CN103095602A - Network congestion control method based on quasi-Newton algorithm - Google Patents

Network congestion control method based on quasi-Newton algorithm Download PDF

Info

Publication number
CN103095602A
CN103095602A CN2012105936112A CN201210593611A CN103095602A CN 103095602 A CN103095602 A CN 103095602A CN 2012105936112 A CN2012105936112 A CN 2012105936112A CN 201210593611 A CN201210593611 A CN 201210593611A CN 103095602 A CN103095602 A CN 103095602A
Authority
CN
China
Prior art keywords
sigma
link
algorithm
user side
newton
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012105936112A
Other languages
Chinese (zh)
Inventor
唐美芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ludong University
Original Assignee
Ludong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ludong University filed Critical Ludong University
Priority to CN2012105936112A priority Critical patent/CN103095602A/en
Publication of CN103095602A publication Critical patent/CN103095602A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a network congestion control method and belongs to the technical field of computer communication. The network congestion control method mainly comprises control methods of a user terminal s and a link l, wherein the control methods are based on quasi-Newton algorithm. The user terminal s includes the following steps: (1) updating time t, the user terminal s receives responded transmission delay to substitute a prior transmission delay; (2) updating time t every time, the user terminal s decides a new rate according to a current path and uses the new rate to transmit under next update; (3) updating time t, the user terminal s transmits a current source rate. The link l control method includes the following steps: (1) updating time t, the link l receives all the transmission rates transmitted from the user terminal through the link l, and the link l uses the currently-received rate to substitute the prior rate; (2) updating time t every time, the link l calculates gl (t) and adjusting the transmission delay through the following formula: y1(t+1)=[y1(t)-muHk1(t) gl(t)]+gl(t), wherein y1 represents gradient direction, mu represents constant coefficient>=0, and Hkl(t) is a relevant matrix; (3) updating time t, the link l exchanges the current transmission delay to the user terminal.

Description

A kind of method for controlling network congestion based on intending Newton's algorithm
Technical field
The present invention relates to method for controlling network congestion, belong to the computer communication technology field.
Background technology
In recent years, along with the extensive use of network and the fast development of information technology, network size, user and application sharply increase, and network is just experiencing increasing packet loss and other mis-behave problem, and wherein network congestion problem is particularly serious.The basic reason that network congestion produces is that the user offers the load of network greater than Internet resources and network throughput, a little less than the immediate cause of congested generation had memory space inadequate, bandwidth capacity deficiency, processor disposal ability, it showed as degradation under Packet Delay increase, losing probability increase, upper layer application systematic function.The hot issue that research has become current network research is controlled in network congestion.The important directions that research is controlled in network congestion is to set up to adapt with network for the characteristics of network to comprise the Mathematical Modeling of various network parameters, and Mathematical Modeling is found the solution and according to the result of finding the solution, the network of reality carried out congestion control.A kind of good Mathematical Modeling can not only well be described the network congestion problem, and can bring convenience for improvement and the design of the algorithm relevant to congestion control.Therefore, method for controlling network congestion a difficult point be improvement and the design of the algorithm relevant to congestion control, and the improvement of the algorithm relevant to congestion control and design are depended on and the adapt foundation of the Mathematical Modeling that comprises various network parameters of network to a great extent.
To this, Kelly has proposed Network Optimization Model, and Low has done further research on this basis, has proposed network utility and has maximized model.Its basic thought is that in network, each source user has separately utility function, how to find the solution the peaked problem of whole network system utility function under the limited condition of the network bandwidth.At present, this model has been widely used in the research fields such as network rate allocation algorithm, internet congestion control protocol, network cross-layer optimizing, and becomes current study hotspot.Control the algorithm of model for network congestion, now proposed the methods such as gradient project algorithms, sub-gradient algorithm and quasi-Newton method both at home and abroad, document has proposed the gradient project algorithms based on end of link; For the not twice differentiable situation of utility function, existing document has proposed sub-gradient algorithm, and has analyzed its convergence; Compare gradient projection method based on the Newton-Like algorithm and have the advantages such as fast convergence rate and Quadratic Termination, also have document to propose the Newton-Like algorithm.These congestion avoidance algorithms between convergence rate, user fairness and the throughput of system aspect also have some problems.
Summary of the invention
Below provide the general introduction of simplification, for aspects more described herein provide basic understanding.This general introduction is not the exhaustive overview of theme required for protection, the scope of not attempting to identify the key/indispensable element of theme required for protection yet or describing theme required for protection.Its unique purpose is to provide in simplified form some concept, as the preamble of more specifically describing that provides after a while.
The object of the present invention is to provide a kind of can guarantee the fairness between the user can improve simultaneously again throughput of system based on the method for controlling network congestion of intending Newton's algorithm.
Along with the fast development of Internet, congestion control is one of most critical factor of guaranteeing the Internet robustness.For the congestion problems in current network, the present invention proposes based on the network congestion of optimum theory and control the fairness model.Variable-metric method combines the advantage of gradient method, Newton method and keeps away and abandon their shortcomings separately, only need to calculate the single order partial derivative, need not to calculate second-order partial differential coefficient and inverse matrix thereof, the initial point of target function is selected all without being strict with, fast convergence rate, the present invention will intend Newton's algorithm and is applied to the new model that proposes and carried out the convergence analysis.Simulation result shows that algorithm that the present invention carries has good convergence, has guaranteed the fairness between the user.
Consider S the network user share a network that comprises the L communication link (S={1 wherein, 2 ..., s}, L={1,2 ..., l}).Suppose c lBe the finite bandwidth of link l, and the transmission rate of hypothesis user s is x sAnd satisfy m s≤ x s≤ M s, m wherein sAnd M sBe respectively minimum value and the maximum of user's transmission rate, define a utility function U s(x s) be user's transmission rate x sFunction, the performance of expression user side s.Now to utility function U s(x s) do following hypothesis:
(1) for x s∈ I s, I wherein s=[m s, M s], utility function U s(x s) be that strict recessed secondary can little increasing function on the domain of definition, and feasible in order to guarantee, and the l ∈ L for all satisfies condition
Figure BDA00002692768400021
C wherein lBe link l total capacity.
(2) at I sOn, U s(x s) curvature range be from 0 to I s, to all x s∈ I s, have - U s ′ ′ ( x s ) ≥ 1 / a ‾ s > 0 ,
Figure BDA00002692768400023
For greater than zero constant.
The target that model is controlled in existing network congestion based on optimum theory is to choose suitable transmission rate x=(x s, s ∈ S), make all user performances reach maximum.In order further to keep the fairness of network, the present invention is further improved above-mentioned model, to the utility function U of each user side s(x s) introducing weights ω s, guarantee the different priority of user, thereby not only guaranteed the fairness of whole network but also guaranteed the maximization of user performance.Concrete model is as follows:
Max Σ s ω s U s ( x s )
Σ s x s ≤ c l , l = 1,2 , . . . , L - - - ( 1 )
m s≤x s≤M s
Known by hypothesis, target function is continuous strictly concave function, and feasible set is for compacting, so there is unique optimal solution in above-mentioned optimization problem.But the constraints from following formula can find out, finding the solution the problems referred to above needs all users to know each other information, and obviously, this is impracticable in real network.We wish that each user side can be found the solution separately with each link under the condition of not losing the network global optimality, namely strive for that each user the situation lower network overall performance that reaches satisfied reaches optimum, thereby the key of solution is to find the solution its dual problem.
Method for controlling network congestion based on intending Newton's algorithm of the present invention comprises following user side s based on the plan Newton's algorithm, the concrete control method of link l
User side s control method is as follows
The first step: update time t, user side s receives the propagation delay time that feeds back, the propagation delay time before replacing with it;
The below further derives the dual form of model proposed by the invention.
Particular content is: at first by the definition Lagrangian:
L ( x , y ) = Σ s ω s U s ( x s ) - Σ l y l ( Σ s x s - c l )
= Σ s ( ω s U s ( x s ) - x s Σ l y l ) + Σ l y l c l
Wherein, y l(y l〉=0) be the upper corresponding Lagrange multiplier of link l, and the throughput of carving link l for time t.
Because
max Σ s ( ω s U s ( x s ) - x s Σ l y l )
= Σ s max ( ω s U s ( x s ) - x s Σ l y l )
Therefore the dual function of former problem is:
D ( y ) = max L ( x , y ) = Σ s A s ( y s ) + Σ l y l c l
s.t.m s≤x s≤M s
A wherein s(y s)=max ω sU s(x s)-x sy s(2)
y s = Σ l y l
Therefore the dual form of former problem is
D : min y ≥ 0 D ( y ) - - - ( 3 )
The second step of user side control method: in each update time of t, the path estimation value that user side s is current according to it
Figure BDA00002692768400044
Select a new speed
Figure BDA00002692768400045
Then with this speed rates until next update;
Particular content is: because Lagrangian is decomposable, so the target function D (y) of dual problem can be broken down into S independently subproblem find the solution respectively.Again because the constraints in former problem is linear, so the antithesis ditch is zero, and necessarily has dual optimal solution x s(y *).And x s(y *) but through type (2) calculates, the Kuhn-Tucker theorem according to classical in Optimum Theory is got by single order necessity condition:
x s ( y ) = [ ( ω s U s ′ ( y ) ) - 1 ] m s M s
Wherein, [ ( ω s U s ′ ( y ) ) - 1 ] m s M s = min { max { ( ω s U s ′ ( y ) ) - 1 , } m s , M s } , sU s') -1Expression ω sU s' contrary, wherein to put forward implication with the front identical for each letter.
The user side control method the 3rd the step: update time t, user side s passes on present rate;
Link l control method is as follows
For the derivation algorithm of link l, existing document has proposed the correlation techniques such as Projected Gradient, sub-gradient algorithm and quasi-Newton method.From the overall situation, intending Newton's algorithm is to solve the most effective class algorithm in unconstrained optimization method, and it has convergence rate faster, and this algorithm has Quadratic Termination.Therefore, the present invention will solve the new model that proposes with intending Newton's algorithm.Intending Newton's algorithm is to be based upon on the basis of Newton method, to use matrix H kThe second dervative that replaces iteration function, and needn't calculate the Hessian matrix, when making H kRegularly positive, the direction that algorithm produces is descent direction, and algorithm is as follows:.
The first step of chainlink control method: update time t, link l obtains the speed that user side transmits, the speed before replacing with the transmission rate that receives recently;
The second step of chainlink control method: at each update time of t, link l calculates sub-gradient direction g l(t) and adjust its propagation delay time by following formula:
y l(t+1)=[y l(t)-μH kl(t)g l(t)] +
g l(t) represent sub-gradient direction, μ is the constant coefficient greater than zero, H kl(t) be corresponding matrix.
Concrete steps are as follows:
If D (y) is continuously differentiable, target function is asked local derviation:
g l ( t ) = ∂ D ∂ y l ( y ) = c l - Σ s x s ( y )
In real network, utility function is general function, does not usually possess two subdifferentiabilities, at this moment, and g l(t) be taken as sub-gradient direction.At each update time of t, link l calculates g l(t), and by following formula adjust its unit propagation delay time:
y l(t+1)=[y l(t)-μH kl(t)gl(t)] +
Wherein, H kl(t) with
Figure BDA00002692768400052
The pass be:
[ ▿ 2 D ( y ( t ) ) ] ll = - Σ s ∈ S ( l ) ∂ x s ∂ y l ( y ( t ) )
= - Σ s ∈ S ( l ) x ′ ( y l s ( t ) )
≈ - Σ s ∈ S ( l ) x s ( t ) - x s ( t - 1 ) y s ( t ) - y s ( t - 1 )
≈ - Σ s ∈ S ( l ) x s ( t ) - x s ( t - 1 ) y l ( t ) - y l ( t - 1 )
x ^ l ( t ) - x ^ l ( t - 1 ) y l ( t ) - y l ( t - 1 )
Figure BDA00002692768400058
Wherein,
Figure BDA00002692768400061
Total source speed, y l(t) be the throughput that time t carves link l.
The 3rd step of chainlink control method: update time t, link l is to the current propagation delay time of user side exchange.
Compared with the prior art, the present invention has the following advantages:
1. the present invention is based on optimum theory and proposed more to be applicable to actual network congestion control fairness new model, added weights in model, guarantee the fairness of system;
2. found the solution new model with the plan Newton's algorithm, and respectively can be little with regard to the utility function secondary and two kinds of situation analysis of non-differentiability this convergence.Can find out that by analyzing us the fairness of algorithm is good.
3. simulation result shows, algorithm that the present invention carries can converge to optimal value faster, has good convergence, and has guaranteed the fairness of system.
The present invention proposes based on the network congestion of optimum theory and control the fairness model, it is closer to the real network model, the end subscriber shared network bandwidth resources in network, and guarantee the fairness of network with different weights.
For addressing relevant purpose before reaching, unite the following description and drawings herein some illustrative aspects of theme required for protection is described.But several in the variety of way of each principle that can use theme required for protection only indicated in these aspects, and all aspects and equivalence techniques scheme thereof attempted to comprise in this claimed theme.When considered in conjunction with the accompanying drawings,
Other advantage and novel feature will become apparent from the following specifically describes.
Description of drawings
Fig. 1: 3 users' network topology structure schematic diagram;
Fig. 2: system's convergence graph picture of 3 users;
Fig. 3: do not add temporary 3 users' system optimal speed;
Fig. 4: add temporary 3 users' system optimal speed;
Fig. 5: 9 users' network topology structure schematic diagram;
Fig. 6: system's convergence graph picture of 9 users;
Fig. 7: do not add temporary 9 users' system optimal speed;
Fig. 8: add temporary 9 users' system optimal speed;
Embodiment
Referring to accompanying drawing, provide the specific embodiment of the present invention, be used for formation of the present invention is further illustrated.
Embodiment 1
The method for controlling network congestion based on the plan Newton's algorithm of the present embodiment comprises following user side s based on the plan Newton's algorithm, the concrete control method of link l
User side s control method comprises the following steps
(1) update time t, user side s receives the propagation delay time that feeds back, the propagation delay time before replacing with it;
(2) in each update time of t, the path estimation value that user side s is current according to it
Figure BDA00002692768400071
Select a new speed
Figure BDA00002692768400072
Then with this speed rates until next update;
(3) update time t, user side s transmits present rate;
The detailed process of system model is:
Utility function U to each user side s(x s) introducing weights ω sThereby, not only having guaranteed the fairness of whole network but also guaranteed the maximization of user side s performance, concrete model is as follows:
Max Σ s ω s U s ( x s )
Σ s x s ≤ c l , l = 1,2 , . . . , L - - - ( 1 ) .
m s≤x s≤M s
The dual form of said system model:
Now define Lagrangian:
L ( x , y ) = Σ s ω s U s ( x s ) - Σ l y l ( Σ s x s - c l )
= Σ s ( ω s U s ( x s ) - x s Σ l y l ) + Σ l y l c l
Wherein, y l(y l〉=0) be the upper corresponding Lagrange multiplier of link l.
Because
max Σ s ( ω s U s ( x s ) - x s Σ l y l )
= Σ s max ( ω s U s ( x s ) - x s Σ l y l )
Therefore dual function is:
D ( y ) = max L ( x , y ) = Σ s A s ( y s ) + Σ l y l c l
s.t.m s≤x s≤M s
Wherein
A s(y s)=maxω sU s(x s)-x sy s (2)
y s = Σ l y l
Therefore dual form is
D : min y ≥ 0 D ( y ) - - - ( 3 ) .
Link l control method comprises the following steps
(1) update time t, link l receives from the transmission rate of all user sides by link l transmission, the speed before replacing with recently received speed;
(2) at each update time of t, link l calculates g l(t) and adjust its propagation delay time by following formula:
y l(t+1)=[y l(t)-μH kl(t)g l(t)] +
g l(t) represent sub-gradient direction, μ is the constant coefficient greater than zero, H kl(t) be corresponding matrix.
(3) update time t, link l is to the current propagation delay time of user side exchange.
Provide the present invention and put forward the convergence theorem.
Theorem: suppose B 0A preliminary positive definite matrix, y 0It is an initial point.Following hypothesis is arranged:
(1) D (y): R n→ R 1Continuously differentiable
(2) Ω={ y ∈ R n| D (y)≤D (y 0) increase progressively, and have constant m and M, satisfy
m‖z‖ 2≤z TG(y)z≤M‖z‖ 2
{ x so sConverge to y *, { x wherein sIt is the optimal solution that BFGS produces.
Proof:
m ( t ) = q ( t ) T p ( t ) p ( t ) T p ( t ) , M ( t ) = q ( t ) T q ( t ) q ( t ) T p ( t ) - - - ( 5 )
Can obtain:
m(t)≥m,M(t)≤M (6)
According to (4) formula, take to follow the tracks of operation,
Trace ( B ( t + 1 ) )
= Trace ( B ( t ) ) - | | B ( t ) p ( t ) | | 2 p ( t ) T B ( k ) p ( t ) + | | q ( t ) | | 2 q ( t ) T p ( t ) - - - ( 7 )
det ( B ( t + 1 ) ) = det ( B ( t ) ) q ( t ) T p ( t ) p ( t ) T B ( t ) p ( t ) - - - ( 8 )
If
cos θ ( t ) = p ( t ) T B ( t ) p ( t ) | | p ( t ) | | | | B ( t ) p ( t ) | | (9)
s ( t ) = p ( t ) T B ( t ) p ( t ) p ( t ) T p ( t )
θ (t) represents the angle between p (t) and B (t) p (t), therefore, can release
| | B ( t ) p ( t ) | | 2 p ( t ) T B ( k ) p ( t )
= | | B ( t ) p ( t ) | | 2 | | p ( t ) | | 2 ( p ( t ) T B ( k ) p ( t ) ) 2 p ( t ) T B ( k ) p ( t ) | | p ( t ) | | 2 - - - ( 10 )
= s ( t ) cos 2 θ ( t )
Can be obtained by (6) and (8) formula
det ( B ( t + 1 ) )
= det ( B ( t ) ) q ( t ) T p ( t ) p ( t ) T p ( t ) p ( t ) T B ( t ) p ( t ) p ( t ) T p ( t ) - - - ( 11 )
= det ( B ( t ) ) m ( t ) s ( t )
If
ψ(B)=Trace(B)-ln(det(B)) (12)
According to (7)-(11), can obtain
ψ ( B ( t + 1 ) )
= Trace ( B ( t + 1 ) ) - ln ( det ( B ( t + 1 ) ) )
= Trace ( B ( t ) ) + M ( t ) - s ( t ) cos 2 θ ( t )
- ln ( det ( B ( t ) ) ) - ln m ( t ) + ln s ( t )
= ψ ( B ( t ) ) + ( M ( t ) - ln m ( t ) - 1 ) +
[ 1 - s ( t ) cos 2 θ ( t ) + ln s ( t ) cos 2 θ ( t ) ] + ln cos 2 θ ( t )
According to formula (5), the formula above repeatedly adopting can obtain
0 < &psi; ( B ( t + 1 ) ) &le; &psi; ( B 0 ) + ct + &Sigma; j = 1 t ln cos 2 &theta; ( j ) - - - ( 13 )
Wherein, c=M-lnm-1>0.
Got by general inaccuracy line search convergence theorem:
‖g(t)‖cosθ(t)→0
In order to prove
Figure BDA00002692768400102
We first prove and have sequence { t jSatisfied { cos θ j} 〉=δ>0.
Suppose cos θ j→ 0, therefore, there is t 0>0, for j>t 0Satisfy
lncos 2θ j<-2c
According to (13), we can derive,
0 < &psi; ( B 0 ) + ct + &Sigma; j = 1 t 0 ln cos 2 &theta; ( j ) + &Sigma; j = t 0 + 1 t ( - 2 c ) t>t 0
= &psi; ( B 0 ) + &Sigma; j = 1 t 0 ln cos 2 &theta; ( j ) + 2 t 0 c - tc
The first of above-mentioned formula and third part are that positive definite is limited, and second portion is negative definite.The 4th part is negative definite also, and t → ∞ hypothesis is false.Show and have { t jSatisfied { cos θ j} 〉=δ>0.Therefore
li min f t &RightArrow; &infin; | | g ( t ) | | = 0
Top formula represents { y (t) } → y *Theorem is set up.
In the present embodiment, we carry out emulation experiment, and checking the present invention carries the BFGS algorithm complexity, considers respectively 3 users and 9 users' situation.Intending Newton method with projection and gradient in algorithm compares.
Number of users is the situation of 3
We adopt network topology structure shown in Figure 1, and this network has 2 connections and 3 users.
Fig. 2 has provided total effectiveness under algorithm that the present invention puies forward, and as can be seen from the figure, algorithm that the present invention carries reaches convergence fast than gradient algorithm and the more effective algorithm that makes of plan Newton's algorithm.
Fairness is to estimate the important indicator of an algorithm quality, and it has determined under the identical network resources supplIes, the occupy situation of user to Internet resources.Fig. 3,4 have provided respectively source speed in the situation of system's not weighting of weighted sum for three users, as can be seen from the figure, by weighting can fine assurance user fairness.
Number of users is the situation of 9
In order further to verify algorithm complexity of the present invention, we consider larger system, as shown in Figure 5,7 connections and 9 users are arranged.
As can be seen from Figure 6, algorithm that the present invention carries still has good convergence
Fig. 7 and 8 is the optimal rate of system user, as can be seen from Figure 7, exists a speed to be almost 0 user.The speed that can guarantee the user by weighting is comparatively average, as shown in Figure 8, thus the fairness of the system of assurance.
Foregoing comprises some examples of theme required for protection.Certainly, each combination that can conceive of describing each assembly and method for the purpose of describing theme required for protection is impossible, but one skilled in the art will recognize that, many other combination and conversion are possible.Thus, theme required for protection is intended to comprise this type of change, modification and the variant within all spirit and scope that fall into appended claims.In addition, describe in detail or claims in use on the meaning that term " comprises ", this term intention is inclusive as term " comprises ", explains when being used as the transition word as " comprising " in claims.

Claims (4)

1. the method for controlling network congestion based on the plan Newton's algorithm, is characterized in that, comprises following user side s based on the plan Newton's algorithm, the control method of link l; Wherein
User side s control method comprises the following steps
(1) update time t, user side s receives the propagation delay time that feeds back, the propagation delay time before replacing with it;
(2) in each update time of t, the path estimation value that user side s is current according to it
Figure FDA00002692768300011
Determine a new speed
Figure FDA00002692768300012
Then with this speed rates until next update;
(3) update time t, user side s transmits current source speed;
Link l control method comprises the following steps
(1) update time t, link l receives all from user side transmission rates by link l transmission, the speed before link l replaces with recently received speed;
(2) at each update time of t, link l calculates g l(t) and adjust its propagation delay time by following formula:
y l(t+1)=[y l(t)-μH kl(t)g l(t)] +
g l(t) represent sub-gradient direction, μ is the constant coefficient greater than zero, H kl(t) be corresponding matrix.
(3) update time t, link l is to the current propagation delay time of user side exchange.
2. according to the described method for controlling network congestion based on intending Newton's algorithm of claim 1, it is characterized in that,
Utility function U to each user side s(x s) introducing weights ω s, concrete system model is as follows
Max &Sigma; s &omega; s U s ( x s )
&Sigma; s x s &le; c l , l = 1,2 , . . . , L - - - ( 1 ) .
m s≤x s≤M s
3. according to the described method for controlling network congestion based on intending Newton's algorithm of claim 2, it is characterized in that the dual form of said system model:
The definition Lagrangian:
L ( x , y ) = &Sigma; s &omega; s U s ( x s ) - &Sigma; l y l ( &Sigma; s x s - c l )
= &Sigma; s ( &omega; s U s ( x s ) - x s &Sigma; l y l ) + &Sigma; l y l c l
Wherein, y l(y l〉=0) be the upper corresponding Lagrange multiplier of link l
Because
max &Sigma; s ( &omega; s U s ( x s ) - x s &Sigma; l y l )
= &Sigma; s max ( &omega; s U s ( x s ) - x s &Sigma; l y l )
Therefore dual function is:
D ( y ) = max L ( x , y ) = &Sigma; s A s ( y s ) + &Sigma; l y l c l
s.t.m s≤x s≤M s
Wherein
A s(y s)=maxω sU s(x s)-x sy s (2)
y s = &Sigma; l y l
Therefore dual form is
D : min y &GreaterEqual; 0 D ( y ) - - - ( 3 ) .
4. according to claim 1 or 2 or 3 described method for controlling network congestion based on intending Newton's algorithm, it is characterized in that
Intending Newton's algorithm is to be based upon on the basis of Newton method, to use matrix H kThe second dervative that replaces iteration function, and needn't calculate the Hessian matrix, when making H kRegularly positive, the direction that algorithm produces is descent direction.
CN2012105936112A 2013-02-02 2013-02-02 Network congestion control method based on quasi-Newton algorithm Pending CN103095602A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012105936112A CN103095602A (en) 2013-02-02 2013-02-02 Network congestion control method based on quasi-Newton algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012105936112A CN103095602A (en) 2013-02-02 2013-02-02 Network congestion control method based on quasi-Newton algorithm

Publications (1)

Publication Number Publication Date
CN103095602A true CN103095602A (en) 2013-05-08

Family

ID=48207754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012105936112A Pending CN103095602A (en) 2013-02-02 2013-02-02 Network congestion control method based on quasi-Newton algorithm

Country Status (1)

Country Link
CN (1) CN103095602A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005336A (en) * 2007-01-19 2007-07-25 北京航空航天大学 Adpative jam control method and system suitable for satellite network
CN101459933A (en) * 2009-01-04 2009-06-17 北京航空航天大学 Congestion control method
CN102546436A (en) * 2012-02-20 2012-07-04 南京邮电大学 Method for improving friendly rate control protocol in satellite network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005336A (en) * 2007-01-19 2007-07-25 北京航空航天大学 Adpative jam control method and system suitable for satellite network
CN101459933A (en) * 2009-01-04 2009-06-17 北京航空航天大学 Congestion control method
CN102546436A (en) * 2012-02-20 2012-07-04 南京邮电大学 Method for improving friendly rate control protocol in satellite network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
唐美芹等: "基于拟牛顿方法的异步拥塞控制算法", 《计算机工程》, vol. 36, no. 14, 31 July 2010 (2010-07-31), pages 7 - 9 *
彭立宏等: "基于价格的拥塞控制模型扩展", 《计算机工程与科学》, vol. 33, no. 2, 31 December 2011 (2011-12-31), pages 7 - 11 *

Similar Documents

Publication Publication Date Title
CN105812369A (en) Traceable anonymous authentication method based on elliptic curve
CN108880814A (en) A kind of dynamic cluster wireless sensor network key management method
CN112737770B (en) Network bidirectional authentication and key agreement method and device based on PUF
CN109756877B (en) Quantum-resistant rapid authentication and data transmission method for massive NB-IoT (NB-IoT) equipment
CN104469836A (en) Method for building multi-dimension trust model in underwater sensor network
CN105657700A (en) Wireless anti-eavesdropping communication method based on cooperation of multiple source nodes
CN109347829A (en) A kind of intelligent perception network true value discovery method based on secret protection
CN104780052A (en) Network device group authentication method in software-defined network
CN104883702A (en) Wireless sensor network gateway optimization deployment method
CN109495908A (en) It is a kind of based on the wireless network optimized approach with super low-power consumption Internet of Things wireless fusion of LTE
CN104009824B (en) Pilot aided data fusion method based on differential evolution in a kind of base station collaboration up-line system
CN104507153A (en) Small cell power control method under OFDMA (orthogonal frequency division multiple-access)
CN106571913A (en) Two-party authentication key negotiation method for power wireless private network
CN103209453A (en) Trust routing algorithm of wireless sensor network based on topological structure
CN108347761A (en) Power distribution method in CRN and its application in wisdom traffic network
CN107743302A (en) Rate-allocation and route combined optimization algorithm in wireless sensor network based on compressed sensing
CN106790099A (en) Charge network survivability Measurement Method based on network survivability entropy
CN103095602A (en) Network congestion control method based on quasi-Newton algorithm
CN104320772A (en) Trust degree and physical distance based D2D (Device to Device) communication node clustering method and device
CN110839244A (en) Credible data collection method based on node trust value virtual force
Zhao et al. Convergence study of decentralized min-cost subgraph algorithms for multicast in coded networks
CN106027567A (en) Distributed spectrum sensing method and device by utilizing sensing data falsification attack signature
CN114172742B (en) Hierarchical authentication method for electric power Internet of things terminal equipment based on node map and edge authentication
CN114928835A (en) Dynamic wireless sensor network construction method based on block chain and secret key management
CN109996218B (en) Resource allocation method for improving wireless transmission safety performance of Internet of vehicles

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130508