Dataflow Features in Computer Networks



Similar documents
Computer Networks Framing

Performance Analysis of IEEE in Multi-hop Wireless Networks

Static Fairness Criteria in Telecommunications

A Holistic Method for Selecting Web Services in Design of Composite Applications

Channel Assignment Strategies for Cellular Phone Systems

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Sebastián Bravo López

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Bandwidth Allocation and Session Scheduling using SIP

From a strategic view to an engineering view in a digital enterprise

A Keyword Filters Method for Spam via Maximum Independent Sets

A Comparison of Service Quality between Private and Public Hospitals in Thailand

Parametric model of IP-networks in the form of colored Petri net


Suggested Answers, Problem Set 5 Health Economics

Capacity at Unsignalized Two-Stage Priority Intersections

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

arxiv:astro-ph/ v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA USA

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I D1

Deadline-based Escalation in Process-Aware Information Systems

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Open and Extensible Business Process Simulator

An Enhanced Critical Path Method for Multiple Resource Constraints

MATE: MPLS Adaptive Traffic Engineering

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Programming Basics - FORTRAN 77

CARRIER VOICE NETWORK MANAGEMENT

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Chapter 5 Single Phase Systems

Supply chain coordination; A Game Theory approach

i_~f e 1 then e 2 else e 3

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

Big Data Analysis and Reporting with Decision Tree Induction

Scalable TCP: Improving Performance in Highspeed Wide Area Networks

Granular Problem Solving and Software Engineering

Using Live Chat in your Call Centre

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

Chapter 1 Microeconomics of Consumer Theory

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image

On the Characteristics of Spectrum-Agile Communication Networks

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Weighting Methods in Survey Sampling

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS. Discussion Paper No The Evolution and Utilization of the GATT/WTO Dispute Settlement Mechanism

Electrician'sMathand BasicElectricalFormulas

Recovering Articulated Motion with a Hierarchical Factorization Method

10.1 The Lorentz force law

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS

Green Cloud Computing

Intuitive Guide to Principles of Communications By Charan Langton

Findings and Recommendations

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

cos t sin t sin t cos t

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Software Ecosystems: From Software Product Management to Software Platform Management

protection p1ann1ng report

AT 6 OF 2012 GAMBLING DUTY ACT 2012

Lemon Signaling in Cross-Listings Michal Barzuza*

Chapter 1: Introduction

Availability, Reliability, Maintainability, and Capability

luxcontrol DALI manual

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction

Wireless Networking Guide

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

Pattern Recognition Techniques in Microarray Data Analysis

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

Implementation of PIC Based LED Displays

Interaction-Driven Virtual Reality Application Design

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

Effectiveness of a law to reduce alcohol-impaired driving in Japan

NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES

Robust Classification and Tracking of Vehicles in Traffic Video Streams

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE

university of illinois library AT URBANA-CHAMPAIGN BOOKSTACKS

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Unit 12: Installing, Configuring and Administering Microsoft Server

A novel active mass damper for vibration control of bridges

Discovering Trends in Large Datasets Using Neural Networks

VOLUME 13, ARTICLE 5, PAGES PUBLISHED 05 OCTOBER DOI: /DemRes

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

CIS570 Lecture 4 Introduction to Data-flow Analysis 3

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters

Transcription:

Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department of Automation and Applied Informatis H-1521 Budapest, Po. Box. 91. Hungary e-mail: max@aut.bme.hu Abstrat. Dataflow in omputer networks an be desribe as a ompliated system. To simulate behaviours of these systems are also diffiult, beause these systems show nonlinear features. Before implementing network equipments users wants to know apability of their omputer network. They do not want the servers to be overloaded during temporary traffi peaks when more requests arrive than the server is designed for. Aording to the non-linear harater of network traffi, a system model is established to exam behaviour of the network planned. This paper presents setting up a non-linear simulation model that helps us to handle dataflow problems of the networks. Keywords: non-linear system analysis, omputer networks, data ongestion, stability 1 Introdution In a large-sale omputer network data pakets may hoose among many routes to arrive their destination address. These seletions are based on knowledge of reent nodes of the omputer networks. In most ases parts of the omputer networks do not know all levels of the fully network. Though almost all nodes take part in the proess of forwarding pakets, nodes of the omputer network know more on neighbours than far ones. In this paper, we firstly summarize the ontributions and limitations inluded in the existing works. In seond session the non-linear model and its behaviours are established foused on ongestion problems and stability. The third session explains the estimation proess of model parameters and riteria, while in the fourth session an ase study is given. These system parameters and riteria are used to analyze quantitatively behaviour and stability of system as well as to investigate the impat of system parameters, suh as data density, load level, link apaity on system stability. The simulation results validate our analysis. Last session shows tendeny of future works. 155

Gy. Max 2 Related Works To study network behaviour, traffi parameters are needed to measure and analyse, and to find their statistial laws, suh as was done by Y. Bhole and A. Popesu [1]. After having known the statistial rules, some traffi models are built, suh as the establishment of a model for Novel network traffi by J. Jiang and S. Papavassiliou in [2] or we try to understand why buffers are overflowed like S. Sidiroglou et al. did in [3]. Congestion ontrol methods. We also set up ongestion models. Model of Du Haifeng et al. [4] performs an effetive network ongestion ontrol method for multilayer network. If operational ost is important read I. Chuang s artile [5] on Priing Multiast Communiation. If the time-sale of network traffi is onsidered, the network traffi behaviour will be different in different time-sale. Paxson and Floyd [6] showed that the traffi behaviour of milliseond-time sale is not self-similar by the influene of network protool. Due to the influene of environment, the traffi behaviour whose time-sale is larger than ten minutes is not also self-similar and is a non-linear time-series. Only the traffi behaviour in seond-time sale is self-similar. This problem beomes known when transations of the omputer networks have to be desribed. As it was presented before, the system shows non-linear features, i.e. transations. It means no tools to desribe transations by mathematis of linear ontrol systems. In this paper, a new nonlinear traffi behaviour model is set up and by the aid of this model, the non-linear features of dataflow are desribed. Traffi simulation. The most extensive and modern researhes present diretions of network parameter estimations [7], analyses of traffi generators [8, 9], elasti network nodes [1] et. The non-linear analyses of network nodes [11, 12, 13, 14] is a separate important researh area. Therefore, very important the optimal funtion of the nodes in the system. In terms of the data traffi that would either be the ideal if fewer nodes existed in the network, or in the ase of huge number of nodes these all were linked to all the others. This apparently an absurd approah, already if we look at the eonomi sides of the solution only. A question beomes known, that neessary, that let the nodes be on the entral plae of the examinations. The orret answer is in this diretion, that in terms of the data traffi, the whole network is neessary to put onto the examined entral plae. Stability ontrol. Many papers have theoretially analyzed omputer networks in framework of feedbak ontrol theory based on the ontinuous time model (e.g. [15-19] et.) or disrete-time model (suh as [2] and [21]) after having made some neessary simplifiation and assumption, and finally provided some very revelatory and signifiant onlusions and judgments. In [16], a general nonlinear model was developed, then after linearisation it around equilibrium and making several simplifying assumptions, the suffiient stability ondition was obtained. The main ontribution in [16] was to replae the single-link idential-soure model in [15] with a general model with heterogeneous soures, but omponents 156

Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis were approximated linearly. Under this assumption, some possible fators leading to the queue osillation have been suessfully identified, however, the others will be likely hidden. 3 Data Flow Model The omputer network models known by the literature trae bak the data traffi to the desription of a ommuniation happening between edges and nodes of a ommuniation graph. The models handle the nodes as an important element in this desription method. The outome of model is the ommuniation graph that faithfully imitates the physial arrangement of the omputer network, where the nodes, the ative elements of the system are the peaks of the graph, whih are onneted to eah other by the transfer mediums alled edges. This statement is important, beause in the network atually the nodes, the ative elements of the network ommuniate with eah other, and the nodes form the peaks of the network graph in the graph theory model of the omputer network. Figure 1 shows a plain example how nodes ommuniate: Figure 1 Internal and external elements of a network This desription gives bak that view on a natural manner. In this model the entral plae are oupied by nodes as the peaks of the network graph and the edges of the network graph show transations of the traffi in whih the peaks 157

Gy. Max ommuniate with eah other along the data lines onneting them. This proess separates our internal nodes, where swithes or bridges are loated with a losed urve from their input and output workstation nodes, as it is shown in figure 1. In the following number of internal, input and output nodes are marked by n, l and m respetively. Consider the network is known in a time t and numbers of bits stored in the nodes are marked with N(t). Now let us examine status of the network in time moment (t+ t). During time t if transfer speeds between nodes (v ij ) are known, the data (N i (t+δt)) stored in node i hange as (1): N i (t+ t) = N i (t) + N inter i + N input i - N output i, (1) where ΔN inter i = n j= 1; i j; C (v ), ij ij ΔN input i = l C ik k = 1; i k; (v ik ), ΔN output i = m i= 1; C (v ). ii ii In (1) C ij (v ij ) = ij *v ij is an elements of the ommuniation matrix depending on v ij and ij desribes features of ommuniation between node i and node j. The ommuniation matrix is desribed detailed in session 5. After summarizing data hanges in all nodes and supposed that node i has only one output, we get total data hange (2) in our network: N 1(t + Δt) N 1(t) N2(t + Δt) N2(t) +. =. Nn(t + Δt) Nn(t) 21 n1 21 n1 12 n2 12 n2 1n 2n 1n 2n (2) + 21 k1 21 k1 12 k2 12 k2 1n 2n 1 n 2n 11 11 22 22 nn nn or (2) in matrix form (3) N(t+ t) = N(t) + C int (v int )*Δt + C inp (v inp )*Δt - C out (v out )*Δt (3) Forming (3) and do t, the result is shown by (4): 158

Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis N(t+ t) - N(t) lim = N (t) = C int (v inz ) + C inp (v inp ) - C out (v out ) (4) t t (4) beomes more simply (5) if v int = v inp = v out = v N (t) = v * ( int + inp - out ) (5) Complete alulation of (2) by Taylor series (6) N(t+Δt) = N(t)+N (t)* Δt+N (t)* Δt 2 /2!++ N (n) (t)* Δt n /n! (6) Comparing (2) to (6) we say that N (t)* Δt 2 /2!++N (n) (t)* Δt n /n!= (7) 4 State Variables In the network the transmission speed means how many bits an be transported in one seonds between two nodes. Transmission speed may not be equal in every part of the network, but from node j to node i the same value is supposed and marked with v ij. Eah node has some buffer for their messages. This apaity is measured by data density (8) that shows rate of reent data quantity in time and the maximal data quantity in node i. number of reent data bits in buffer of node i N i (t) x i (t) = = (8) maximal number of data bits in buffer of node i N imax In our model the data density of node i is a number without dimension between <= x <= 1. Traditionally, the numeration of data density shows the differene of outgoing and inoming bits in time t or in other words it shows the maximum number of data bits that an be transferred in the next time unit. Now data density is introdued as a rate of the length of messages stored in node i and the maximal message length. This property shows non-linearity, beause no hane to reeive more bits than the maximal size of the data buffer or node i an not reeive any bit, if node j has no any one to send. In our network data density of node i is marked with x i and data density of input node j that is loated outside of the network is marked with s j. In our model N(t) and x(t) are vetors of n elements. From (8) N i (t) = N imax * x i (t), onsequently N max is a matrix of nxn elements. Elements of N max represent the buffer size of nodes. Sine no buffer between node i and node j, N max is a diagonal matrix. 159

Gy. Max 5 Communiation Matrix In (1) (5) the ommuniation matrix plays big role in our model. There are some funtions implemented in C ij (v ij ). Let us examine parts of this matrix. C ij (v ij ) must ontain at least the following: - internal onnetions of the network - environmental onnetions of the network - size of internal buffers in nodes - apabilities of nodes to send and reeive data The apability of node i shows when no data to send, no more room in its buffer as well as the probability of transmission in ase of more output hannels. An element of the Communiation matrix grants the onnetion when node j ommuniates with node i. Creating Communiation matrix is done olumn by olumn. We go through eah element of olumn j, and if a onnetion exists between nodes j and node i, that is node j works to node i, the ommuniation funtion marked C ij - is reated, where (i j, 1 i,j n ). All features are neessary to be taken into onsideration at the time of the forming of the ommuniational matrix by the aid of onnetion funtions C ij. The most important funtion is the model parameter of ij showing properties of the onnetion. Inside traffi regulations are also neessary to be taken into onsideration at the time of the forming of the ommuniational matrix (i.e. data link mehanisms depending on the density of the traffi). In our model, the inner traffi regulations depend on density three funtions of ij (t), S j (t), R i (t) and x i (t), where S j (t) defines properties of sender node, R i (t) delares features of the reeiver, while C ij are defined by produt of these four fators (9): C ij = ij (t) S j (t) R i (t) x i (t) (9) Struture of C ij (t): If there is the opportunity of the permanent ommuniation between two nodes, and the node j works for node i, then ij = e ij p ij, where e ij is the oeffiiene of effetiveness that shows the time rate of real data transfers and total working time, while p ij is the probability of data transmission from node j to node i. If there is not a physial onnetion between these nodes, then ij =. The probability of data transmission, p ij (t) presents the distribution proportion of given routes belonging to a node with relative weighting, where <= p ij (t) <= 1, if node j works for more than one node. The relative weightings of node j are shown in olumn j of the ommuniation matrix and Σp ij (t) = 1 for eah olumn. S j (t) is an automati internal self-regulation funtion (1) of transmitter node with values of 1 or. It shows whether node j has message to send or not. Connetion is disable if data density of node j (x j (t)) equals to, anyway 1. 16

Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis 1, x j (t) > S j (t)= (1), x j (t) = R i (t) is another automati internal self-regulation funtion (11) of the reeiver node with values of 1 or. Connetion is enable if data density of node i (x i (t)) smaller, than 1, anyway. Value of 1 means that buffer of node i has been overloaded, so node i loses its ommuniation port to diretion of node j, therefore node i does not reeive any message from node j. 1, x i (t) < 1 R i (t)= (11), x i (t) = 1 Equation (9) transforms (3) into (12) N(t+ t) = N(t) + ij (t) S j (t) R i (t) x i (t) v ij Δt + + i,inpk (t) R i (t) x i (t) v i,inpk Δt - outm,i (t) S i (t) v outm,i Δt (12) In (12) we supposed that input node always an send data to and output nodes an reeive all data from our network. In longer time period x j (t) v ij shows real transmission speed. While S j (t) =1, i.e. v ij Δt <= x j (t) N imax, transmission works. Transmission stops if no more data to transfer. In other words, the average transfer speed for the total time period is x j (t) v ij. 6 Simulation That takes too muh simulation time if dataflow is simulated by bit by bit. We wanted to make a unit for our simulation. So in first step we measured frame lengths. We made data transfers in different time period (early morning, afternoon, midnight), with different data lengths (from some hundred bytes to hundred megabytes) and different transmission speed (from 24 Kbits/s up to 1Mbits/s). Measurements were made by the Wireshark Network Protool Analyzer. After having olleted more hundred thousands messages we analyzed inoming and outgoing frames. The result showed two signifiant figures among the values. One of them was harateristi of onfirmation messages, while the other one was typial data messages. Distribution funtion of data measured is presented in Table 1. It shows the most frequented values. Considering figures table 1 we hose 55 bytes as unit of frame length. Using this frame length an average data length is 26 units. 161

Gy. Max Table 1 Number of piees of the most frequented frame length Length Number of Piees Total Length 54 165 535 8 938 89 66 11 773 777 18 1 82 1 73 11 69 86 1 434 271 383 389 163 222 1 514 43 127 65 294 278 An existing network was simulated that an be seen in Figure xxx. Two files were transmitted through the real network. The first file of 89 MB was transported from Inp1 and the seond one of 91 MB started from Inp2. First hannel used TCP protool, while seond file was transported by FTP protool. In our 1Mb/se hannels the alulated effiieny rate was about 72%, beause the transportations took appr. 2 se. Our model used the same files during the simulation. Figure 2 Struture of the network measured and simulated The seond file was started in 8 seonds after the first one. The third input hannel named Inp3 did not work. The throughput an be seen in Figure 3. Proess time of the simulation is a bit less than the real ommuniation. In the figure 3 we an se that the real ommuniation used different hannel speeds, while the transfer speed was the same in our simulation. During our simulation we supposed that speeds of transmission equal between nodes. This supposition was false as we ould see it in Figure 3. 162

Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Figure 3 Internal and external elements of a network In the simulation the data density of the internal nodes are also observable. Using different internal buffers in the network observed bottlenek effets an be tested. Figure 4 shows two simulation with different buffer sizes. On the left 5 MByte internal buffer was used, while in seond ase only 1 MByte buffer was alloated. On the left side inputs work linearly, while on the right side shows non-linear faes. Figure 4 Data transfers using different internal buffers in the simulated network Figure 4 helps us to find bottleneks of the network. In the right piture Inp2 was bloked by node Int1, beause there were no enough room for inoming frames. Conlusion and future works This paper looks for possibilities to desribe dataflow model of large-sale omputer networks. A model was presented that was appliable to simulation, planning and regulation of omputer network s traffi. At the time of the model's establishment, the partial differential equations were avoided in the mathematial model beause of the speially hosen state variables. The nodes have honoured 163

Gy. Max roles in this non-linear model beause storage apaities of the transmission medium are pratially zero. Nodes either ommuniate to eah other or not. In our model, the mean of the data density is the proportion of the size of data stored in the single node and the data quantity, whih an be stored maximally. Our model examines hange of data density ourred by data flow among the nodes in a region demarated by lose urve. Input and output data densities are regarded as known. At first sight, these proesses are the inputs and outputs of the model. Effetively, these proesses together form the atual inputs of the mathematial model. State variables present data densities arising in the internal nodes of the system. Our system applies a data traffi model involving n internal and m external nodes. To reate the mathematial model the ommuniation matries defining the network has fundamental importane. Our model applies four ommuniation matries. During simulation we supposed that speed of transmission equals between nodes. It must be hanged in the future. We have to work out a quik test to alulate possible ongestion points and gives some riteria to stability of the system. Finally, a simply example was presented to demonstrate usage of the model and how this model is appliable to the simulation, planning or regulation of omputer networks. Referenes [1] Y. Bhole, A. Popesu: Measurement and Analysis of HTTP Traffi. Journal of Network and Systems Management, Vol. 13, No. 4 (25) pp. 357-371 [2] J. Jiang, S. Papavassiliou: Deteting Network Attaks in the Internet via Statistial Network Traffi Normality Predition. Journal of Network and Systems Management, Vol. 12, No. 1, (24) pp. 51-72 [3] S. Sidiroglou, G. Giovanidis, A. D. Keromytis: A Dynami Mehanism for Reovering from Buffer Overflow Attaks, J. Zhou et al. (Eds.): ISC 25, LNCS 365, pp. 1-15, 25 [4] D. Haifeng, X. Yang, L. Lingyun: An Effetive Network Congestion Control Method for Multilayer Network, Journal Of Eletronis (China), Vol.25, No.4, July 28 [5] John C.-I. Change, Marvin A. Sirbu: Priing Multiast Communiation: A Cost-Based Approah, Teleommuniation Systems 17:3, 281-297, 21 [6] Paxson, V., Floyd, S.: Wide Area Traffi: The Failure of Poisson Modelling, IEEE/ACM Transations on Networking 3(3), pp. 226-244 (1995) [7] A. M. Galkin, O. A. Simonina, G. G. Yanovsky: Multiservie IP Network QoS Parameters Estimation in Presene of Self-similar Traffi, NEW2AN 26, LNCS 43, pp. 235-245, 26 164

Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis [8] J. Sommers, H. Kim, P. Barford: Harpoon: A Flow Level Traffi Generator for Router and Network Tests, SIGMETRICS/Performane 4, 24, pp. 392-393 [9] S. Avallone, A. Pesape, Giorgio Ventre: Analysis and Experimentation of Internet Traffi Generator, NEW2AN 24, pp. 1-6 [1] M. A. Mansour, L. Srimali: Hölder Continuity of Solutions to Elasti Traffi Network Models, J. Glob. Optim. (28) 4:175-184 [11] H. F. Du, Y. Xiao, D. Y. Xu: Nonlinear Stability Analysis for Ative Queue Management, Proeedings of the IEEE International Symposium on Communiations and Information Tehnology (ISCIT 25), 25, Vol. 2, 1314-1317 [12] T. Peter, Analysis of Large Sale Transportation Networks, MMA Conferene, Symposium, Budapest (27) [13] Kihl, M., Robertsson, A., Wittenmark, B.: Performane Modelling and Control of Server Systems Using Non-Linear Control Theory, Proeedings of the 18 th International Teletraffi Congress (23) [14] Kihl, M., Robertsson, A., Wittenmark, B.: Control Theoreti Modelling and Design of Admission Control Mehanisms for Server Systems, Proeedings of IFIP Networking (24) [15] Hollot, C., Misra, V., Towsley, D., Gong, W. B.: A Control Theoreti Analysis of RED, Proeedings of IEEE INFOCOM 1, Anhorage, Alaska, 21 [16] Low, S. H., Paganini, F., Wang, J., Adlakha, S., Doyle, J. C.: Dynamis of TCP/RED and a Salable Control, Proeedings of IEEE INFOCOM 2, New York, USA, 22 [17] Hollot, C. V., Chait, Y.: Nonlinear Stability Analysis for a Class of TCP/AQM Networks, IEEE Conferene on Deision and Control, 21, Orlando, pp. 239-2314 [18] Aweya, J., Ouellette, M., Montuon, D. Y.: A Linear System Analysis of RED, Computer Communiations 25 (22) 1736-175 [19] Ohsaki, H., Murata, M.: Steady State Analysis of RED Gateway: Stability, Transient Behavior and Parameters Setting, IEICE Transations on Communiations E85-B (1) (22) 17-117 [2] Firoiu, V., Borden, M.: A Study of Ative Queue Management for Congestion Control, Proeedings of IEEE INFOCOM, Tel Aviv, Israel, Marh 2 [21] Ranjan, P., Abed, E. H., La, R. J.: Nonlinear Instabilities in TCP-RED, Proeedings of IEEE INFOCOM 2, New York, USA, 22 165