12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

110 <strong>Wireless</strong> <strong>Ad</strong> <strong>Hoc</strong> <strong>and</strong> <strong>Sensor</strong> <strong>Networks</strong>marking, rather than dropping packets, as indication of congestion at endnodes (Floyd 2001). However, many of the problems (Items 1,2,4, <strong>and</strong> 5in the previous list) still remain.Congestion control mechanisms in today’s Internet already representone of the largest deployed artificial feedback systems; a protocol shouldbe implemented, in a decentralized way — using sources <strong>and</strong> links, <strong>and</strong>which satisfies some basic objectives, such as high network utilization inequilibrium <strong>and</strong> local stability for arbitrary delays, capacities, <strong>and</strong> routing(Low et al. 2002). Under the assumption that queuing delays will eventuallybecome small, relative to propagation delays, stability results for afluid-flow model of end-to-end Internet congestion control is derived inJohari <strong>and</strong> Tan (2001). The choice of congestion control mechanism isconstrained to adjust the sending rate on a timescale fixed by the propagationdelay. The end users are naturally placed to implement a controlscheme that acts on the timescale of the end-to-end propagation delay,<strong>and</strong> thus, one might hope for a stable, distributed end-to-end congestioncontrol algorithm.Another approach, outlined in Floyd <strong>and</strong> Fall (1999), is for routers tosupport the continued use of end-to-end congestion control as the primarymechanism for best-effort traffic to share scarce b<strong>and</strong>width, <strong>and</strong> to deployincentives for its continued use. These incentives would be in the form ofrouter mechanisms to restrict the b<strong>and</strong>width of best-effort flows, using adisproportionate share of the b<strong>and</strong>width, in times of congestion. Thesemechanisms would give a concrete incentive to end users, applicationdevelopers, <strong>and</strong> protocol designers to use end-to-end congestion controlfor best-effort traffic. More recently, there is a surge in the developmentof novel end-to-end congestion control schemes (Jagannathan <strong>and</strong> Talluri2002, Ch<strong>and</strong>rayana et al. 2002, Bansal <strong>and</strong> Balakrishnan 2001, Borri <strong>and</strong>Merani 2004, Kuzmanovic <strong>and</strong> Knightly 2004, Sastry <strong>and</strong> Lam 2005), suchas binomial congestion control (Bansal <strong>and</strong> Balakrishnan 2001), TCPfriendly schemes (Borri <strong>and</strong> Merani 2004), <strong>and</strong> CYRF (Sastry <strong>and</strong> Lam2005), to overcome the limitations of TCP-based networking protocols.However, it was shown through simulation studies in Ch<strong>and</strong>rayana et al.(2002) that AIMD-based schemes still outperform TCP-compliant binomialschemes for congestion control in a wide range of networking environments.In contrast to ATM networks where hop-by-hop typecongestion control is utilized (Section 3.3), end-to-end congestion controlis discussed for the Internet.This chapter presents a new rate-based end-to-end control scheme fromPeng et al. 2006 to overcome some of the problems of the existing Internetcongestion (Bansal <strong>and</strong> Balakrishnan 2001, Borri <strong>and</strong> Merani 2004). Thenovelty of the scheme is its distributed network modeling based on nonlinearsystem theory, using which, the performance <strong>and</strong> stability of thescheme can be mathematically analyzed <strong>and</strong> established. The proposed

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!