Optimisation of control parameters for genetic algorithms to test computer networks under realistic traffic loads

  • Authors:
  • J. A. Fernandez-Prieto;J. Canada-Bago;M. A. Gadeo-Martos;Juan R. Velasco

  • Affiliations:
  • Telecommunication Engineering Department, E.P.S. Linares, University of Jaén, Alfonso X El Sabio, 28, 23700 Linares (Jaén), Spain;Telecommunication Engineering Department, E.P.S. Linares, University of Jaén, Alfonso X El Sabio, 28, 23700 Linares (Jaén), Spain;Telecommunication Engineering Department, E.P.S. Linares, University of Jaén, Alfonso X El Sabio, 28, 23700 Linares (Jaén), Spain;Department of Automatic, University of Alcalá, Campus Universitario, 28871 Alcala de Henares (Madrid), Spain

  • Venue:
  • Applied Soft Computing
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Although many studies have focused on testing computer networks under realistic traffic loads by means of genetic algorithms (GAs), little attention has been paid to optimising the parameters of the GAs in this problem. The objective of this work is to design and validate a system that, given some constraints on traffic bandwidth, generates the worst-case traffic for a given computer network and finds the traffic configuration (critical background traffic) that minimises throughput in that computer network. The proposed system is based on a meta-GA, which is combined with an adaptation strategy that finds the optimum values for the GA control parameters and adjusts them to improve the GA's performance. To validate the approach, different comparisons are performed with the goal of assessing the acceptable optimisation power of the proposed system. Moreover, a statistical analysis was conducted to ascertain whether differences between the proposed system and other algorithms are significant. The results demonstrate the effectiveness of the system and prove that, when the background traffic is driven by a GA that uses the parameters obtained from the system, the computer network's performance is much lower than when the traffic is generated by Poisson statistical processes or by other algorithms. This system has identified the worst traffic pattern for the protocol under analysis.