Congestion avoidance and control
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Connections with multiple congested gateways in packet-switched networks part 1: one-way traffic
ACM SIGCOMM Computer Communication Review
TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
Optimization flow control—I: basic algorithm and convergence
IEEE/ACM Transactions on Networking (TON)
Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
A control theoretic approach to active queue management
Computer Networks: The International Journal of Computer and Telecommunications Networking
Understanding TCP Vegas: a duality model
Journal of the ACM (JACM)
Linear stability of TCP/RED and a scalable control
Computer Networks: The International Journal of Computer and Telecommunications Networking
A theoretical study of internet congestion control: equilibrium and dynamics
A theoretical study of internet congestion control: equilibrium and dynamics
Congestion Control in the Internet: Inspiration from Balanced Food Chains in the Nature
Journal of Network and Systems Management
Nature-Inspired Congestion Control: Using a Realistic Predator-Prey Model
IWINAC '07 Proceedings of the 2nd international work-conference on The Interplay Between Natural and Artificial Computation, Part I: Bio-inspired Modeling of Cognitive Tasks
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part II
Hi-index | 0.00 |
we propose that bio-inspired algorithms are best developed and analyzed in the context of a multidisciplinary conceptual framework that provides for sophisticated biological models and well founded analytical principles. we outline such a framework here, in the context of bio-inspired congestion control (BICC) models, and discuss mathematical techniques for analyzing the state dynamics of BICC. We finally discuss a case study, and show that the interaction of those Internet entities that involved in congestion control mechanisms is similar to predator-prey interaction. Hence, we map the predator-prey approach to the Internet congestion control mechanism. The simulation results show that using appropriately defined parameters, this model leads to a stable, fair and high-performance congestion control algorithm.