Essay PreviewMore ↓
Many researchers have proposed methods with aim to control congestion at router buffers of networks [1, 2, 4, 5, 8, 14, 15, 16], i.e. AQM methods [1, 2, 4, 5, 6, 7, 8, 13, 14, 15, 16]. Each AQM is proposed as a congestion control method that identifies congestion at router buffers in an early stage, which means before the router buffers have overflowed. The most known AQM method is RED , Gentle RED , the Adaptive GRED , Adaptive RED , Random Early Marking (REM) , Dynamic Random Early Drop (DRED)  and some discrete-time queue analytical models [1, 4, 5, 6] which were constructed depending on some of AQM techniques. For example, DRED analytical models which they constructed by analysing two queue nodes  and three queue nodes  based on DRED and using discrete-time queues mechanism . GRED analytical model  and BLUE analytical model  were constructed depending on GRED and BLUE, respectively and utilising discrete-time queues mechanism.
As mentioned previously, RED was proposed as a congestion control method, but RED can degrade the network’s performance due to the following causes: 1) abruptly RED can increase its arrival rate aggressively, thus the RED’s router buffers may overflow. Therefore, every arriving packet will lose. 2) At a particular time, the RED’s congestion measure ( ) value may be below the value of minimum threshold position at the router buffer ( ). This indicates no packet can be dropped. However, for a short time the arrival rate increases and making the router buffer overflowing. Nonetheless, the value increases but still smaller than the value of .
How to Cite this Page
"Computer Networks." 123HelpMe.com. 22 Feb 2020
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- In many countries worldwide businesses and educational institutions make up a large percentage of society. These places need a way of being able to share information and to communicate within the business or school. They also need to be able to share business plans or other information with outside organizations. Computers were originally developed for individual use only. The importance of sharing data forced manufacturers to create techniques for connecting computers and this was the beginning of computer networks.... [tags: Technology, IP, Protocols]
1930 words (5.5 pages)
- Computer networks like internet necessitate network resources, i.e. bandwidth, buffer spaces, etc in order to accommodate the arriving packets at router buffers . When the arriving packets cannot be accommodated due to lack of network resources, this indicates occurring congestion at router buffers of networks . Congestion can deteriorate a network performance [22, 25] through growing the packet loss probability due to overflow as well as the mean waiting time for packets in the queueing network.... [tags: Technology, Network Resources]
962 words (2.7 pages)
- A network is a collection of entities that exchange information or good. Few examples of networks are nervous system, traffic light system, railway system etc. Computer Network is normally known as a system of interconnected computers & communication devices that can communicate with one another and share resources. At the most elementary level computer consist of two computers connected with each other by a cable to allow them to share data .A device connected to a network is called a node. A node may be a device such as a computer, a printer, workstation etc.... [tags: arpanet, protocols, internet]
1144 words (3.3 pages)
- Introduction In the OSI model of computer networking, the data link layer is layer two of seven and corresponds to the host-to-network layer of the TCP/IP reference model. Its main aim is to reliably transfer data between two adjacent machines whilst efficiently detecting and correcting errors in transmission. Packets from the network layer are packed into frames and transferred to the network layer on another machine. Data link layer protocols respond to the network layer and issue requests to the physical layer.... [tags: Computer Science]
1317 words (3.8 pages)
- Computers used in business have become a vital necessity since the late 1980's and since then companies depend on them to get work done more efficient. In this effort to make work flow more efficient companies have started using computer networks to exchange information so their work can be done even more efficient and faster. Though computer networks are good and can exchange information, lots of outside and inside elements of the business can pose a threat to its computer network and it's privacy of information.... [tags: Computers]
1342 words (3.8 pages)
- The Internet and The Development of Computer Networks The Internet is the name for a group of worldwide information resources. These resources are so vast as to be well beyond the comprehension of a single human being. "Not only is there no one who understands all of the Internet, there is no one who even understands most of the Internet" (Harley 2). The Internet is often thought of as a computer network, or sometimes a group of computer networks connected to one another. The computer networks are simply the medium that carries the information.... [tags: Papers]
829 words (2.4 pages)
- Computer Networks Computers by themselves are useful tools. But once they are interconnected, they surge in usefulness and suddenly become media. One computer is connected into a network which is then patched into a network of networks. Computer networks have the potential to break the monopolies of media institutions. With networks, there is a shift from centralized, one-way media to dispersed, infinite-way communication. Every audience member in the world can at the same time be an information provider.... [tags: essays research papers]
1435 words (4.1 pages)
- In today's technological world there are many vulnerabilities to the computer networks. If a malicious attacker exposes these vulnerabilities your business could be interrupted causing you thousands of dollars in damage. Not only could you lose business by your network going down but also by the lack in consumer confidence, and the possible penalties imposed on you by the government for not properly securing your customers vital information. There are several methods or concepts available to the network administrators to help them in securing their networks.... [tags: essays research papers fc]
1512 words (4.3 pages)
- Understanding Computer Networks Each day, students and faculty at State University sit down in front of a PC or UNIX workstation and eagerly check their electronic mail, surf the World Wide Web, or run applications such as word processors and analysis packages. To most users, the magical wire which carries all of this information is nothing more than an electrical construct; two pair of wires twisted together and crimped at the end with phone connectors. Our world today is built on networking in every field from cable television to telephone systems, yet many engineers, old and young alike, have no idea what constructs enable them to communicate seamlessly across the globe.... [tags: Research Papers]
2222 words (6.3 pages)
- Networking Computer Systems A network is a group of two or more computer systems sharing services and interacting in some manner. In most cases, this interaction is accomplished through a shared communication link, with the shared components being data. Put simply, a network is a collection of machines that have been linked both physically and through software components to soothe communication and the sharing of information. To make the communications between two or more computers work, several things need to be in place.... [tags: Computer Networks]
2759 words (7.9 pages)
To deal with the above RED’s problem, GRED was proposed as a variant of RED, in which GRED enhances the way of tuning some of RED’s parameters such as and . Moreover, GRED maintains the value at a level on a router buffer which is between the and positions, this level is named . Maintaining value at level avoids increasing the router buffer size to be above the position, and therefore smaller number of packets is dropped.
Some researchers have proposed fuzzy logic controller (FLC) mechanisms in order to use them as congestion control approaches [10, 11, 12, 17, 27]. A reason for developing these FLC mechanisms is the difficult of developing new AQM mechanisms [20, 27].  proposed a FLC mechanism aims to enhance the BLUE method’s performance . Two input linguistic variables (current queue length and packet loss rate) were utilised to evaluate a single output linguistic variable (packet dropping probability). The performance measure results with reference to queue length, throughput and packet loss rate of the FLC mechanism in  were provided better than those of BLUE method. [10, 11, 12, 17] proposed a FLC mechanism based on RED method which applied in TCP/IP differentiated service networks. In [10, 11, 12, 17], different classes of services are performed as well as different linguistic rules for every class of service. The FLC mechanism depends on two input linguistic variables (current queue length, the change rate in the traffic load), which used to produce a single output linguistic variable (packet dropping probability). [10, 11, 12, 17] were arisen that the FLC mechanism outperformed the RED method in terms of to throughput and the queue size results. In , another FLC mechanism was proposed and called Adaptive Fuzzy RED (AFRED), this mechanism relies upon a single input linguistic variable (current queue length) in order to compute a single output linguistic variable (packet dropping probability). The experimental results have revealed that AFRED mechanism outperformed RED method regarding to the throughput results and in maintaining the queue size as low as potential.
This paper introduces a comparison between three AQM methods (GRED, REDD1 and the Adaptive GRED) with reference to several performance measures ( , , , , ) with aim to identify which method offers more satisfactory performance measure results in cases of occurring of congestion or not. The reason of choosing GRED and REDD1 methods in the comparison is due to these methods were proposed to enhance the RED’s performance. The Adaptive GRED is chosen since it is based on GRED and was proposed to improve the performance of GRED with respect to , and in presenting of congestion, and also the Adaptive GRED enhances the parameter settings of and .
The structure of this paper is as the following: GRED method is introduced in Section 2. Sections 3 and 4 present the FLC method based on RED called REDD1 and the Adaptive GRED, respectively. A simulation details about GRED, REDD1 and the Adaptive GRED methods are highlighted in Section 5. Section 6 demonstrates the simulation results of the performance measure results for GRED, REDD1 and the Adaptive GRED methods. Lastly, paper’s conclusions and future work are given in Section 7.