Printer Friendly

Performance analysis of telecommunication system with feedforward control mechanism/Telekomunikaciju sistemos, valdomos griztamojo rysio mechanizmo, efektyvumo analize.

Introduction

The goal of this paper is to analyze processes in an Internet node queueing system with local feedforward control. The proposed analysis method based on Moore and Mealy automata is much simpler and universal than Markov processes applied previously by authors to the analysis of such queueing systems [1, 2, 3]. Feedback and feedforward control is typically used in the telecommunication systems which have time varying transmission parameters. A rich literature exists in the area of data packets transmission process control systems. The majority of them analyze the feedback or feedforward control mechanism to regulate variable data packets transmission parameters, to avoid congestion and overdone delay, and to achieve high data transmission link utilization. The new type of the control system over the Internet allows remote monitoring and control of process plants using for control systems feedback and feedforward actions [8]. The feedforward and backward multirate control mechanism for IP transport network is applied to avoid data link congestion and data packet losses [11]. Two stages bit rate control mechanism must achieve that the originating part sends data at the maximum possible rate to the link [11]. Control algorithms to dynamically adjust bit rate of sender are design to guarantee stable performance measures of data transmission network based on continuous or discrete time feedback [9]. A two-level hierarchy is used for the Internet based control systems with two compensators located at the feedback channel that results the multirate control scheme efficiently reduce the effect of Internet time delay [7, 8]. One possible way to solve problem of network congestion and guarantee the quality of service is to use the feedback control mechanism to adapt the sender output bit rate depending on the transmission link state [6, 10]. Implementation of Moore and Mealy automata in of one channel queueing system simulation allows investigation of processes in a complex system such as telecommunication network [5].

The main goal of the paper is to develop an efficient feedforward control method in data transmission network. This type of control is best deployed in control systems design applications where behavior of the controlled variable is well understood and can be measured at the sender site.

The paper is organized as follows. First section introduces some new approaches to feedback and feedforward mechanisms. Internet adaptive sender bit rate control system architecture is presented in second section. The simulation model based on Moore and Mealy automata are described in third. The simulation results are presented and discussed in fourth section. In last section, we present our conclusions.

Internet node architectures with multirate control mechanisms

The IP based network feedback control scheme that uses a feedback channel to relay measurements, taken at the receiver shown on Fig.1. The feedback channel of Internet often is not suitable for real time data transmission, because cannot guarantee availability and stability of end-to-end delay. We propose the feedforward control mechanism without these disadvantages.

[FIGURE 1 OMITTED]

Feedforward control system architecture used to compute the sender output bitrate, matching for the level of buffer occupancy, is shown in Fig. 2. The buffer occupancy level (threshold) depends on sender output bitrate and Internet link transmission bitrate. In our case, adaptive controlled sender output bitrate depends on buffer threshold. We have fixed three buffer occupancy threshold levels and according to them adaptively changed the sender output bitrate. Such local feedforward control mechanism is rather safe and guarantees the reliable data packet transmission process via Internet.

[FIGURE 2 OMITTED]

Simulation model of Internet network node with local feedforward control mechanism using the convolution of Moore and Mealy automata

The Internet network consists of many interconnected nodes. The data transfer rates in nodes varies depending on their load, failures and traffic variation. The originating network stations must select the data transfer rate and send the lost packets repeatedly. So, in practice, TCP algorithms [4] that receive the needed data by feedback control mechanism from terminating station are used.

To avoid considerable data packet loses in network and to guarantee effective transmission link utilization we here propose imitation model which evaluates the possibility to control the data transfer rate based on buffer occupancy level of the originating side.

[FIGURE 3 OMITTED]

Combination of Moore and Mealy automata [5] has been used in creation of system feedforward control model (Fig. 3).

The combination of Moore and Mealy automata (Fig.v4) will be called the convolution of them. The following surjections define the work of this convolution:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (1)

[FIGURE 4 OMITTED]

The implementation of the convolution of the automata is presented in Fig. 5.

[FIGURE 5 OMITTED]

The convolution of the automata begins operating on entering the initial states [w.sub.1] and [z.sub.0]. The virtual servicing system (Fig. 4) is created to imitate the processes in the investigated system (Fig. 3). It is different from the investigated system (Fig. 6), because it is closed and "0-th" component - data sender with infinite number of packets, being in "0-th's" buffer, has been placed in it and it generates the data packets for originating station. The "1st"component is for evaluating the data packets transmission over Internet. The Internet is described as data packets transmission system, consisting of finite capacity buffer and transmission channel. This system sends the data packets to data container (the receiver).

In the imitation model (Fig. 6) the data container is refused as the additional device, and the data are directed by feedback to the end of infinite queue in "0-th" component (therefore, they are not served repeatedly).

[FIGURE 6 OMITTED]

Such task solution allows all processes to interpret like the convolution of the same three Moore and Mealy automata.

Assume that the "0-th" component (data source) contains some data, the "1st" component (the sender) generates the data packets (with three data sending rate adjustment options: 1) to increase the rate, 2) keep the same rate, 3) to decrease the data sending rate) and the "2nd" system component (the receiver) is used to service the packets. The infinite amount of packets wait in the "0th" component, and the packets served in the "1st" and "2nd" components (data transmission channel and receiver) are returned to "0-th" component. If a packet arrives to the "1st" component and finds it busy (because the capacity M of buffer is finite), it will be lost. In the "1st" component the packets are served according data transmission rate and are transited to the "2nd" component. If the buffer of the "2nd" component is filled till buffer threshold [R.sub.1], then sender increases the data packet transmission rate. If the buffer of the "2nd" component is filled between the thresholds [R.sub.1] and [R.sub.2], when the sender keeps the same data sending rate. If the buffer in the "2nd" component approximates to overflow, and the packets are filled from the threshold [R.sub.2] to N (N - the amount of states in the buffer of the "2nd" component), then this device sends a signal to "0-th" component to decrease the data sending rate.

In the investigated system we have an infinite number of data packets all time. Thus, we create a close service system. It unifies the creation of surjections that describe the operation of such system.

([[xi].sub.n.sup.(0)), n [member of] [z.sub.0])--the interarrival times between packets of the sender output flow, ([[xi].sub.n.sup.(0)), n [member of] [z.sub.0])--the data transmission rates, ([[eta].sub.n], n [member of [Z.sub.0])--the data servicing times in the "2nd" channel, ([[[bar.eta].sub.n]], n [member of [Z.sub.0])--the controllable servicing times.

The standard variables [S.sup.(k).sub.n], [t.sub.n] are used for the creation of surjections [4]. The logical unitary Heaviside function is used for description of surjections

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (2)

In the bellow conditions meets the symbol Inf, it means +[infinity].

We introduce the variables for surjections. Let's suppose that n [member of] N. Then:

* [t.sub.n]-"timer" - ([t.sub.0] = 0, 0 < [t.sub.1] < [t.sub.2] < ...)--it defines the time, when any event occurs

[t.sub.n] min {[S.sup.0.sub.n]; [S.sup.(1).sub.n] [S.sup.(2).sub.n]). (3)

* [S.sup.(k).sub.n+1]), k = 0,1,2--the controlled variables, defining the time moment [t.sub.n+1], when the value [t.sub.n] is known, ([S.up.(k).sub.n+1] can be equal:

a) [S.sup.(k).sub.n]) - (0 < [S.sup.(k).sub.n+1]) M + [infinity] shows that the "k->th" component will finish to serve the packets;

b) [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] the ordinary packet is served;

c) Inf - the "k-th" component is free.

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (4)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (5)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (6)

here [+ or -] a + Inf = Inf, Inf - Inf = 0 , when [absolute value of a] < + [infinity].

* [v.sup.(i).sub.n], I = l,2-- the varieties of changes in i-th channel:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (7)

* [z.sup.(i).sub.n], i = 0,1,2 - the number of packets in i-th buffer:

[z.sup.(i).sub.n+1] = inf, (8)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (9)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (10)

* [l.sub.i], i = 0,1,2, - the numbers of packets:

[l.sub.0] = [l.sub.0] + 1 ([S.sup.(0).sub.n] - [t.sub.n]), (11)

[l.sub.1] = [l.sub.1] + 1 ([S.sup.(1).sub.n] - [t.sub.n]), (12)

[l.sub.2] = [l.sub.2] + 1 ([S.sup.(2).sub.n] - [t.sub.n]), (13)

The feedback is described by variable [[bar].eta]

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (14)

* N > [R.sub.2] > [R.sub.1] > 0, [R.sub.1], [R.sub.2] = 1,2, ..., N-1 - the critical values for regimes, [k.sub.1],[k.sub.2],[k.sub.3] [greater than or equal to] 0--the increase (decrease) coefficients of transmission rate.

The surjections will be described using the recursion formulas in such order [f.sub.r], [f.sub.l], [g.sub.l], [g.sub.r].

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (15)

[f.sub.l]([x.sub.n], [z.sub.n-1]) = [y.sub.n], (16)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (17)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (18)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (19)

Let the initial states of automata system are:

[l.sub.0] = 0, [l.sub.1] = 0, [l.sub.2] 0, (20)

[S.sup.(0).sub.0] = 0, [S.sup.(1).sub.0] = Inf, [S.sup.(2).sub.0] = Inf, (21)

[z.sup.(1).sub.0] = 0, [z.sup.(2).sub.0] = 0, n = 0. (22)

([[xi].sup.(1).sub.0], Inf, Inf) = [w.sub.1]. (23)

All characteristics (for instance, the probability defining how long 1 packet (2 packets, 3 packets, etc.) is in the system, the mean queue size; the mean waiting time in the buffer, etc.) may be calculated from the implementation using values (n,[t.sub.n],[z.sub.n]),n =0,1,2, ..., that are calculated by formulas from imitation model (3-23).

Simulation results

The proposed data sending rate control mechanism was modeled in the Mathcad's environment. Its algorithm is given by

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (24)

The data sending rate is selected by multiplying the particular value of [eta] by [k.sub.1], [k.sub.2] or [k.sub.3] coefficients, which are selected by the buffer occupancy level [z.sup.(2).sub.n] according to the buffer thresholds [R.sub.1] and [R.sub.2].

Two cases of data sending rate control were modeled:

1) The value [[eta].sup.*] is constant (for example, it is equal to the mean value of data transmission channel rate).The simulation results are shown in Fig. 7 and Fig. 9;

2) The value [[eta].sup.*] is equal to the [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (the previous

data sending rate is used to select the current data sending rate) The simulation results are shown in Fig. 8, Fig. 10 and Fig. 11.

To evaluate how the feedforward mechanism selects the data sending rate when the data transmission rate in the channel changes, we used the following data channel rate model

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (25)

[FIGURE 7 OMITTED]

[FIGURE 8 OMITTED]

It is obvious, that the closer the selected data sending rate to the data transmission rate of the channel--the better efficiency of the channel's throughput utilization.

In the first case the efficiency was achieved much better (the selected data sending rate matches for the data channel bitrate), because the channel transmission rate changes only to in the fixed 256 kbps and 512 kbps boundaries, which are ideal for the selected [n.sup.*], [k.sub.1],[k.sub.2] and [k.sub.3] values.

The Fig. 9 shows what happens when the 1st case scenario is used, but the selected value [n.sup.*] =1/384 kbps with the coefficients [k.sub.1], [k.sub.2] and [k.sub.3] doesn't match the values 256 kbps and 512 kbps.

[FIGURE 9 OMITTED]

Therefore, in a general case, the adaptive (second) data sending rate control mechanism may prove better.

It is illustrated in the Fig. 10 and Fig. 11 how the selected data sending rate depends on the different values of [k.sub.1],[k.sub.2],[k.sub.3],[R.sub.1][R.sub.2] and N.

[FIGURE 10 OMITTED]

[FIGURE 11 OMITTED]

As can be seen the selection method of optimal data sending rate control values could be chosen as the task for future works, because inappropriate selection of the values decreases the data channel rate usage efficiency significantly.

Conclusion and future work

In this paper, we have made an attempt to explore control theory in designing feedforward adaptive sender output bitrate local control mechanism based on output buffer occupancy level. We argued that the proposed bitrate control mechanism is applicable to Internet technologies--the realization is simpler, data packet transmission is safer in comparison with the classical feedback output bitrate control scheme. We derive local control algorithm too dynamically or determine adjust output bitrate of sender. The system simulation model is implemented using the convolution of Moore and Mealy automata.

The output buffer threshold feedforward control mechanism may be used in the practical real-time data transmission systems to ensure the non-critical packet transmission delay and to optimize the data transmission channel bandwidth usage.

The key component of the proposed feedforward sender output bit rate control mechanism is the way to compute the sender transmission bit rate matching with level of output buffer occupancy.

The focus of our future work is to investigate the two levels feedforward/feedbackward output bit rate control mechanism for multirate control scheme which efficiently reduces the effect of Internet network variable delay for data packets transmission performance measures.

Received 2010 04 17

References

[1.] Rindzevicius R., Tervydis P., Zvironiene A., Navickas Z. Feedback Impact Analysis of Queueing System with Stable States //Proc. 2009 IEEE Fourth International Multi--Conference on Computing in the Global Information Technology (ICCGI.2009).--Cannes, August 2009.-P. 63-68.

[2.] Rindzevicius R., Adlys G. Performance Measures of Data Network Nod with Buffer Threshold Control // Electronics and Electrical Engineering.--Kaunas: Technologija, 2007.--No. 8(80).--P. 29-34.

[3.] Rindzevicius R., Tervydis P. Performance Analysis of an Unreliable Queueing System with buffer Threshold Control and a Reserved Channel // Electronics and Elecrical Engineering.--Kaunas: Technologija, 2009.--No. 2(90).--P. 15-20.

[4.] Tervydis P. Research of Control and Management of Data Transmission over Internet Network. // Electronics and Electrical Engineering. --Kaunas: Technologija, 2006.--No. 5(69).--P. 57-62.

[5.] Zvironiene A., Navickas Z., Rindzevicius R. The expression of the Telecommunication system with an infinite queue by the convolution of Moore and Mealy automata // Proceedings of the 27th International Conference on Information Technology Interfaces.--Croatia, 2005.--P. 669-672.

[6.] Lu X., Morando R. O., El Zarki M. Understanding Video Quality and its use in Feedback Control // The VIP Lab, Dept. of ICS, UC Irvine, CA 92697, 2002.--P. 1-12.

[7.] Bolot J. C., Turletti T. A rate control mechanism for packet video in the Internet //Proceedings of IEEE INFOCOM '94.--Toronto, Canada, June 1994.

[8.] Yang L., Yang S. H. Multirate Control in Internet--Based Control Systems //IEEE Transactions on Systems, Man, and Cybernetics, 2007.--Part C.-No. 37(2).--P. 185-192.

[9.] Hossain M., Harsha M., H., Sirisena R. Adaptive Resource Management in Mobile WirelessNetworks Using Feedback Control Theory // Telecommunication Systems, Kluwer Academic Publishers, 2004.--P. 401-15.

[10.] Floardh O., Johansson K. H., Johansson M. A New Feedback Control Mechanism for Error Correction in Packet-- Switched Networks // Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference.--Seville, Spain, December 2005.--P. 488-493.

[11] Xiong N., He Y., Cao J., Hom H., Lin C. An Efficient Flow Control Algorithm for Multi-rate Multicast Networks // IPOM 2004: 2004 IEEE Workshop on IP Operations and Management proceedings: self-measurement & self-management of IP networks & services.--Beijing, China, 2004.--P. 74-81.

Z. Navickas, A. Zvironiene Department of Applied Mathematics, Kaunas University of Technology, Studentu str. 50-323, LT-51368 Kaunas, Lithuania, e-mails: zenonas.navickas@ktu.lt, ausra.zvironiene@ktu.lt

R. Rindzevicius, P. Tervydis Department of Telecommunications, Kaunas University of Technology, Studentu str. 50-423, LT-51368 Kaunas, Lithuania, e-mails: ramutis.rindzevicius@ktu.lt, paulius.tervydis@ktu.lt
COPYRIGHT 2010 Kaunas University of Technology, Faculty of Telecommunications and Electronics
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2010 Gale, Cengage Learning. All rights reserved.

 
Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:TELECOMMUNICATIONS ENGINEERING/TELEKOMUNIKACIJU INZINERIJA
Author:Navickas, Z.; Zvironiene, A.; Rindzevicius, R.; Tervydis, P.
Publication:Elektronika ir Elektrotechnika
Article Type:Report
Geographic Code:4EXLT
Date:Nov 1, 2010
Words:2898
Previous Article:A Hybrid GA-PSO approach based on similarity for various types of economic dispatch problems/ Hibridinio genetinio algoritmo tyrimas sprendziant...
Next Article:Prediction of electromagnetic waves attenuation due to rain in the localities of Lithuania/Elektromagnetiniu bangu silpnejimo del lietaus ivertinimas...
Topics:

Terms of use | Privacy policy | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters