-forwarding and control algorithm as the benchmark algorithms.
Now, short descriptions of all the benchmark algorithms under the condition of Theorem 1 are given as follows.
Short descriptions of all the benchmark algorithms
-
AIMD adjustment scheme [28,29]: This is a traditional network control scheme, which is often used at the source side without considering both the propagation latency in device–controller pairs and channel competition in order to achieve network robustness with a global view of the SDWN.
-
Information forwarding and control algorithm [36,37,38]: The previous algorithm that addresses network congestion implements the robust control of partial networks instead of control incorporating a global view of the SDWN, which is often used for robust congestion control without considering the propagation latency in device–controller pairs.
The definitions of both the variation in the error state and energy trajectory are given as follows.
Definition 3.
Variation in error state: The variation in error state is defined as the trajectory of the current state approaching the ideal state in SDWNs, which is believed to be close to 0 when the second-order system is under robust congestion control. Moreover, due to the characteristics of the second-order system, each variation in the error state is described by two trajectories that should converge at 0, i.e., the error equals 0 over a period of time.
Definition 4.
Energy trajectory: Energy trajectory is defined as the trajectory of the energy output, which is utilized to describe the energy trajectories of the controlled output z ( t ) and the external disturbance w ( t ) . As J < 0 , a necessary condition for the achievement of robust H congestion control is that the energy of the external disturbance must not have been absorbed after being controlled, and its corollary is that the controlled output z ( t ) is lower than the external disturbance output w ( t ) after being controlled.
According to Theorem 1, there exists a feasible solution to LMIs from Inequality (12) to Inequality (13). The variation in the error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories is displayed in Figure 7, each of which, as second-order systems, has two trajectories to display its variations. Notably, all the sending rates at the source side are initially stable, and the value of all the error states is initially zero due to the global asymptotic stability of the SDWN. Next, when the external disturbance appears at the initial moment, jitter occurs, and all error states become unstable. This indicates that all the source forwarding devices adopted the robust congestion control scheme to carry out the sending rate adjustments for re-stabilization under the presence of two kinds of propagation latency and external disturbance. Then, the error states converge after a finite length of time. This indicates that the error state x ( t ) is under robust congestion control and that the whole wireless network has achieved global SDWN robustness.
Figure 8 displays the energy relation between the controlled output z ( t ) and the external disturbance output w ( t ) . It is notable that the energy trajectory z ( t ) is lower than w ( t ) , which means that the energy of the external disturbance has been restrained under the robust congestion control scheme. Thus, the effectiveness of our proposed robust congestion control scheme has been validated.
To better reflect the control performance by making simulation-based comparisons with other schemes, including the AIMD adjustment scheme and the information-forwarding and control algorithm, important design elements of the robust H control scheme are ablated to verify the efficiency and robustness of the conditions we determined to be sufficient for achieving global SDWN robustness. The detailed results of the experiments on the robust H control scheme are exhibited in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14 and listed in Table 1 and Table 2. Table 1 shows the results of the convex optimization after the achievement of global SDWN robustness, in which the iteration number is 60 and the consumption time is 0.0004972 s. It is clear that the convex optimization that implements the weighted fair scheduling strategy for stability congestion control is simple and presents low computational complexity and short time consumption, which satisfies the analysis of Remark. Table 2 shows the results of the robust H control schemes, which include our proposed robust congestion control scheme, the AIMD adjustment scheme, and the information-forwarding and control algorithm. Short discussions comparing the robust H control schemes with the AIMD adjustment scheme and the information-forwarding and control algorithm are presented in the following subsections.

6.3.1. Comparison with AIMD Adjustment Scheme

The error states and energy trajectories corresponding to the traditional AIMD adjustment scheme are shown in Figure 9 and Figure 10, respectively. Obviously, the variations in the error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories diverge at 1.2 s in Figure 9. This finding shows that it is impossible for the sending rates of the forwarding devices at the source side to approach the ideal, optimized state. In Figure 10, it is obvious that the energy trajectory z ( t ) is higher than w ( t ) , i.e., it is impossible for the external disturbance to be restrained under network congestion control. Due to the lack of global information from the SDWN-centralized controllers, the traditional AIMD adjustment scheme cannot satisfy the robustness condition given in Theorem 1.
Upon comparing the traditional AIMD adjustment scheme with our proposed scheme, it can be clearly seen that it is impossible for the sending rates of the forwarding devices at the source side to maintain long-term stability via the traditional AIMD adjustment scheme. This means that the sending rates at the source side diverge from the ideal, optimized states as time passes, which are also incapable of satisfying the demands of global SDWN throughput maximization.
Therefore, this paper demonstrates the superiority of our proposed scheme over the traditional AIMD adjustment scheme in terms of maximizing global SDWN throughput for maintaining long-term stability with two kinds of propagation latencies and external disturbance.

6.3.2. Comparison with Information-Forwarding and Control Algorithm

In terms of the information-forwarding and control algorithm, to solve the network congestion problem, existing works such as [2,34,35,36] emphasize the robust control of partial networks instead of employing a global view of SDWN. This may result in the wireless network failing to achieve global SDWN robustness when the propagation latencies in device–controller pairs are not considered. This paper presents the superiority of our robust congestion control scheme, with two kinds of propagation latency and external disturbance, over the other information-forwarding and control algorithms.
As shown in Figure 11, the variations in error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories can indicate network robustness by utilizing the information-forwarding and control algorithm. Clearly, the variations in error state x i ( t ) , i = 1 , 2 correspond to convergence at 1.5 s, while the variations in x i ( t ) , i = 3 , 4 correspond to continuous oscillation (non-convergence). This finding reveals that the information-forwarding and control algorithm for network congestion is suitable for the robust control of partial networks but not for global robust congestion control. Figure 12 shows that the energy trajectory z ( t ) is notably higher than w ( t ) , which signifies that it is impossible to constrain external disturbance under the network congestion control scheme.
We compared the information-forwarding and control algorithm with our proposed scheme, as shown in Figure 13 and Figure 14. Figure 13 shows the variations in x 3 ( t ) in the case of our proposed scheme and those in the information-forwarding and control algorithm. Obviously, the variations in x 3 ( t ) are under robust control in our proposed scheme, while they are outside of robust control in the information-forwarding and control algorithm. Similarly, in Figure 14, the energy trajectory z ( t ) in our proposed scheme is also under robust control, while that in the information-forwarding and control algorithm is still outside of robust control.
Therefore, our proposed scheme has been proven to provide more favorable results than the information-forwarding and control algorithm in terms of maximizing the global SDWN throughput for maintaining long-term stability with two kinds of propagation latency and external disturbance.

7. Conclusions

In this paper, we have proposed a novel WOA-based robust control scheme, which has been dubbed robust congestion control scheme, with two kinds of propagation latency and external disturbance in SDWNs that has been designed to solve the long-term stabilization problem. First, the sending rate adjustment model was proposed by using the AIMD adjustment scheme with propagation latency in device-to-device paths and the closed-loop congestion control model with propagation latency in device–controller pairs, and the effect of channel competition between neighboring forwarding devices has been analyzed. Next, a robust congestion control model with two kinds of propagation latency and external disturbance was established. Then, an efficient WOA-based scheduling strategy was presented in order maximize global network throughput. Afterward, the sufficient conditions were derived using Lyapunov–Krasovskii functionals and formulated by LMIs. Finally, after comparing the traditional AIMD adjustment scheme with an existing information-forwarding and control algorithm, we conducted numerical network simulations to demonstrate the effectiveness of our robust congestion control scheme. This scheme could also be utilized to analyze other efficient robust control methods in SDWNs. For future research, more applicable control algorithms modeled in SDWNs could be discussed in order to improve reliability and scalability. Simultaneously, more efficient SDN scheduling strategies could be further studied and improved.

Author Contributions

Conceptualization, X.H. and X.X.; methodology, X.H., X.X. and S.Z.; software, Z.S., S.Z. and J.C.; validation, X.H., X.X. and S.Z.; formal analysis, X.X. and Z.S.; investigation, X.X. and Z.S.; resources, J.C. and W.G.; data curation, J.C. and W.G.; writing—original draft preparation, X.H.; writing—review and editing, X.X. and S.Z.; visualization, X.H. and Z.S.; supervision, J.C. and W.G.; project administration, X.H. and J.C.; funding acquisition, X.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by State Key Laboratory of Precision Blasting, Jianghan University, grant number PBSKL2022303.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. McKeown, N.; Anderson, T.; Balakrishnan, H.; Parulkar, G.; Peterson, L.; Rexford, J.; Shenker, S.; Turner, J. OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 69–74. [Google Scholar] [CrossRef]
  2. Vissicchio, S.; Cittadini, L. Safe, efficient, and robust SDN updates by combining rule replacements and additions. IEEE/ACM Trans. Netw. 2017, 25, 3102–3115. [Google Scholar] [CrossRef]
  3. Agarwal, S.; Kodialam, M.; Lakshman, T.V. Traffic engineering in software defined networks. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 2211–2219. [Google Scholar]
  4. Al-Darrab, A.; Al-Darrab, I.; Rushdi, A. Software-Defined Networking load distribution technique for an internet service provider. J. Netw. Comput. Appl. 2020, 155, 102547. [Google Scholar] [CrossRef]
  5. Su, Z.; Wang, T.; Xia, Y.; Hamdi, M. FlowCover: Low-cost flow monitoring scheme in software defined networks. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 1956–1961. [Google Scholar]
  6. Bannour, F.; Souihi, S.; Mellouk, A. Distributed SDN control: Survey, taxonomy, and challenges. IEEE Commun. Surv. Tut. 2018, 20, 333–354. [Google Scholar] [CrossRef]
  7. Amin, R.; Reisslein, M.; Shah, N. Hybrid SDN networks: A survey of existing approaches. IEEE Commun. Surv. Tut. 2018, 20, 3259–3306. [Google Scholar] [CrossRef]
  8. Farris, I.; Taleb, T.; Khettab, Y.; Song, J. A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun. Surv. Tut. 2018, 21, 812–837. [Google Scholar] [CrossRef]
  9. Zheng, J.; Li, B.; Tian, C.; Foerster, K.T.; Schmid, S.; Chen, G.; Wu, J.; Li, R. Congestion-free rerouting of multiple flows in timed SDNs. IEEE J. Sel. Areas Commun. 2019, 37, 968–981. [Google Scholar] [CrossRef]
  10. Esmaeelzadeh, V.; Hosseini, E.S.; Berangi, R.; Akan, O.B. Modeling of rate-based congestion control schemes in cognitive radio sensor networks. Ad. Hoc. Netw. 2016, 36, 177–188. [Google Scholar] [CrossRef] [Green Version]
  11. Feng, T.; Bi, J.; Wang, K. Allocation and scheduling of network resource for multiple control applications in SDN. China Commun. 2015, 12, 85–95. [Google Scholar] [CrossRef]
  12. Tomovic, S.; Prasad, N.; Radusinovic, I. SDN control framework for QoS provisioning. In Proceedings of the 2014 22nd Telecommunications Forum Telfor (TELFOR), Belgrade, Serbia, 25–27 November 2014; pp. 111–114. [Google Scholar]
  13. Caria, M.; Jukan, A.; Hoffmann, M. A performance study of network migration to SDN-enabled traffic engineering. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 1391–1396. [Google Scholar]
  14. Johari, R.; Tan, D.K.H. End-to-end congestion control for the Internet: Delays and stability. IEEE/ACM Trans. Netw. 2001, 9, 818–832. [Google Scholar] [CrossRef]
  15. Bansal, G.; Kenney, J.B. Achieving weighted-fairnessin message rate-based congestion control for DSRC systems. In Proceedings of the 2013 IEEE 5th International Symposium on Wireless Vehicular Communications (WiVeC), Dresden, Germany, 2–3 June 2013; pp. 1–5. [Google Scholar]
  16. Fridman, E.; Shaked, U. Delay-dependent stability and H control: Constant and time-varying delays. Int. J. Control 2003, 76, 48–60. [Google Scholar] [CrossRef]
  17. Yang, L.; Guan, X.P.; Long, C.N.; Luo, X.Y. Feedback stabilization over wireless network using adaptive coded modulation. Int. J. Autom. Comput. 2008, 5, 381–388. [Google Scholar] [CrossRef]
  18. Boughanmi, N.; Song, Y.Q.; Rondeau, E. Priority and adaptive QoS mechanism for wireless networked control systems using IEEE 802.15.4. In Proceedings of the IECON 2010-36th Annual Conference on IEEE Industrial Electronics Society, Glendale, AZ, USA, 7–10 November 2010; pp. 2134–2141. [Google Scholar]
  19. Brandt, S.; Förster, K.T.; Wattenhofer, R. On consistent migration of flows in SDNs. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  20. Huang, L.H.; Hung, H.J.; Lin, C.C.; Yang, D.N. Scalable and bandwidth-efficient multicast for software-defined networks. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 1890–1896. [Google Scholar]
  21. Sahoo, K.S.; Puthal, D.; Tiwary, M.; Usman, M.; Sahoo, B.; Wen, Z.; Sahoo, B.P.S.; Ranjan, R. ESMLB: Efficient Switch Migration-based Load Balancing for Multi-Controller SDN in IoT. IEEE Internet Things J. 2019, 7, 5852–5860. [Google Scholar] [CrossRef]
  22. Sahoo, K.S.; Sahoo, B. CAMD: A switch migration based load balancing framework for software defined networks. IET Netw. 2019, 8, 264–271. [Google Scholar] [CrossRef]
  23. Tilmans, O.; Vissicchio, S. IGP-as-a-Backup for Robust SDN Networks. In Proceedings of the 10th International Conference on Network and Service Management (CNSM) and Workshop, Rio de Janeiro, Brazil, 17–21 November 2014; pp. 127–135. [Google Scholar]
  24. Bahnasy, M.; Idoudi, K.; Elbiaze, H. Software-defined DWDM optical networks: OpenFlow and GMPLS experimental study. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 2173–2179. [Google Scholar]
  25. Huque, T.I.; Yego, K.; Sioutis, C.; Nobakht, M.; Sitnikova, E.; Hartog, F. A system architecture for time-sensitive heterogeneous wireless distributed software-defined networks. In Proceedings of the 2019 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 12–14 November 2019; pp. 1–6. [Google Scholar]
  26. Hans, C.Y.; Quer, G.; Rao, R.R. Wireless SDN mobile ad hoc network: From theory to practice. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–7. [Google Scholar]
  27. Costanzo, S.; Galluccio, L.; Morabito, G.; Palazzo, S. Software defined wireless networks (SDWN): Unbridling SDNs. In Proceedings of the 2012 European Workshop on Software Defined Networking, Darmstadt, Germany, 25–26 October 2012; pp. 1–6. [Google Scholar]
  28. Yang, T.; Kong, L.; Zhao, N.; Sun, R. Efficient energy and delay tradeoff for vessel communications in SDN based maritime wireless networks. IEEE Trans. Intell. Transp. 2021, 22, 3800–3812. [Google Scholar] [CrossRef]
  29. Su, Y.; Jiang, P.; Chen, H.; Deng, X. A QoS-guaranteed and congestion-controlled SDN routing strategy for smart grid. Appl. Sci. 2022, 12, 7629. [Google Scholar] [CrossRef]
  30. Lu, Y. SED: An SDN-based explicit-deadline-aware TCP for cloud Data Center Networks. Tsinghua Sci. Technol. 2016, 21, 491–499. [Google Scholar]
  31. Lin, T.N.; Hsu, Y.M.; Kao, S.Y.; Chi, P.W. OpenE2EQoS: Meter-based method for end-to-end QoS of multimedia services over SDN. In Proceedings of the 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–8 September 2016; pp. 1–6. [Google Scholar]
  32. Neelakrishnan, P. Load balancing in SDN based networks using additive increase and multiplicative decrease (AIMD) technique. In Proceedings of the 2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 5–7 January 2017; pp. 1–3. [Google Scholar]
  33. Zhu, T.; Feng, D.; Wang, F.; Hua, Y.; Shi, Q.; Xie, Y.; Wan, Y. A congestion-aware and robust multicast protocol in SDN-based data center networks. J. Netw. Comput. Appl. 2017, 95, 105–117. [Google Scholar] [CrossRef]
  34. Scott-Hayward, S. Design and deployment of secure, robust, and resilient SDN Controllers. In Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, UK, 13–17 April 2015; pp. 1–5. [Google Scholar]
  35. Canini, M.; Kuznetsov, P.; Levin, D.; Schmid, S. A distributed and robust SDN control plane for transactional network updates. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong, 26 April–1 May 2015; pp. 190–198. [Google Scholar]
  36. Hu, X.; Guo, W. A robust congestion control scheme for cluster wireless multimedia sensor networks with propagation delay and external interference. Int. J. Distrib. Sens. Netw. 2016, 12, 1550147716683407. [Google Scholar] [CrossRef] [Green Version]
  37. Hu, X.; Guo, W. Congestion Control in Wireless Software Defined Networks with Propagation Delay and External Interference: A Robust Control Approach. Mob. Inf. Syst. 2016, 2016, 3454651. [Google Scholar] [CrossRef] [Green Version]
  38. Hu, X.; Guo, W. Robust Congestion Control in NFVs and WSDNs with Propagation Delay and External Interference. In Proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom .2016, Chongqing, China, 24–26 September 2016; pp. 1–10. [Google Scholar]
  39. Cao, L.; Yue, Y.G.; Cai, Y.; Zhang, Y. A Novel Coverage Optimization Strategy for Heterogeneous Wireless Sensor Networks Based on Connectivity and Reliability. IEEE Access 2021, 9, 18424–18442. [Google Scholar] [CrossRef]
  40. Cao, L.; Cai, Y.; Yue, Y.G.; Cai, S.T.; Hang, B. A Novel Data Fusion Strategy Based on Extreme Learning Machine Optimized by Bat Algorithm for Mobile Heterogeneous Wireless Sensor Networks. IEEE Access 2020, 8, 16057–16072. [Google Scholar] [CrossRef]
  41. Yue, Y.G.; Cao, L.; Hang, B.; Luo, Z.Q. A Swarm Intelligence Algorithm for Routing Recovery Strategy in Wireless Sensor Networks with Mobile Sink. IEEE Access 2018, 6, 67434–67445. [Google Scholar] [CrossRef]
  42. Cao, L.; Cai, Y.; Yue, Y.G. Swarm Intelligence-Based Performance Optimization for Mobile Wireless Sensor Networks: Survey, Challenges, and Future Directions. IEEE Access 2019, 7, 161524–161553. [Google Scholar] [CrossRef]
  43. Mirjalili, S.; Lewis, A. The whale optimization algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  44. Xiong, X.; Hu, X.; Guo, H. A hybrid optimized grey seasonal variation index model improved by whale optimization algorithm for forecasting the residential electricity consumption. Energy 2021, 234, 121127. [Google Scholar] [CrossRef]
  45. Xiong, X.; Hu, X.; Tian, T.; Guo, H.; Liao, H. A novel Optimized initial condition and Seasonal division based Grey Seasonal Variation Index model for hydropower generation. Appl. Energy 2022, 328, 120180. [Google Scholar] [CrossRef]
  46. Li, Z.K.; Hu, X.; Guo, H.; Xiong, X. A novel Weighted Average Weakening Buffer Operator based Fractional order accumulation Seasonal Grouping Grey Model for predicting the hydropower generation. Energy 2023, 277, 127568. [Google Scholar] [CrossRef]
  47. Hu, X.; Xiong, X.; Wu, Y.; Shi, M.J.; Wei, P.; Ma, C.M. A hybrid clustered SFLA-PSO algorithm for optimizing the timely and real-time rumor refutations in online social networks. Expert Syst. Appl. 2023, 212, 118638. [Google Scholar] [CrossRef]
  48. Gharehchopogh, F.S.; Gholizadeh, H. A comprehensive survey: Whale Optimization Algorithm and its applications. Swarm Evol. Comput. 2019, 48, 1–24. [Google Scholar] [CrossRef]
  49. Moon, Y.S.; Park, P.; Kwon, W.H.; Lee, Y.S. Delay-dependent robust stabilization of uncertain state-delayed systems. Int. J. Control 2001, 74, 1447–1455. [Google Scholar] [CrossRef]
  50. Yue, D.; Han, Q.L.; Lam, J. Network-based robust H control of systems with uncertainty. Automatica 2005, 41, 999–1007. [Google Scholar] [CrossRef]
  51. Gu, K. An integral inequality in the stability problem of time-delay systems. In Proceedings of the 39th IEEE Conference on Decision and Control, Sydney, Australia, 12–15 December 2000; Volume 3, pp. 2805–2810. [Google Scholar]
  52. Zhang, X.M.; Wu, M.; She, J.H.; He, Y. Delay-dependent stabilization of linear systems with time-varying state and input delays. Automatica 2005, 41, 1405–1412. [Google Scholar] [CrossRef]
  53. Seuret, A.; Gouaisbaut, F. Wirtinger-based integral inequality: Application to time-delay systems. Automatica 2013, 49, 2860–2866. [Google Scholar] [CrossRef] [Green Version]
  54. Zeng, H.B.; He, Y.; Wu, M.; She, J. Free-matrix-based integral inequality for stability analysis of systems with time-varying delay. IEEE Trans. Autom. Control 2015, 60, 2768–2772. [Google Scholar] [CrossRef]
Figure 1. A typical SDWN architecture with two kinds of propagation latency and external disturbance.
Figure 1. A typical SDWN architecture with two kinds of propagation latency and external disturbance.
Biomimetics 08 00249 g001
Figure 2. Data transmission process with propagation latency in device-to-device paths when utilizing the AIMD adjustment scheme in SDWNs.
Figure 2. Data transmission process with propagation latency in device-to-device paths when utilizing the AIMD adjustment scheme in SDWNs.
Biomimetics 08 00249 g002
Figure 3. Data transmission process with propagation latency in device–controller pairs in SDWNs.
Figure 3. Data transmission process with propagation latency in device–controller pairs in SDWNs.
Biomimetics 08 00249 g003
Figure 4. Channel competition between neighboring forwarding devices in SDWNs.
Figure 4. Channel competition between neighboring forwarding devices in SDWNs.
Biomimetics 08 00249 g004
Figure 5. Bubble-net feeding behavior of humpback whales.
Figure 5. Bubble-net feeding behavior of humpback whales.
Biomimetics 08 00249 g005
Figure 6. A typical SDWN scenario for the numerical simulation.
Figure 6. A typical SDWN scenario for the numerical simulation.
Biomimetics 08 00249 g006
Figure 7. Variation in error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories to represent its variation with two kinds of propagation latencies and external disturbance.
Figure 7. Variation in error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories to represent its variation with two kinds of propagation latencies and external disturbance.
Biomimetics 08 00249 g007
Figure 8. Energy trajectories of the controlled output and the external disturbance under the global robust congestion control scheme.
Figure 8. Energy trajectories of the controlled output and the external disturbance under the global robust congestion control scheme.
Biomimetics 08 00249 g008
Figure 9. Variation in error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories when utilizing the AIMD adjustment scheme.
Figure 9. Variation in error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories when utilizing the AIMD adjustment scheme.
Biomimetics 08 00249 g009
Figure 10. Energy trajectories of the controlled output z ( t ) and the external disturbance w ( t ) when utilizing the AIMD adjustment scheme.
Figure 10. Energy trajectories of the controlled output z ( t ) and the external disturbance w ( t ) when utilizing the AIMD adjustment scheme.
Biomimetics 08 00249 g010
Figure 11. Variation in error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories when utilizing the information-forwarding and control algorithm.
Figure 11. Variation in error state x i ( t ) , i = 1 , 2 , 3 , 4 with two trajectories when utilizing the information-forwarding and control algorithm.
Biomimetics 08 00249 g011
Figure 12. Energy trajectories of the controlled output z ( t ) and the external disturbance w ( t ) when utilizing the information-forwarding and control algorithm.
Figure 12. Energy trajectories of the controlled output z ( t ) and the external disturbance w ( t ) when utilizing the information-forwarding and control algorithm.
Biomimetics 08 00249 g012
Figure 13. Variation comparison of error states x 3 ( t ) between the information-forwarding and control algorithm and our proposed scheme.
Figure 13. Variation comparison of error states x 3 ( t ) between the information-forwarding and control algorithm and our proposed scheme.
Biomimetics 08 00249 g013
Figure 14. Comparison of energy trajectories between the controlled output z ( t ) for the information-forwarding and control algorithm, that of our proposed scheme, and external disturbance w ( t ) .
Figure 14. Comparison of energy trajectories between the controlled output z ( t ) for the information-forwarding and control algorithm, that of our proposed scheme, and external disturbance w ( t ) .
Biomimetics 08 00249 g014
Table 1. The results for the WOA algorithm.
Table 1. The results for the WOA algorithm.
WOA Algorithm
Iteration number60
Consumption time (sec)0.0004972
Table 2. The results for the robust H control schemes.
Table 2. The results for the robust H control schemes.
SchemesCharacteristicsConvergenceEnergy Trajectories
Our proposed robust congestion control schemeTwo kinds of propagation latency and channel competitionConvergence J < 0
AIMD adjustment schemePropagation latency in device-to-device pathsNon-convergence J > 0
Information-forwarding and control algorithmPropagation latency in device-to-device paths and channel competitionNon-convergence J > 0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, X.; Shen, Z.; Xiong, X.; Zhang, S.; Chang, J.; Gao, W. WOA-Based Robust Congestion Control Scheme with Two Kinds of Propagation Latencies and External Disturbance in Software-Defined Wireless Networks. Biomimetics 2023, 8, 249. https://doi.org/10.3390/biomimetics8020249

AMA Style

Hu X, Shen Z, Xiong X, Zhang S, Chang J, Gao W. WOA-Based Robust Congestion Control Scheme with Two Kinds of Propagation Latencies and External Disturbance in Software-Defined Wireless Networks. Biomimetics. 2023; 8(2):249. https://doi.org/10.3390/biomimetics8020249

Chicago/Turabian Style

Hu, Xi, Zhiwei Shen, Xin Xiong, Siqi Zhang, Junming Chang, and Wang Gao. 2023. "WOA-Based Robust Congestion Control Scheme with Two Kinds of Propagation Latencies and External Disturbance in Software-Defined Wireless Networks" Biomimetics 8, no. 2: 249. https://doi.org/10.3390/biomimetics8020249

APA Style

Hu, X., Shen, Z., Xiong, X., Zhang, S., Chang, J., & Gao, W. (2023). WOA-Based Robust Congestion Control Scheme with Two Kinds of Propagation Latencies and External Disturbance in Software-Defined Wireless Networks. Biomimetics, 8(2), 249. https://doi.org/10.3390/biomimetics8020249

Article Metrics

Back to TopTop