Congestion avoidance and control
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Computational methods in physics and engineering
Computational methods in physics and engineering
Robust control and H∞ -optimization: tutorial paper
Automatica (Journal of IFAC)
Random early detection gateways for congestion avoidance
IEEE/ACM Transactions on Networking (TON)
Modern control engineering (3rd ed.)
Modern control engineering (3rd ed.)
Dynamics of random early detection
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
A control theoretic approach to active queue management
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Controlled Systems: Theory and Design
Computer Controlled Systems: Theory and Design
The BLUE active queue management algorithms
IEEE/ACM Transactions on Networking (TON)
Multivariable Feedback Control: Analysis and Design
Multivariable Feedback Control: Analysis and Design
A comparison of active queue management algorithms using the OPNET Modeler
IEEE Communications Magazine
Hi-index | 0.00 |
Based on the recently developed feedback control model for theTransport Control Protocol (TCP), this paper has formulatedcontroller design procedures for Active Queue Management (AQM) inInternet Protocol (IP) routers using the H∞ optimal controltheory. The H∞ loop-shaping technique is applied to solve theS/U Mixed Sensitivity Problem (MSP) and S/T/U MSP in the controllerdesign. Different weight functions and their impacts on the systemperformance are evaluated and discussed. The effectiveness of thedesigned controller is verified through OPNET simulations.