Научная статья на тему 'ADAPTIVE CONTROL OF TRAFFIC FLOWS AND CONGESTIONS IN COMPUTER CORPORATE NETWORKS'

ADAPTIVE CONTROL OF TRAFFIC FLOWS AND CONGESTIONS IN COMPUTER CORPORATE NETWORKS Текст научной статьи по специальности «Медицинские технологии»

CC BY
29
4
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
АДАПТИВНАЯ СИСТЕМА / ФОРМИРОВАНИЕ И РЕГУЛИРОВАНИЕ ТРАФИКА / МАРКЕРНОЕ ВЕДРО / МНОГОСКОРОСТНОЙ ФОРМИРОВАТЕЛЬ / ADAPTIVE SYSTEM / TRAFFIC POLICING AND SHAPING / TOKEN BUCKET / MULTI-RATE FORMING

Аннотация научной статьи по медицинским технологиям, автор научной работы — Kharlay Lyudmyla, Skrypnichenko Andriy, Chang Shu, Toroshanko Yaroslav

The method of the adaptive forming of flows of network traffic and method of tuning of the systems managements with a non-direct feedback with control parameters and structure of shaper is presented. The mathematical models of computer networks, including models of processes of management the flows of traffic, are analysed. The recommendations in relation to the choice of parameters of shapers and control system by them are developed (it’s necessary order of control system, structure of shapers, measuring devices of parameters of packages et cetera) depending on intensity of flows of data, their statistical descriptions and network structure. research of characteristic properties of process is conducted forming of stream, which must be taken into account at the choice of parameters and structure of control system by the multi-rate shaper of traffic with variable parameters of load windows.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «ADAPTIVE CONTROL OF TRAFFIC FLOWS AND CONGESTIONS IN COMPUTER CORPORATE NETWORKS»

ADAPTIVE CONTROL OF TRAFFIC FLOWS AND CONGESTIONS IN COMPUTER

CORPORATE NETWORKS

Lyudmyla Kharlay,

Kiev college of communication Andriy Skrypnichenko,

National Aviation University, aspirant Chang Shu, Ph. D. (Computer Sciences), Northwest University of Politics & Law, People Republic of China

Yaroslav Toroshanko, candidate of science (technic), State University of Telecommunications

АДАПТИВНОЕ УПРАВЛЕНИЕ ПОТОКАМИ ТРАФИКА И СКОПЛЕНИЯМИ В КОМПЬЮТЕРНЫХ КОРПОРАТИВНЫХ СЕТЯХ

Харлай Людмила Алексеевна, Киевский колледж связи, преподаватель

Андрей Анатолиевич Скрипниченко, Национальный авиационный университет

Чжан Шу, кандидат наук, Северо-Западный университет политологии и права, Китайская Народная Республика

Ярослав Иванович Торошанко, кандидат технических наук, Государственный университет телекоммуникаций, г.Киев

АННОТАЦИЯ

Представлен метод адаптивного формирования потоков сетевого трафика и способа настройки структур систем управления с косвенной обратной связью, которые управляют параметрами и структурой формирователя. Математические модели компьютерных сетей, в том числе моделей процессов управления потоками трафика, анализируются. Разработаны рекомендации по выбору параметров формирователей и системы управления ими (необходим порядок системы управления, структура формирователей, измерительных приборов параметров пакетов и т.д.) в зависимости от интенсивности потоков данных, а также их статистических описаний и сети структура. Исследованы характерные свойства процесса формирования потока, который необходимо учитывать при выборе параметров и структуры системы управления многоскоростного формирователя трафика с изменяемыми характеристиками окон загрузки.

ABSTRACT

The method of the adaptive forming of flows of network traffic and method of tuning of the systems managements with a non-direct feedback with control parameters and structure of shaper is presented. The mathematical models of computer networks, including models of processes of management the flows of traffic, are analysed. The recommendations in relation to the choice of parameters of shapers and control system by them are developed (it's necessary order of control system, structure of shapers, measuring devices of parameters of packages et cetera) depending on intensity of flows of data, their statistical descriptions and network structure. Research of characteristic properties of process is conducted forming of stream, which must be taken into account at the choice of parameters and structure of control system by the multi-rate shaper of traffic with variable parameters of load windows.

Ключевые слова: адаптивная система, формирование и регулирование трафика, маркерное ведро, многоскоростной формирователь.

Keywords: adaptive system, traffic policing and shaping, token bucket, multi-rate forming.

I. Introduction

Difference Between Flow Control and Congestion Control and Problem statement

Flow control is a mechanism used in computer networks to control the flow of data between a sender and a receiver, such that a slow receiver will not be outran by a fast sender. Flow control provides methods for the receiver to control the speed of transmission such that the receiver could handle the data transmitted by the sender. Congestion control is a mechanism that controls data flow when congestion actually occurs. It controls data entering in to a network such that the network can handle the traffic within the network.

In the open-loop flow control mechanism, receiver does not send any feedback to the sender and it is the most widely used flow control method. In closed-loop flow control, congestion information is transmitted back to the sender. Commonly used types of flow control are network congestion, windowing flow control and data buffer [1].

Congestion control provides methods to regulate the traffic entering in to a network such that the network itself could manage it. Congestion control prevents a network from reaching a congestive collapse where little or no useful communication is happening due to congestion. Congestion control is implemented in Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport layer protocols.

Although, flow control and congestion control are two network traffic control mechanisms used in computer networks, they have their key differences. Flow control is an end-to-end mechanism that controls the traffic between a sender and a receiver, when a fast sender is transmitting data to a slow receiver. On the other hand, congestion control prevents loss of packets and delay caused due to congestion in the network. Congestion control can be seen as a mechanism that makes sure that an entire network can handle the traffic that is coming to the network. But, flow control refers to mechanisms

used to handle the transmission between a particular sender and a receiver.

We consider the methods of developing combine mechanisms of flow and congestion control using adaptive approach to traffic policing and shaping. This goal is the subject of represented paper.

II. Traffic shaping with using adaptive token bucket concept Foremost, we will give some important definitions [2].

1. The token generator TGE throws down in the bucket of E tokens at a speed of EIR in a second. If a bucket is filled, superfluous tokens are cast aside. Time of filling is

tfE = EBs!EIK

2. The token generator TGC throws down in the bucket of C tokens at a speed of CIR in a second. If a bucket is filled, superfluous tokens are cast aside.

3. Tokens accumulate in the buckets of E and C. General length of temporal interval, occupied by a token in the bucket

t =t +t t

of E, is equal e e ge , where te is duration of token

T

in the bucket of E; ge is duration of protect interval. General length of time interval, occupied by a token in the bucket of C,

t =tt + t t

is equal c c gc, where tc is duration of token in

T

the bucket of C; gc is duration of protect interval.

The number of tokens in the bucket of E is equal, in the

bucket of C equal

n

in the bucket of E is equal

T = n • t

is equal c c

c. Then the general total size of tokens

T = n„ • T

e, in the bucket of C Duration of arriving package will

designate through

Ps

4. Adaptation to the change of length and instantaneous intensity of entering packets can be carried out as follows:

by changing length of token at permanent length of guard interval;

by changing length of protective interval at permanent length of token;

- by changing size of «yellow range» [2,3];

by changing size of data and token buffer memory.

Both in that and in other case of speed of E and C will change to the limits, which depend on the maximal carrying capacity of, interconnect knot.

It's reasonable to adapt to the change to middle intensity of packets by the change of speeds of EIR and CIR. The load metering and packets specification procedures are shown on fig. 1.

We consider traffic shaper with variable speeds CIR and E (Fig. 2). They depend from the speed and acceleration of intensity grows.

IR, Kbps

' ^ t, ms

Fig. 1. Load metering and packets specification in traffic shaper. IR - instant intensity of traffic flow. Green packets - high priority, yellow- middle, red - low (first turn dropping)

Ir, Kbps UK.

ElR(i)

ClR(i)

t,mi

Fig. 2. Load metering and packets specification in traffic shaper with changing size of «yellow range»

A counter counts up the number of packets coming on the entrance of shaper. A store, essentially, is discrete integrator, scalar or vector. Frequency of token generator is regulated depending on the number of the accumulated packets, speed of accumulation (and in theory - and higher derivative). At devastation of token buffer (bucket) the growth of speed can be limited, based the parameters of incoming traffic and potential possibilities of destination node.

E C

Anyway speeds of IR and IR will change to the limits which depend on the maximal carrying capacity of switch node. It's expedient adapting to the change of middle intensity

EC

of packets by the change of the speeds of IR and IR and changing size of «yellow range».

The chart of multivariable adaptive token bucket mechanism is shown on fig. 2 (changing size of «yellow range» isn't shown). M-range integrator with weight coefficients

k = k (t),k2 = k2(t)km = km(t)

1 IV /'2 2W m\ ) estimates

speed, acceleration and higher derivatives of packets flow.

Controlsignals (t -t) , (t -t) , ytg (t -t) regulate size of data and token buffers and frequency of tokens series. Those signals are defined through traffic parameters including instant intensity and kind of statistic distribution (for instance heavy-tail distribution if traffic is self-similar).

In practice it's inappropriate to calculate derivatives of accumulation process higher than 2nd (speed and acceleration) due to quick deterioration of precision of results. So those results will be without effect on resulting efficiency of control process.

Besides the multivariable adaptive mechanisms of traffic shaping have a lot of ranges of freedom in contrast with traditional approaches. As a result we get auxiliary options for storing of arriving traffic and excluding packets loss and reduce the quantity of retransmission.

Data buffer

w

Input requests

Dropping with overload

Control signal ydb(t-T)

Signal counter n(t)

Dropping with overload

Control signal ytb(t-i)

Control device

if

Control signal

ytg(t-^)

Outgo] reques

Dropping with overload

Token buffer

V

out

Controlled

token generator

Fig. 2 The chart of multivariable adaptive token bucket mechanism (changing size of «yellow range» isn't shown)

The transfer efficiency depends not only from quality of adaptation but also from key parameters of network. Let consider these dependences.

III. Functional of Transfer Efficiency The general concept of the main and additional key network functions is that network elements and probes, which are used as service resource instances, are placed at certain nodes of the network infrastructure to pick up performance-related data, e.g. cumulative counters of protocol events. In constant time intervals or in near real time this performance-related data is transferred to higher level service assurance and performance management systems.

As the optimised parameters of task the following are chosen:

transfer delay ^dc;

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

C

- capacity p;

L

- losses of packets p at the data transfer;

D

- security and data protection level sp on network data transfer;

- quality of Web-service;

quality of transmission audio (audio files, plain and IP-telephony);

- speed and reliability of files exchange on the FTP protocol;

- speed and reliability of data transfer through E-mail;

- quality of transmission of video.

Use partial correlation coefficients of optimised parameters

taken from [4] (see Table 1).

Table 1

Parameter

tdc 1,0

Cp 0,98 1,0

Lp S 0,69 0,68 1,0

DSp ie 'o 0,89 0,86 0,69 1,0

Web <D O O 0,75 0,76 0,36 0,77 1,0

Audio ö o ti 0,85 0,64 0,50 0,56 0,30 1,0

FTP 0,27 0,75 0,63 0,61 0,57 0,44 1,0

E-mail o O 0,17 0,22 0,34 0,78 0,30 0,36 0,16 1,0

Video 0,87 0,89 0,84 0,82 0,53 0,67 0,79 0,30 1,0

X Cp Lp DSp Web Audio FTP E-mail Video

Current transfer delay is one of the most important parameters of quality of service. It is clear from data in Table 1 that all another key performance indicators have large correlation with it. So the problem of optimisation of transfer delay in general and its components, especially jitter, is rather urgent. Let's consider the components of transfer delay.

Current delay is measured as difference between moment

of sending and moment of receiving acknowledge tack:

tdc tack

Ai

t

s. We include such notations: <5,

pd and pd - time and standard deviation of packet delivery respectively;

- A ack and ^ack - time and standard deviation of wait of acknowledge respectively.

tdc = At„, + At

Then

pd ack

At„d *Ata.ck, Vid

ack

In general pd ack' pd Let the time of wait of current acknowledge (time-out) is

t

to . The total delay of delivery is random value with average

= 2 2 y/2

tdc j • f ^ total = I ® pd + ® ack ) T ,

dc and variation v ' . In order to

take in consideration the influence of variation of turn time we

use coefficient of variation ^tt ^totalftdc .

Besides we use normalized coefficient of losses

k _ Ntotal

N,

N N ,-N

y rec _ 1 — y total y n

total

N

total

, where Ntotal

N..

systems approach is needed. The criteria of optimisation of key parameters of functioning of network and current management by a network are ambiguous and contradictory. The account of these contradictions and search of compromise decisions is possible at the use of statistical methods, concordance of authenticity and detailed of basic data with physical sense of the decided tasks.

The processes of the key parameters change, from one side, are substantially non-stationary, and, with other are the tendencies of their changes are very similar. Therefore there is research of descriptions of their stochastic intercommunication of interest. This interest has not only theoretical but also practical character. As basic descriptions of stochastic intercommunication the coefficient of plural correlation and multiple step-by-step regression is used [5].

Optimal value of timeout is the functional of parameters

t

dc

t

ack

k

and

k

Vto _

components of vector symbol of transposition):

which can be represented as T

Atpd Atack K kl

(T is

to _ y

to

Atpd Atack

ktt kl

K tto ^ tdc

(1)

Strictly speaking we come to problem of vector

t

dc

t

ack

k

is total number of transmitted packets, rec is number of successfully received packets. Now define the structure of functional for optimal choice of timeout value.

For the decision of tasks of current management by networks

optimisation. However it is clear that k

and l are mutually independent random values. So we can replace the vector optimisation by weighted scalar

v = a At , + a At , + ak„ + a.k,

sum 1 pd 2 ack 3 tt 4 l, where

a i = 14

i are weighting coefficients choosing from

practical considerations [1]:

to a1 Atpd + a2Atack + a3 K + a4 K )

^ min, t. > t

dc

T

to

Fig. 3 shows the variations of normalized time-out 1norm

k

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

in dependence of turn time for different values 11.

Analysing the results of optimisation we come to conclusion

that the problem of current real-time optimisation of key parameters in independent network segment or in network in general is actually the adaptation problem [6] or, in wide sense, problem of (network) control.

0.75

0.5

0.25

0 5

—♦—ktt=0.01

10 - ktt=0.1

15

20

dc

-ktt=0.05 -*-ktt=0.5

Fig.3. Variations of normalised time-out

Conclusion

Proposed procedure of traffic shaping is rather simple and efficient. The results of modeling shows that it is possible to limit the frequency of token generator till such value, when all input traffic would been received and then transferred without losses and retransmissions. The impacts oa relative frequency of token generator is rather short and quickly decreased. Overload cancellation is achieved in small time, so load swings are comparative small as well. Though both the overloads and losses of traffic controllability may have place if the duration of bursts overcomes the reserve of dynamic stability of shaper. For example if the main and additional buffers are filled in the period higher than acceptable time-out this route or network segment in general become inaccessible. Such situations have to process with the utilities of transport or higher layers.

Variations of normalized time-out are rather smooth because of averaging of turn time on the interval of observing. With increase variation of turn time resulting time-out grows quickly. So permanent control of parameters and state of network for prevention deterioration of delay of delivery and jitter is urgent problem.

References

1. A.S.Tanenbaum, Computer Networks, 5th Ed./ Andrew S. Tanenbaum, David J. Wetherall. - Prentice Hall, Cloth, 2011. - 960 pp.

2. Chang Shu, Nick A. Vinogradov. The Method of Adaptive Shaping of the Traffic Flows of Calculating Networks // Proceedings the Fourth Congress "Aviation in the XXI Century", (Safety in Aviation and Space Technologies), V.1, Kiev, National aviation university, 2010, Sept. 21 - 23. - PP. 18.13 - 18.16.

3. Chang Shu. Adaptive control traffic rate by multivariable regulating token shaper // Scientific Notes of Ukrainian Scientific and Research Institute of Telecommunications, Nr 6 (34), 2014. - pp. 43 - 48.

4. Andriy Skripnichenko. Control of Quality of Service in High-Speed Computer Networks // Proc. of Int'l Conf. «Computer Science & Information Ttchnokogies" (CSIT'2013), 14-16 Oct. 2013, Lviv, Ukraine. - 2 PP.

5. A.A. Afifi, Statistical Analysis: A computer Oriented Approach. - 2nd ed. / A.A. Afifi, S.P. Azen. - Academic Press, New York, San Francisco, London, 1979. - 442 pp.

6. B. Widrow, Adaptive Signal Processing / Bernard Widrow, Peter N. Stearns. - Prentice-Hall, Inc. Englewood Cliffs, N.J., 1985. - 528 pp.

t

0

i Надоели баннеры? Вы всегда можете отключить рекламу.