A novel queue-aware wireless link adaptation mechanism and its fixed-point analytical model
- Onur Ozturk^{1}Email author and
- Nail Akar^{1}
https://doi.org/10.1186/s13638-015-0469-0
© Ozturk and Akar. 2015
Received: 21 February 2015
Accepted: 19 October 2015
Published: 23 November 2015
Abstract
A point-to-point (PTP) wireless link is studied that carries long-lived TCP flows and is controlled with active queue management (AQM). A cross-layer queue-aware adaptive modulation and coding (AMC)-based link adaptation (LA) mechanism is proposed for this wireless link to improve the TCP-level throughput relative to the case where AMC decisions are made based solely on the physical layer (PHY) parameters. The proposed simple-to-implement LA mechanism involves the use of an aggressive modulation and coding scheme (MCS) with high spectral efficiency and high block error rates when the queue occupancy exceeds a certain threshold, but otherwise a relatively conservative MCS with lower spectral efficiency and lower block error rates. A fixed-point analytical model is proposed to obtain the aggregate TCP throughput attained at this wireless link and the model is validated by ns-3 simulations. Numerical experimentation with the proposed analytical model applied to an IEEE 802.16-based wireless link demonstrates the effectiveness of the proposed queue-aware LA (QAWLA) mechanism in a wide variety of scenarios including cases where the channel information is imperfect. The impact of the choice of the queue occupancy threshold of QAWLA is extensively studied with respect to the choice of AQM parameters in order to provide engineering guidelines for the provisioning of the wireless link.
Keywords
1 Introduction
Along with the User Datagram Protocol (UDP) whose use has gained momentum with emerging multimedia and P2P applications, the Transmission Control Protocol (TCP) has been one of the most widely used transport protocols for most Internet services such as Web browsing, file transfer, remote login, and recently for video streaming [1–3]. Buffer management for routers carrying TCP traffic is generally based on active queue management (AQM) mechanisms which drop packets before the routers’ queues become full [4–8]. With AQM, large queuing delays that could adversely affect the TCP-level throughput are avoided. Moreover, the drop decision is made probabilistically to mitigate flow synchronization problems (also known as the lock-out problem) described in [4]. We refer to [9] for a survey of AQM in both wireline and wireless contexts. In wireless router links, non-congestion (or wireless) losses arise due to channel errors in addition to congestion losses caused by AQM drops. TCP suffers from wireless losses since it responds to all losses by triggering congestion avoidance algorithms which results in reduced performance on paths with lossy links [10].
While AQM focuses on buffer management addressing the “full-queues” and “lock-out” problems, link adaptation (LA) refers to mechanisms that match the modulation, coding, and other signal and protocol parameters to the conditions on the wireless link [11]. In existing wireless communication standards, a finite set of collection of physical layer (PHY) parameters, called modulation and coding schemes (MCSs) is defined. Each MCS in this set is then associated with an index m∈{0,1,…,M−1} with M being the cardinality of this set. An MCS is then used for transmission of an atomic transmission unit, called a block at the PHY. Throughout the paper, we assume that MCSs are indexed such that the MCS with the largest index, i.e., m=M−1, is the most aggressive MCS in the set with the highest spectral efficiency and highest block error rates. On the other hand, the MCS with the smallest index, i.e., m=0, is the most conservative MCS in the same set with the lowest spectral efficiency and again with the lowest block error rates. Typically, one of the key LA mechanisms known as adaptive modulation and coding (AMC) is employed in existing wireless communication standards to choose the best possible MCS as a function of varying channel conditions on the basis of channel state information (CSI) which is representative of the instantaneous condition of the wireless link [12, 13]. This optimization problem is involved in maximizing the spectral efficiency of the wireless link under certain block error rate constraints. When these constraints are driven by performance requirements of higher layer applications like multimedia [14], Web browsing, and bulk-data transfer [15], the LA problem requires cross-layer handling. Impact of packet loss and delay incurred by queuing at the data link layer is another research topic for cross-layer analysis [16], which is also studied in [17] for TCP traffic.
In this paper, we study a wireless bottleneck link for a number of long-lived TCP traffic flows with AQM buffer management and AMC-based link adaptation, the interplay between these two components being the main topic of study of this paper, with the goal of potentially increasing the total TCP throughput. TCP-Reno has been the most widely implemented TCP variant [18, 19] which we study in this paper. The following information on TCP-Reno is based on the references [20] and [21]. The sender of a TCP-Reno connection declares a packet to be lost either upon a timeout expiry for its acknowledgment (ACK) packet sent by the TCP receiver or upon the reception of three duplicate acknowledgments (DUPACKs) for a preceding packet. The latter case occurs when three out-of-order packets arrive at the receiver which consequently signals the missing packets via DUPACKs. Upon expiration of a timeout, the sender reduces its congestion window (CW) which represents the collection of packets that are allowed to be transmitted back to back without having to wait for their corresponding ACKs, down to the size of a single packet. DUPACKs are reacted more gently than timeouts by most TCP variants considering the network to be on the verge of congestion. As an example, TCP-Reno triggers a fast retransmit mechanism to retransmit the missing packet reported by the DUPACKs and halves its CW. If an ACK is received in return, then the transmission continues where it is left off; otherwise, the same procedure regarding the timeout condition is executed. After a timeout, TCP-Reno enters into a state called “slow start” at which the CW is incremented by one for each received ACK. In slow start, the CW doubles every round-trip time (RTT) until a threshold is reached at which a transition to another state called “congestion avoidance” occurs. In the congestion avoidance state, the CW is approximately incremented at each RTT yielding a linear inflation until either another packet loss is experienced or the advertised TCP receive window (RW) limit is reached at the TCP receiver. The RW is essential for the sender in order not to overwhelm the receiver. In addition to TCP-Reno, there are other more recent variants of TCP such as TCP-Vegas, TCP-Compound, and TCP-CUBIC, the latter two designed for networks with large bandwidth-delay product and are currently in use in Windows and Linux operating systems, respectively, [18, 22–24]. However, the exploration of TCP variants other than TCP-Reno is left outside the scope of this paper throughout which TCP-Reno and TCP are used interchangeably unless otherwise stated.
An aggressive MCS with high block error rates may lead to high packet error rates (PERs) which in turn throttles back the TCP sources as discussed above, potentially leading to a queue with a high service rate but which is occasionally empty. PHY resources would be wasted in this situation when the queue is empty. On the other hand, conservative MCSs result in low PER leading to a situation with non-empty queues but with lower service rates. In this paper, we focus on PER-based LA which attempts to maintain a desired operational PER value by taking the estimated PER and attempting to reduce the gap between the two [25]. A PER-based AMC mechanism driven solely by the PHY parameters, referred to as a traffic-agnostic link adaptation (TAGLA) in this paper and also in [26], may lead to one of the two abovementioned undesirable situations. Target PER of such schemes can only be optimized if the system parameters of interest are precisely known, e.g., the number of contending TCP flows and their RTTs, in addition to the PHY parameters [26, 27]. However, estimation of such system parameters is highly difficult in practice [28]. As a remedy, we propose the framework of dual-regime wireless link (DRWL) for which the queue occupancy level is taken into consideration in the process of MCS selection, as opposed to using other system parameters that are hard to estimate. Specifically, we use a conservative (aggressive) MCS when the queue occupancy is below (above) a certain threshold in DRWL. Reducing the probability of “empty queues” and hence the link being under-utilized by TCP sources because of wireless packet losses is the rationale behind DRWL. We view DRWL as a general framework which does not produce a unique policy but instead comprises a set of policies out of which we propose one particular subset of policies called queue-aware link adaptation (QAWLA) in our numerical examples. Actually, the QAWLA policy attempts to maintain two particular per-regime PER values and therefore belongs to the DRWL framework.
Queue-awareness has been extensively studied in the context of wireless scheduling in multi-user wireless communication systems [29–32]. Energy efficiency is another subject of wireless communications systems for which queue-awareness allows joint control of the transmission power and rate for given QoS constraints [33–36]. Assuming an error-free point-to-point (PTP) link operating at the channel capacity, the reference [37] devises an optimal power control scheme called joint queue length aware (JQLA) power control for a set of QoS constraints comprising packet drop probability (which occurs due to finite buffer length), maximum delay, and the arrival rate. In a simulation-based study, the authors propose a distributed traffic-aware power control algorithm for multi-hop IEEE 802.11 wireless networks adapting transmission rates to satisfy the network-wide traffic demand [38]. For a fixed signal-to-interference-plus-noise ratio (SINR) level, however, a single MCS satisfying a pre-determined bit error rate (BER) is chosen. By disseminating the so-called “virtual buffers” throughout the nodes of a hybrid wired and code division multiple access (CDMA) wireless cellular network with a distributed algorithm, joint transmission power and rate optimization is formulated as a network utility maximization problem which can be solved by the congestion control algorithms of TCP [39]. The so-called jointly optimal congestion control and power control (JOCP) algorithm outlined in the reference [40], on the other hand, iteratively updates the transmission power of each node in a multi-hop wireless network by sharing weighted queuing delay information in a distributed manner assuming TCP-Vegas to be the source of the generated traffic. Convergence of JOCP, however, is not guaranteed for TCP-Reno whose congestion control relies on packet losses rather than delays as with TCP-Vegas. Finally, the presented AMC scheme in the reference [41] for an interference-limited two-hop relay network chooses an MCS based on both the current SINR level and the number of available packets in the transmission queue of the relay node, whichever suggests the minimum, but does not take into account any higher layer traffic such as TCP. To the best of our knowledge, this is the first study employing queue-awareness in AMC decisions to specifically improve TCP-Reno throughput performance.
An analytical expression, known as the “PFTK” formula, is already available for the packet sending rate of a long-lived TCP flow as a function of its packet loss rate and RTT [42]. The PFTK formula takes into account both the fast retransmit mechanism of TCP-Reno and the effect of TCP timeout on packet sending rate. Using a fixed-point model, the PFTK formula has been successfully used to approximate the throughput of a long-lived TCP flow, sharing an AQM-controlled wireline link, or feeding into a network of AQM-controlled wireline links along with other long-lived TCP flows [43]. Making use of the well-established PFTK formula, we propose in this paper a fixed-point model of a single AQM-controlled wireless link with AMC decisions being based on the DRWL framework. Our modeling work is substantially different than [43] due to the special behavior at the boundary between the two regimes of interest. In [43], the queue service rate is fixed for all queue occupancies. However, in the current study, not only the queue service rate but also the wireless packet error rate depends on the queue occupancy in a piece-wise continuous manner with a discontinuity at a single boundary point. Such discontinuities lead to scenarios where the boundary point may become the steady-state fluid limit and the conventional fixed-point model of [43] falls short of modeling discontinuous queue service rates and wireless packet loss rates. For such scenarios, we propose an extended fixed-point analytical model to model TCP throughput in AQM-controlled wireless links in the current study. The proposed fixed-point analytical model has a computational complexity low enough to enable the exploration of the multi-dimensional problem space spanned by the number of TCP flows, the number of MCSs, and varying signal-to-noise ratio (SNR) levels, which would not be feasible with a study based solely on simulations. However, ns-3 simulations are carried out for a subset of scenarios to validate the proposed model. Existence and uniqueness conditions are presented for the solution of the fixed-point analytical model. Using the findings of the stochastic model, we show that robust TCP-level throughput improvement over TAGLA is attainable by QAWLA in a wide variety of scenarios. We use the same PFTK TCP formula, AQM scheme, and the set of MCSs with the work [26] presenting an analysis of TAGLA and replicate the related content in the current paper for the sake of completeness. Hybrid ARQ (HARQ)/ARQ techniques for which the blocks/packets get to be retransmitted upon loss at the link layer are not considered in this paper and are left for future study.
The paper is organized as follows. In Section 2, we present the general DRWL framework along with the presumed assumptions and the particular QAWLA mechanism we propose for link adaptation. Section 3 presents the fixed-point model for the DRWL framework. In Section 4, traffic and wireless link scenarios used in the numerical experiments are described. Section 5 addresses the validation of the proposed fixed-point model using extensive ns-3 simulations. In Section 6, we provide numerical examples to validate the effectiveness of the proposed QAWLA scheme. We conclude in the final section.
2 Dual-regime wireless link
The wireless link is assumed to carry N long-lived TCP-Reno flows using first-in-first-out (FIFO) scheduling with a common packet size L. Each flow i,i∈{0,1,…,N−1}, is assumed to have a fixed (yet arbitrary) RTT denoted by R T T _{0,i }, taking into account the propagation delays of all links on the path of the flow i. We assume all flows are bottlenecked at this wireless link and packet losses on other links are assumed to be negligible. We therefore do not attempt to model networks of AQM router links but rather focus on a single AQM bottleneck link in this study. Queuing and transmission delays as well as the error rates of the TCP ACK packets are assumed to be negligibly small and will be ignored by the analytical model assuming TCP ACK prioritization to be employed and enhanced wireless protection to be established at the reverse path of the flows [46, 47].
For link adaptation purposes, we introduce in this paper a threshold B and subsequently partition the queue of the wireless link into two different regimes, namely \(\mathcal {R}_{1}=[0,B)\) and \(\mathcal {R}_{2}=(B,2th_{\text {max}})\) along with the boundary \(\mathcal {B} = \{ B \}\). The queue is served with a transmission rate r _{1} (r _{2}) with a wireless PER denoted by P E R _{1} (P E R _{2}) when the buffer occupancy x resides in regime \(\mathcal {R}_{1}\) (\(\mathcal {R}_{2}\)) such that r _{1}≤r _{2} and P E R _{1}≤P E R _{2}. In the abovementioned definition, the strict inequality case is definitely more interesting but we let DRWL to be more general by allowing equalities. We present an overlaid illustration of the proposed DRWL and the GRED AQM scheme in Fig. 1. This DRWL can be generalized to a multi-regime scenario by further partitioning the queue into more than two regimes, but we limit our scope only to DRWL in this paper. The DRWL framework consists of a set of queue-aware link adaptation mechanisms out of which we propose a particular subset of policies next. For this purpose, we consider M different candidate PHY MCSs denoted by m c s _{ m } where m∈{0,1,…,M−1} that are supported by the wireless link’s air interface. When a packet gets to be transmitted, we use a dedicated MCS at each regime, namely M C S _{1} and M C S _{2}, when the queue length at the epoch of packet transmission resides in \(\mathcal {R}_{1}\) and \(\mathcal {R}_{2}\), respectively. If the queue occupancy resides at \(\mathcal {B}\), either M C S _{1} or M C S _{2} can be used. When M C S _{ j } equals m c s _{ m } for regime j, j∈{1,2}, and for SNR level s n r _{ s }, s∈{0,1,…,S−1}, packets are transmitted with a bit rate of r _{ j }=g _{ m } and errored at the receiver with a probability denoted by P E R _{ j }=p e r _{ m,s } where g _{ m } is the bit rate of m c s _{ m } seen by the link layer and p e r _{ m,s } is the PER when m c s _{ m } is used at SNR level s n r _{ s }.
In this paper, we propose a particular DRWL mechanism denoted by QAWLA(t h _{ PER }, H, B) in terms of three parameters t h _{ PER }, H, and B. In this PER-based LA mechanism, the MCS with the highest spectral efficiency whose resulting PER denoted by p e r _{ m,s } is such that p e r _{ m,s }<t h _{ PER } for a threshold parameter t h _{ PER } at a particular SNR level s n r _{ s }, is chosen for regime \(\mathcal {R}_{2}\). MCS decision for \(\mathcal {R}_{1}\) is given in the same manner with \(\mathcal {R}_{2}\), but with a lower threshold t h _{ PER }/H for some H≥1. It is clear that QAWLA(t h _{ PER }, H, B) belongs to the DRWL framework for the entire range of its parameter set. For the particular QAWLA mechanism with H=1, we have M C S _{1}=M C S _{2} irrespective of the queue occupancy at the same channel conditions and is therefore referred to as TAGLA(t h _{ PER }), i.e., traffic agnostic link adaptation. In the next section, we develop a fixed-point analytical model of the generic DRWL by means of which we evaluate the performance of the specific QAWLA scheme to be used in the numerical examples.
3 Fixed-point analytical model of DRWL
which is the main identity we refer to in this paper that needs to be satisfied at the steady-state. Next, we present the proof for existence and uniqueness of a solution to DRWL in Theorems 3.1 and 3.2, for both \(\mathcal {R}_{j}, j \in \{1,2\}\) and \(\mathcal {B}\), respectively.
Theorem 3.1.
There exists a unique solution x ^{⋆} to the dual-regime queue provided that r _{1}<r _{2}, P E R _{1}<P E R _{2}, \(\kappa (2th_{\max },\alpha) < r_{2}\) and q(x) is an MND continuous function of x.
Proof 1.
The condition \(\kappa (2th_{\max },\alpha) < r_{2}\) guarantees that full-queue never occurs. It is clear that the identity \(G(2th_{\max },\alpha) > 1-q(2th_{\max }) = 0\) holds. Since the function 1−q(x) is monotonically non-increasing and continuous, G(x,α) is monotonically increasing in x given that r _{1}<r _{2} and P E R _{1}<P E R _{2}; either G(x ^{⋆},α ^{⋆})=1−q(x ^{⋆}) for some (x ^{⋆},α ^{⋆}) where \(x^{\star } \in (0, 2th_{\max }]\) and α ^{⋆}∈[0,1]; or G(0,α)>1−q(0)=1 for x ^{⋆}=0 must be satisfied. Uniqueness of x ^{⋆} follows from G(x,α) being monotonically increasing and 1−q(x) being monotonically non-increasing.
Theorem 3.2.
Provided r _{1}<r _{2} and P E R _{1}<P E R _{2}, the solution to the dual-regime queue is unique in α when x ^{⋆}=B.
Proof 2.
Note that G(B,α) is monotonically increasing in α at x=B. Let (B,α ^{⋆}) be a solution, then for any \(\alpha ^{\prime } \neq \alpha ^{\star }\), \(G(B,\alpha ^{\prime }) \neq G(B,\alpha ^{\star })=1-q(B)\), which concludes the proof.
We also outline an algorithm to numerically solve the dual-regime queue in Algorithm 1. Once the solution is assured to reside in either of the two regimes \(\mathcal {R}_{1}\) or \(\mathcal {R}_{2}\), or at the boundary \(\mathcal {B}\), then a binary search is performed for the unknowns x ^{⋆} and α ^{⋆}, respectively, in the corresponding domain. We note that the case of r _{1}=r _{2} and P E R _{1}=P E R _{2} can also be solved by Algorithm 1.
4 Wireless link and traffic scenarios
Modulation and coding schemes of IEEE 802.16 used in the numerical examples
m | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
---|---|---|---|---|---|---|---|---|
V _{ m } | 4 | 4 | 16 | 16 | 64 | 64 | 64 | 64 |
R _{ m } | 1/2 | 3/4 | 1/2 | 3/4 | 1/2 | 2/3 | 3/4 | 5/6 |
k _{ m } (bytes) | 60 | 54 | 60 | 54 | 54 | 48 | 54 | 60 |
The time division duplex (TDD) mode as specified by WiMAX [58] uses 35 downlink (DL) OFDM symbols with 768 data sub-carriers per symbol for a channel bandwidth of 10 MHz [50] and a TDD frame duration of 5 ms, resulting in an average PHY rate of c=5.376 10^{6} sub-carriers/s. The raw bit rate c _{ m } of the IEEE 802.16 Wireless-MAN OFDMA PHY air interface can then be calculated in bps as \(c_{m} = c \: \log _{2}(V_{m}) R_{m}\). The padding inefficiency caused by the need for FEC block alignment of packets reduces the raw bit rate down to the link layer bit rate g _{ m }=c _{ m } L/(k _{ m }⌈L/k _{ m }⌉) for MCS m c s _{ m }. Note that MCSs in Table 1 are ordered based on their raw bit rates. These eight different MCSs lead to \(\frac {8*7}{2} - 1 = 27\) possible DRWL policies which satisfy the condition r _{1}<r _{2} and P E R _{1}<P E R _{2}, excluding in particular the dual-regime policy (M C S _{1},M C S _{2})=(m c s _{3},m c s _{4}) having the same link layer bit rate (i.e., g _{3}=g _{4}) but with interchanging PER performances for the AWGN and the ITU-A channels. Taking into consideration the remaining policies for which r _{1}=r _{2} and P E R _{1}=P E R _{2}, an overall of 27+8=35 distinct policies are studied in the numerical examples. In order to account for framing and processing delays of the system, D _{ F } is set to 2.5 ms.
We construct traffic scenarios spanning a wide range of N and R T T _{0,i } values. In particular, we study two groups of traffic scenarios having fixed and uniformly spaced R T T _{0,i } values denoted by S F _{ N,F } and S U _{ N,F }, respectively, where F denotes the average value of R T T _{0,i } of the corresponding scenario. In scenario S F _{ N,F }, there are N long-lived TCP flows, and all flows have the same R T T _{0,i } of F ms. On the other hand, in scenario S U _{ N,F }, there are again N flows but each with a different R T T _{0,i }=2(i+1)F/(N+1) leading to an average fixed RTT of F ms. Wired RTTs of TCP connections in a 3G network is reported to vary from a few milliseconds to a few hundreds of milliseconds [59]. In line with this observation, we vary F from 1 ms to 100 ms particularly choosing F∈{1,5,10,20,40,60,80,100} ms. Because of the distribution of individual R T T _{0,i } values for the scenario group S U _{ N,F }, the resulting actual RTT values cover a wider range than the interval between the minimum and maximum values chosen for F. We set the maximum value of N to 16 as in the reference [60] for the wireless backbone topology studied therein and let N∈{1,2,4,8,16}. Note that scenarios represented by S F _{1,F } and S U _{1,F } are identical, thus leading to an overall of 72 unique traffic scenarios.
5 Validation of the analytical model
The list of 18 traffic scenarios indexed with idx used for validation of the fixed-point analytical model proposed for DRWL for the ITU-A channel model
idx | Traffic scenario | SNR (dB) | M C S _{1} | M C S _{2} | r _{1} (Mbps) | r _{2} (Mbps) | P E R _{1} | P E R _{2} |
---|---|---|---|---|---|---|---|---|
1 | S U _{1,1} | 22 | m c s _{1} | m c s _{3} | 8 | 16 | 7.19 10^{−4} | 1.55 10^{−1} |
2 | S U _{1,1} | 26 | m c s _{4} | m c s _{5} | 16 | 21 | 2.04 10^{−3} | 1.00 10^{−1} |
3 | S U _{1,1} | 30 | m c s _{4} | m c s _{5} | 16 | 21 | 2.24 10^{−5} | 2.39 10^{−3} |
4 | S U _{1,40} | 22 | m c s _{0} | m c s _{1} | 5.376 | 8 | 0 | 7.19 10^{−4} |
5 | S U _{1,40} | 26 | m c s _{0} | m c s _{1} | 5.376 | 8 | 0 | 8.40 10^{−6} |
6 | S U _{1,40} | 30 | m c s _{0} | m c s _{7} | 5.376 | 26.88 | 0 | 1.12 10^{−1} |
7 | S U _{4,1} | 22 | m c s _{1} | m c s _{2} | 8 | 10.752 | 7.19 10^{−4} | 9.85 10^{−4} |
8 | S U _{4,1} | 26 | m c s _{2} | m c s _{5} | 10.752 | 21 | 1.00 10^{−5} | 1.00 10^{−1} |
9 | S U _{4,1} | 30 | m c s _{5} | m c s _{7} | 21 | 26.88 | 2.39 10^{−3} | 1.12 10^{−1} |
10 | S U _{4,40} | 22 | m c s _{1} | m c s _{2} | 8 | 10.752 | 7.19 10^{−4} | 9.85 10^{−4} |
11 | S U _{4,40} | 26 | m c s _{3} | m c s _{6} | 16 | 24 | 4.62 10^{−3} | 2.95 10^{−1} |
12 | S U _{4,40} | 30 | m c s _{3} | m c s _{7} | 16 | 26.88 | 5.32 10^{−5} | 1.12 10^{−1} |
13 | S U _{16,1} | 22 | m c s _{2} | m c s _{4} | 10.752 | 16 | 9.85 10^{−4} | 9.32 10^{−2} |
14 | S U _{16,1} | 26 | m c s _{2} | m c s _{6} | 10.752 | 24 | 1.00 10^{−5} | 2.95 10^{−1} |
15 | S U _{16,1} | 30 | m c s _{2} | m c s _{6} | 10.752 | 24 | 0 | 1.33 10^{−2} |
16 | S U _{16,40} | 22 | m c s _{1} | m c s _{4} | 8 | 16 | 7.19 10^{−4} | 9.32 10^{−2} |
17 | S U _{16,40} | 26 | m c s _{3} | m c s _{5} | 16 | 21 | 4.62 10^{−3} | 1.00 10^{−1} |
18 | S U _{16,40} | 30 | m c s _{3} | m c s _{5} | 16 | 21 | 5.32 10^{−5} | 2.39 10^{−3} |
Aggregate TCP throughput T obtained with ns-3 simulations and the fixed-point analytical model for B=10. Results for ns-3 simulations are presented with the 99 % confidence intervals
idx | T (ns3) | T (analysis) | Solution | x ^{⋆} | α ^{⋆} |
---|---|---|---|---|---|
(Mbps) | (Mbps) | domain | (packets) | ||
1 | 7.7536 ± 0.0535 | 8.0208 | \(\mathcal {B}\) | 10.0000 | 4.81 10^{−3} |
2 | 13.2888 ± 0.4525 | 15.9673 | \(\mathcal {R}_{1}\) | 3.9049 | N/A |
3 | 18.5577 ± 0.0686 | 18.2195 | \(\mathcal {B}\) | 10.0000 | 4.48 10^{−1} |
4 | 6.5931 ± 0.0939 | 6.5793 | \(\mathcal {B}\) | 10.0000 | 4.60 10^{−1} |
5 | 7.9630 ± 0.0169 | 7.9999 | \(\mathcal {R}_{2}\) | 12.4837 | N/A |
6 | 4.9082 ± 0.0531 | 5.3999 | \(\mathcal {B}\) | 10.0000 | 1.29 10^{−3} |
7 | 10.7244 ± 0.0013 | 10.7414 | \(\mathcal {R}_{2}\) | 32.3563 | N/A |
8 | 11.3006 ± 0.0171 | 11.1503 | \(\mathcal {B}\) | 10.0000 | 4.90 10^{−2} |
9 | 20.1596 ± 0.0843 | 21.0230 | \(\mathcal {B}\) | 10.0000 | 2.51 10^{−2} |
10 | 10.6419 ± 0.0119 | 10.7412 | \(\mathcal {R}_{2}\) | 30.7266 | N/A |
11 | 10.6183 ± 0.1630 | 12.0195 | \(\mathcal {R}_{1}\) | 0.0000 | N/A |
12 | 14.2814 ± 0.1153 | 16.0956 | \(\mathcal {B}\) | 10.0000 | 1.23 10^{−2} |
13 | 11.6557 ± 0.0193 | 11.6082 | \(\mathcal {B}\) | 10.0000 | 2.30 10^{−1} |
14 | 11.0416 ± 0.0092 | 11.0528 | \(\mathcal {B}\) | 10.0000 | 4.88 10^{−2} |
15 | 23.5724 ± 0.0224 | 23.6809 | \(\mathcal {R}_{2}\) | 31.1479 | N/A |
16 | 8.9470 ± 0.0216 | 9.0075 | \(\mathcal {B}\) | 10.0000 | 1.56 10^{−1} |
17 | 14.4627 ± 0.0720 | 16.1824 | \(\mathcal {B}\) | 10.0000 | 8.65 10^{−2} |
18 | 20.8878 ± 0.0041 | 20.9496 | \(\mathcal {R}_{2}\) | 34.1783 | N/A |
Aggregate TCP throughput T obtained with ns-3 simulations and the fixed-point analytical model for B=20. Results for ns-3 simulations are presented with the 99 % confidence intervals
idx | T (ns-3) | T (analysis) | Solution | x ^{⋆} | α ^{⋆} |
---|---|---|---|---|---|
(Mbps) | (Mbps) | domain | (packets) | ||
1 | 7.9566 ± 0.0315 | 8.0001 | \(\mathcal {B}\) | 20.0000 | 1.06 10^{−3} |
2 | 15.0448 ± 0.2067 | 15.9673 | \(\mathcal {R}_{1}\) | 3.9049 | N/A |
3 | 17.2953 ± 0.1523 | 17.2050 | \(\mathcal {B}\) | 20.0000 | 2.44 10^{−1} |
4 | 5.8687 ± 0.0183 | 5.5724 | \(\mathcal {B}\) | 20.0000 | 7.50 10^{−2} |
5 | 6.1174 ± 0.0069 | 6.0328 | \(\mathcal {B}\) | 20.0000 | 2.50 10^{−1} |
6 | 4.9370 ± 0.0696 | 5.3797 | \(\mathcal {B}\) | 20.0000 | 1.98 10^{−4} |
7 | 10.6713 ± 0.0099 | 10.7414 | \(\mathcal {R}_{2}\) | 32.3564 | N/A |
8 | 11.1897 ± 0.0077 | 11.0506 | \(\mathcal {B}\) | 20.0000 | 3.67 10^{−2} |
9 | 20.9866 ± 0.0253 | 20.9979 | \(\mathcal {B}\) | 20.0000 | 1.65 10^{−2} |
10 | 10.2652 ± 0.0249 | 10.7412 | \(\mathcal {R}_{2}\) | 30.7266 | N/A |
11 | 12.7334 ± 0.1325 | 12.0195 | \(\mathcal {R}_{1}\) | 0.0000 | N/A |
12 | 15.6795 ± 0.0350 | 16.0741 | \(\mathcal {B}\) | 20.0000 | 9.53 10^{−3} |
13 | 11.5683 ± 0.0102 | 11.5174 | \(\mathcal {B}\) | 20.0000 | 2.06 10^{−1} |
14 | 11.0345 ± 0.0066 | 11.0222 | \(\mathcal {B}\) | 20.0000 | 4.39 10^{−2} |
15 | 23.1019 ± 0.0520 | 23.6811 | \(\mathcal {R}_{2}\) | 31.1479 | N/A |
16 | 8.9518 ± 0.0165 | 8.8827 | \(\mathcal {B}\) | 20.0000 | 1.36 10^{−1} |
17 | 15.9371 ± 0.0321 | 16.1458 | \(\mathcal {B}\) | 20.0000 | 7.41 10^{−2} |
18 | 20.6509 ± 0.0187 | 20.9499 | \(\mathcal {R}_{2}\) | 34.1782 | N/A |
Aggregate TCP throughput T obtained with ns-3 simulations and the fixed-point analytical model for B=30. Results for ns-3 simulations are presented with the 99 % confidence intervals
idx | T (ns3) | T (analysis) | Solution | x ^{⋆} | α ^{⋆} |
---|---|---|---|---|---|
(Mbps) | (Mbps) | domain | (packets) | ||
1 | 7.9785 ± 0.0162 | 7.9942 | \(\mathcal {R}_{1}\) | 25.9733 | N/A |
2 | 15.4886 ± 0.0857 | 15.9674 | \(\mathcal {R}_{1}\) | 3.9049 | N/A |
3 | 15.9636 ± 0.2527 | 16.2673 | \(\mathcal {B}\) | 30.0000 | 5.41 10^{−2} |
4 | 5.3673 ± 0.0000 | 5.3760 | \(\mathcal {R}_{1}\) | 22.5306 | N/A |
5 | 5.3673 ± 0.0000 | 5.3760 | \(\mathcal {R}_{1}\) | 22.5306 | N/A |
6 | 5.3673 ± 0.0000 | 5.3760 | \(\mathcal {R}_{1}\) | 22.5306 | N/A |
7 | 9.8443 ± 0.0336 | 10.7416 | \(\mathcal {R}_{2}\) | 32.3563 | N/A |
8 | 11.0671 ± 0.0080 | 10.9739 | \(\mathcal {B}\) | 30.0000 | 2.73 10^{−2} |
9 | 21.0011 ± 0.0053 | 20.9776 | \(\mathcal {B}\) | 30.0000 | 9.51 10^{−3} |
10 | 9.1072 ± 0.0330 | 10.7412 | \(\mathcal {R}_{2}\) | 30.7266 | N/A |
11 | 12.9934 ± 0.0867 | 12.0195 | \(\mathcal {R}_{1}\) | 0.0000 | N/A |
12 | 15.9259 ± 0.0378 | 16.0586 | \(\mathcal {B}\) | 30.0000 | 7.56 10^{−3} |
13 | 11.4676 ± 0.0120 | 11.4330 | \(\mathcal {B}\) | 30.0000 | 1.84 10^{−1} |
14 | 11.0026 ± 0.0043 | 10.9937 | \(\mathcal {B}\) | 30.0000 | 3.93 10^{−2} |
15 | 20.8078 ± 0.1013 | 23.6811 | \(\mathcal {R}_{2}\) | 31.1479 | N/A |
16 | 8.8136 ± 0.0159 | 8.7706 | \(\mathcal {B}\) | 30.0000 | 1.19 10^{−1} |
17 | 16.1202 ± 0.0134 | 16.1126 | \(\mathcal {B}\) | 30.0000 | 6.29 10^{−2} |
18 | 19.5952 ± 0.0287 | 20.9496 | \(\mathcal {R}_{2}\) | 34.1783 | N/A |
6 Performance evaluation of QAWLA
For both channel types, but more prominently for the ITU-A channel, the choice of H=100 yields the best results in terms of peak normalized throughput and the degree of robustness for increasing t h _{ PER } values. Note that QAWLA with \(B=40 > th_{\min } = 30\) performs worse than TAGLA for low values of t h _{ PER }, since AQM packet losses force the queue to be confined in \(\mathcal {R}_{1}\) having lower capacity for the QAWLA scheme. Only for values of t h _{ PER } well exceeding the level of 10^{−2} can the wireless packet losses start to dominate making \(\mathcal {R}_{1}\) a desirable regime with its lower PER values for QAWLA. The remaining choices of \(B \leq th_{\min }\) reveal the true potential of QAWLA in both channels, while the B=20 choice performing slightly better than the choice of B=30 owing to its lower average queuing delay. For the rest of the numerical examples, we fix H=100 and B=20 and study the selection of the t h _{ PER } parameter of the QAWLA(t h _{ PER }, 100, 20) policy.
Normalized aggregate TCP throughput performance of various LA schemes
AWGN | ITU-A | |||
---|---|---|---|---|
T _{ M } | T _{ W } | T _{ M } | T _{ W } | |
Q A W L A(0.05,100,20) | 0.99 | 0.92 | 0.97 | 0.85 |
T A G L A(0.0032) | 0.97 | 0.67 | 0.89 | 0.52 |
T F E R(0.00013) | 0.97 | 0.67 | 0.89 | 0.52 |
MaxPHYThru-PER | 0.79 | 0.02 | 0.43 | 0.04 |
MaxPHYThru-FER | 0.51 | 0.00 | 0.17 | 0.00 |
7 Conclusions
A novel queue-aware link adaptation mechanism is proposed for wireless links carrying long-lived TCP flows and which are controlled by AQM buffer management. This proposed cross-layer mechanism is based on the choice of a different modulation and coding scheme depending on whether the queue occupancy is above or below a certain threshold at the epoch of packet transmission. A novel fixed-point analytical model is developed to accommodate discontinuous wireless packet loss rate and queue service rate of this dual-regime queuing system which is validated with extensive ns-3 simulations. Using the proposed analytical model, we show significant TCP throughput improvement with queue awareness for link adaptation. Such throughput improvement is shown to exist even when the channel statistics are not precisely known. Investigating the performance of the proposed QAWLA scheme for PHY technologies other than IEEE 802.16 such as LTE, consideration of the use of HARQ/ARQ techniques at the PHY, use of multiple thresholds as opposed to one single threshold of the DRWL framework, and the employment of queue-awareness in link adaptation of point-to-multipoint wireless systems, such as cellular networks, are left for future research.
Declarations
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
- RKP Mok, EWW Chan, RKC Chang, in Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium On. Measuring the quality of experience of HTTP video streaming (IEEE, USA, 2011), pp. 485–492.Google Scholar
- D Lee, BE Carpenter, N Brownlee, in Internet Monitoring and Protection (ICIMP), 2010 Fifth International Conference On. Observations of UDP to TCP ratio and port numbers (IEEE, USA, 2010), pp. 99–104.View ArticleGoogle Scholar
- C Lee, D Lee, S Moon, in Passive and Active Measurement. Lecture Notes in Computer Science,7192, ed. by N Taft, F Ricciato. Unmasking the growing UDP traffic in a campus network (Springer, Berlin Heidelberg, 2012), pp. 1–10.View ArticleGoogle Scholar
- B Braden, D Clark, J Crowcroft, B Davie, S Deering, D Estrin, S Floyd, V Jacobson, G Minshall, C Partridge, L Peterson, K Ramakrishnan, S Shenker, J Wroclawski, L Zhang, Recommendations on queue management and congestion avoidance in the Internet. RFC 2309 (RFC Editor, 1998). http://tools.ietf.org/html/rfc2309, access date 29 October 2015.
- S Floyd, V Jacobson, Random early detection gateways for congestion avoidance. IEEE/ACM Trans. Networking. 1(4), 397–413 (1993).View ArticleGoogle Scholar
- ES Hashem, Analysis of random drop for gateway congestion control. PhD thesis, Massachusetts Institute of Technology (1989).Google Scholar
- S Athuraliya, SH Low, VH Li, Q Yin, REM: active queue management. IEEE Netw.15(3), 48–53 (2001).View ArticleGoogle Scholar
- M Hassan, R Jain, High Performance TCP/IP Networking: Concepts, Issues, and Solutions (Pearson, US, 2004).Google Scholar
- R Adams, Active queue management: a survey. IEEE Commun. Surv. Tutorials. 15(3), 1425–1476 (2013).View ArticleGoogle Scholar
- H Balakrishnan, VN Padmanabhan, S Seshan, RH Katz, A comparison of mechanisms for improving TCP performance over wireless links. IEEE/ACM Trans. Networking. 5(6), 756–769 (1997).View ArticleGoogle Scholar
- S Catreux, V Erceg, D Gesbert, RW Heath, Adaptive modulation and MIMO coding for broadband wireless data networks. IEEE Commun. Mag.40(6), 108–115 (2002).View ArticleGoogle Scholar
- ST Chung, AJ Goldsmith, Degrees of freedom in adaptive modulation: a unified view. IEEE Trans. Commun.49(9), 1561–1571 (2001).MATHView ArticleGoogle Scholar
- J Yang, N Tin, AK Khandani, in Adaptive modulation and coding in 3G wireless systems. Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th, vol. 1, (2002), pp. 544–5481.Google Scholar
- H Chen, HCB Chan, C-K Chan, VCM Leung, QoS-based cross-layer scheduling for wireless multimedia transmissions with adaptive modulation and coding. IEEE Trans. Commun.61(11), 4526–4538 (2013).View ArticleGoogle Scholar
- K-C Go, J-H Kim, Application-aware MCS level selection method for cross-layered retransmission scheme. IEEE Commun. Lett.18(2), 209–212 (2014).View ArticleGoogle Scholar
- Q Liu, S Zhou, GB Giannakis, Queuing with adaptive modulation and coding over wireless links: cross-layer analysis and design. IEEE Trans. Wirel. Commun.4(3), 1142–1153 (2005).View ArticleGoogle Scholar
- D Moltchanov, A study of TCP performance in wireless environment using fixed-point approximation. Comput. Netw. 56(4), 1263–1285 (2012).View ArticleGoogle Scholar
- A De Vendictis, A Baiocchi, in Modeling a mixed TCP Vegas and TCP Reno scenario, 2345, ed. by E Gregori, M Conti, A Campbell, G Omidyar, and M Zukerman. NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications. Lecture Notes in Computer Science (Springer, Berlin Heidelberg, 2002), pp. 612–623.Google Scholar
- V Kokshenev, S Suschenko, in Analytical model of the TCP Reno congestion control procedure through a discrete-time Markov chain, 279, ed. by V Vishnevsky, D Kozyrev, and A Larionov. Distributed Computer and Communication Networks. Communications in Computer and Information Science (Springer International Publishing, 2014), pp. 124–135.Google Scholar
- V Jacobson, Congestion avoidance and control. SIGCOMM Comput. Commun. Rev.18(4), 314–329 (1988).View ArticleGoogle Scholar
- V Jacobson, Modified TCP congestion avoidance algorithm. Technical report (1990). end2end-interest mailing list. ftp://ftp.isi.edu/end2end/end2end-interest-1990.mail, access date 29 October 2015.
- K Tan, J Song, Q Zhang, M Sridharan, in INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. A compound TCP approach for high-speed and long distance networks (IEEE, USA, 2006), pp. 1–12.View ArticleGoogle Scholar
- S Ha, I Rhee, L Xu, CUBIC: A New TCP-friendly high-speed TCP variant. SIGOPS Oper. Syst. Rev.42(5), 64–74 (2008).View ArticleGoogle Scholar
- P Yang, J Shao, W Luo, L Xu, J Deogun, Y Lu, TCP congestion avoidance algorithm identification. IEEE/ACM Trans. Networking. 22(4), 1311–1324 (2014).View ArticleGoogle Scholar
- G Martorell, F Riera-Palou, G Femenias, Cross-layer fast link adaptation for MIMO-OFDM based WLANs. Wirel. Pers. Commun.56(3), 599–609 (2011).View ArticleGoogle Scholar
- O Ozturk, N Akar, Workload-dependent queuing model of an AQM-controlled wireless router with TCP traffic and its application to PER-based link adaptation. EURASIP J. Wirel. Commun. Netw.67(1), 1–18 (2014).Google Scholar
- Q Liu, S Zhou, GB Giannakis, in TCP performance in wireless access with adaptive modulation and coding. Communications, 2004 IEEE International Conference On, vol. 7, (2004), pp. 3989–39937.Google Scholar
- H Jiang, C Dovrolis, Passive estimation of TCP round-trip times. SIGCOMM Comput. Commun. Rev.32(3), 75–88 (2002).View ArticleGoogle Scholar
- J Huang, Z Niu, in Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE. Buffer-aware and traffic-dependent packet scheduling in wireless OFDM networks (IEEE, USA, 2007), pp. 1554–1558.View ArticleGoogle Scholar
- Y Lin, G Yue, in Wireless Communications, Networking and Mobile Computing, 2008. WiCOM ’08. 4th International Conference On. Channel-adapted and buffer-aware packet scheduling in LTE wireless communication system, (2008), pp. 1–4.Google Scholar
- D Niyato, E Hossain, Queue-aware uplink bandwidth allocation and rate control for polling service in IEEE 802.16 broadband wireless networks. IEEE Trans. Mob. Comput.5(6), 668–679 (2006).View ArticleGoogle Scholar
- G Song, Y Li, LJ Cimini, Joint channel- and queue-aware scheduling for multiuser diversity in wireless OFDMA networks. IEEE Trans. Commun.57(7), 2109–2121 (2009).View ArticleGoogle Scholar
- E Uysal-Biyikoglu, A El Gamal, On adaptive transmission for energy efficiency in wireless data networks. IEEE Trans. Inf. Theory. 50(12), 3081–3094 (2004).MATHMathSciNetView ArticleGoogle Scholar
- X Li, X Dong, D Wu, in Military Communications Conference, 2008. MILCOM 2008. IEEE. Hierarchical queue-length-aware power control for delay-sensitive applications over wireless networks (IEEE, USA, 2008), pp. 1–6.Google Scholar
- EC Strinati, A De Domenico, L Herault, Green communications: an emerging challenge for mobile broadband communication networks. Journal of Green Engineering. 1(3), 267–301 (2011).Google Scholar
- MI Salman, CK Ng, NK Noordin, BM Ali, A Sali, A self-configured link adaptation for green LTE downlink transmission. Transactions on Emerging Telecommunications Technologies. 26(2), 258–275 (2015).View ArticleGoogle Scholar
- X Li, X Dong, D Wu, On optimal power control for delay-constrained communication over fading channels. IEEE Trans. Inf. Theory. 57(6), 3371–3389 (2011).MathSciNetView ArticleGoogle Scholar
- X Ao, S Jiang, L Tang, in Communication Technology (ICCT), 2010 12th IEEE International Conference On. Traffic-aware active link rate adaptation via power control for multi-hop multi-rate 802.11 networks (IEEE, USA, 2010), pp. 1255–1259.Google Scholar
- M Chiang, J Bell, in Balancing supply and demand of bandwidth in wireless cellular networks: Utility maximization over powers and rates. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 4 (IEEE, USA, 2004), pp. 2800–28114.Google Scholar
- M Chiang, Balancing transport and physical layers in wireless multihop networks: jointly optimal congestion control and power control. IEEE J. Sel. Areas Commun.23(1), 104–116 (2005).View ArticleGoogle Scholar
- TMC Chu, H Phan, H-J Zepernick, in Communications (ICC), 2014 IEEE International Conference On. Adaptive modulation and coding with queue awareness in cognitive incremental decode-and-forward relay networks, (2014), pp. 1453–1459.Google Scholar
- J Padhye, V Firoiu, D Towsley, J Kurose, Modeling TCP throughput: a simple model and its empirical validation. SIGCOMM Comput. Commun. Rev.28(4), 303–314 (1998).View ArticleGoogle Scholar
- T Bu, D Towsley, Fixed point approximations for TCP behavior in an AQM network. SIGMETRICS Perform. Eval. Rev.29(1), 216–225 (2001).View ArticleGoogle Scholar
- S Floyd, Recommendation on using the “Gentle” variant of RED. Technical report (2000). http://www.icir.org/floyd/red/gentle.html. access date 29 October 2015.
- S Athuraliya, SH Low, VH Li, Q Yin, REM: Active queue management. IEEE Netw.15(3), 48–53 (2001).View ArticleGoogle Scholar
- H Balakrishnan, VN Padmanabhan, G Fairhurst, M Sooriyabandara, TCP performance implications of network path asymmetry. RFC 3449 (RFC Editor, 2002). http://www.rfc-editor.org/rfc/rfc3449.txt, access date 29 October 2015.
- TJ Speight, Efficient TCP ACK Prioritization in Wireless Networks. US20080080464 A1 (2008). Patent US20080080464.Google Scholar
- Ns-3 (2015). https://www.nsnam.org/, access date 29 October 2015.
- V Paxson, M Allman, J Chu, M Sargent, Computing TCP’s retransmission timer. RFC 6298 (RFC Editor, 2011). http://www.rfc-editor.org/rfc/rfc6298.txt, access date 29 October 2015.
- IEEE standard for local and metropolitan area networks part 16: air interface for broadband wireless access systems, 1–2080 (2009). IEEE Std 802.16-2009 (Revision of IEEE Std 802.16-2004).Google Scholar
- DT Chen, in IEEE Radio and Wireless Symposium 2007. On the analysis of using 802.16e WiMAX for point-to-point wireless backhaul, (2007), pp. 507–510.Google Scholar
- JARP de Carvalho, H Veiga, P Gomes, AD Reis, R Costa, in Signal Processing and Information Technology. ISSPIT 2008. IEEE International Symposium On. A contribution to experimental performance evaluation of point-to-point WiMAX links (IEEE, USA, 2008), pp. 150–153.View ArticleGoogle Scholar
- PTP Solutions Guide Motorola Fixed Point-to-point Wireless Bridges. http://www.motorolasolutions.com/. access date 29 October 2015.
- RDL-3000 System. http://rdlcom.com/, access date 29 October 2015.
- Harris Falcon III®; RF-7800W. http://harris.com/, access date 29 October 2015.
- Coded Modulation Library (CML). http://www.iterativesolutions.com/. access date 29 October 2015.
- Guidelines for evaluation of radio transmission technologies for IMT-2000 (1997). Recommendation ITU-R M.1225.Google Scholar
- WiMAX Forum®; mobile system profile: Release 1.5 TDD specific part. Technical report, WiMAX Forum®; (Mar 2009).Google Scholar
- P Romirer-Maierhofer, F Ricciato, A D’Alconzo, R Franzan, W Karner, in Network-wide measurements of TCP RTT in 3G, 5537, ed. by M Papadopouli, P Owezarski, and A Pras. Traffic Monitoring and Analysis. Lecture Notes in Computer Science (Springer, Berlin Heidelberg, 2009), pp. 17–25.Google Scholar
- S Cen, PC Cosman, GM Voelker, End-to-end differentiation of congestion and wireless losses. IEEE/ACM Trans. Netw.11(5), 703–717 (2003).View ArticleGoogle Scholar
- S Floyd, E Kohler, Internet research needs better models. SIGCOMM Comput. Commun. Rev.33(1), 29–34 (2003).View ArticleGoogle Scholar
- J Hespanha, S Bohacek, K Obraczka, J Lee, in Hybrid modeling of TCP congestion control, 2034, ed. by M Di Benedetto, A Sangiovanni-Vincentelli. Hybrid systems: computation and control. Lecture Notes in Computer Science (Springer, Berlin Heidelberg, 2001), pp. 291–304.Google Scholar
- G Carneiro, P Fortuna, M Ricardo, in FlowMonitor: A network monitoring framework for the network simulator 3 (NS-3). Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools. VALUETOOLS ’09 (ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)Brussels, Belgium, 2009), pp. 1–1110.Google Scholar
- G Ciccarese, M De Blasi, P Marra, C Palazzo, L Patrono, An algorithm for controlling packet size in IEEE 802.16e networks. Comput. Netw.55(13), 2873–2885 (2011).View ArticleGoogle Scholar
- J Francis, NB Mehta, EESM-based link adaptation in point-to-point and multi-cell OFDM systems: Modeling and analysis. IEEE Trans. Wirel. Commun.13(1), 407–417 (2014).View ArticleGoogle Scholar
- D Takeda, YC Chow, P Strauch, H Tsurumi, in Threshold controlling scheme for adaptive modulation and coding system. Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th IEEE International Symposium On, vol. 2 (IEEE, USA, 2004), pp. 1351–1355.Google Scholar