Browse > Article
http://dx.doi.org/10.7236/JIIBC.2019.19.3.53

Application Study of FQ-CoDel Algorithm based on QoS-guaranteed Class in Tactical Network  

Park, Juman (The 2nd R&D Institute- 1st Directorate, Agency for Defense Development(ADD))
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.19, no.3, 2019 , pp. 53-58 More about this Journal
Abstract
This paper proposes a class-based FQ-CoDel(Flow Queue-Control Delay) algorithm. A variety of application system services create bottlenecks in tactical communication network and the bottlenecks cause some problems such as traffic loss and delay. Therefore, more research on effective traffic processing is needed. The proposed class-based FQ-CoDel algorithm, suggests dynamic buffer management and scheduling, classifies specific packets in each queue according to service attribute and criticality and checks periodically latency of the packets in each queue. Also, it abandons the packets if some packets stay in queue above schedule time and manages the total amount of traffic stored in queue with certain level.
Keywords
Tactical network; FQ-CoDel; QoS;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 B. Braden, "Recommendations on Queue Management and Congestion Avoidance in the Internet," RFC 2309, 1998. DOI: https://tools.ietf.org/html/rfc2309
2 Woo-June Kim, Byeong Gi Lee, "FRED-fair random early detection algorithm for TCP over ATM networks", IEEE IET Vol34. issue 2, pp. 152-154, 22 Jam. 1998. DOI: 10.1049/el:19980049
3 W. C. Feng, Kang G. Shin, Dilip D. Kandlur and Debanjan Saha, "The BLUE Active Queue Management Algorithms," IEEE/ACM Trans. of Networking, Vol.10, No.4, pp.513-528, 2002. DOI: 10.1109/TNET.2002.801399   DOI
4 Z. Liu, X. Hu, "An Adaptive AQM lgorithm Based on a Novel Information Compression Model" IEEE Access, vol2, issue 1, pp.31180-31190, 2018 DOI: 10.1109/ACCESS.2018.2844407
5 H, Jorgensen, Toke, "Analyzing the latency of sparse flows in the FQ-CoDel queue management algorithm", IEEE Communications Letters, vol.22, issue 11, pp.2266-2269 DOI: 10.1109/LCOMM.2018.2871457   DOI
6 V. Misra,W.-B. Gong, and D. Towsley, 'Fluid-based analysis of a network of AQM routers supporting TCP ows with an application to RED,'ACM SIGCOMM Comput. Commun. Rev., vol. 30, no. 4, pp. 151160,2000.   DOI
7 Y. S. Im, E. Y. Kang, "MPEG-2 Video Watermarking in Quantized DCT Domain," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 11, No. 1, pp. 81-86, 2011. DOI: https://doi.org/10.7236/JIIBC.2014.14.2.17   DOI
8 I. Jeon, S. Kang, H. Yang, "Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System," Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 11, No. 1, pp. 81-86, 2010. DOI: https://doi.org/10.5762/KAIS.2010.11.4.1.1449
9 Eun-Gyu Ham, Chang-Bok Kim, "Model Implementation of Reinforcement Learning for Trading Prediction Using Deep Q Network ," The Journal of KIIT, Vol. 17, No. 4, pp. 1-8, 2019. DOI: 10.14801/jkiit.2019.17.4.1
10 General Dynamics Mission Systems, WIN-T The mobile expeditionary soldier's network, pp. 27-28, Mar. 2017.
11 J. Park, "Network Configuration Scheme to Improve reliability Based on Tactical Wireless Network", KIMST conference pp.699-610, oct., 2017
12 Jang-wee Research Institute for National Defence in Ajou University, "Guarantee of InformationCirculation for Weapon-system in All-IP Tactical Network," Research Report, 2014.