Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks

Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks

Essam Natsheh (King Faisal University, Saudi Arabia)
DOI: 10.4018/978-1-60566-148-3.ch016
OnDemand PDF Download:


Mobile ad-hoc network is a network without infrastructure, where every node has its own protocols and services for powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic overflow. Traditionally, this was done through Drop-Tail policy, where the node drops the incoming packets to its queues during overflow condition. Many studies showed that early dropping of incoming packet is an effective technique to avoid congestion and to minimize the packet latency. Such an approach is known as Active Queue Management (AQM). In this chapter an enhanced algorithm, called Fuzzy-AQM, is suggested using fuzzy logic system to achieve the benefits of AQM. Uncertainty associated with queue congestion estimation and lack of mathematical model for estimating the time to start dropping incoming packets makes the Fuzzy-AQM algorithm the best choice. Extensive performance analysis via simulation showed the effectiveness of the proposed method for congestion detection and avoidance improving overall network performance.
Chapter Preview


Mobile ad-hoc network is a network without infrastructure where every node can work as a router. Every node has protocols and services to request and provide services to other nodes with the congestion handling capability. Traditionally, the congestion handling is done through Transmission Control Protocol (TCP). This protocol sends congestion signal (drop incoming packets) when the node's queue is full (queue length is maximum). Some studies (Braden, 1998; Floyd, 1993) showed that early dropping of incoming packet before reaching the maximum queue length is an effective technique to avoid congestion and to minimize the packet latency, e. g. Active Queue Management (AQM) drops incoming packets before the queue is full in contrast to traditional queue management which starts dropping only when the queue in overflowed.

Mobile ad-hoc networks suffer high network congestion due to high bit error rate (BER) in the wireless channel, increased collisions due to the presence of hidden terminals, interference, location dependent connection, uni-directional links, frequent path breaks due to mobility of nodes and the inherent fading properties of the wireless channel (Murthy, 2004). This substantiates the need for high adaptive AQM algorithms with adapting capabilities to high variability and uncertainty for these types of networks. The proposed fuzzy logic based AQM (called Fuzzy-AQM) is such types of algorithms to overcome the above shortcoming in ad-hoc networks. The application of fuzzy logic to the problem of congestion control allows us to specify the relationship between queue parameters and packets dropping probability using “if...then...” type of linguistic rules. The fuzzy logic algorithm would be able to translate or interpolate these rules into a nonlinear mapping.

In this study, the focus is to investigate the impact of the traditional and Fuzzy-AQM algorithms on the ad-hoc network. The considered strategy is as follows: when the congestion is detected, the node uses one of the AQM policies to drop the incoming data packets. Meanwhile, it allows the control packets to pass to the queue using Drop-Tail policy. Therefore, the data packets are dropped first when the packets drop probability exceeds a certain threshold while the control packets are still acceptable until the queue is full.

Control messages are preferred to pass to the queue during congestion time for the following reasons:

  • 1.

    Control messages are used to update the changes of the network topology. Therefore, they prevent data packet to be transmitted through broken paths.

  • 2.

    Data packets are “connection oriented”, that is, guaranteed delivery to their destinations by TCP. In contrast, control messages are “connectionless”; that is, the dropped message will not be retransmitted again.

  • 3.

    Control message size is very small compared to data packet. Normally in ad-hoc routing protocols, control message size is 64 bytes while data packet is 512 bytes, i. e. the control message takes small space in the queue and fast processing time in the node.

The rest of this paper is organized as follows. Section II summarizes related work on the common AQM polices issues and focuses on previous implementations of fuzzy AQM policies. Followed by congestion in ad-hoc networks, the fuzzy dropping algorithm as a new AQM policy (Fuzzy-AQM), performance analyzes of the proposed algorithm, and finally the conclusions.


The most famous AQM algorithm is Random Early Detection (RED) (Floyd, 1993). The RED algorithm manages the queue in an active manner by randomly dropping packets with increasing probability as the average queue size increases. It maintains two thresholds that determine the rate of packet drops: a lower threshold (denoted by minth) and an upper threshold (denoted by maxth). For each packet k arrives to the queue, the drop probability for that packet pd (k) is given by:

(1) where qc is current queue size, avg is current average queue size and maxp is maximum drop probability.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Indranil Bose
Chapter 1
Varadharajan Sridhar
Telecom operators have a wide variety of functions to perform including marketing of telecom products and services, managing their networks... Sample PDF
Strategic Outsourcing: Opportunities and Challenges for Telecom Operators
Chapter 2
Sami J. Habib
This article presents a computer-aided integration tool, iCAD, that can predict a network evolution. We have used the term a network evolution to... Sample PDF
Empirical Prediction of Computer-Network Evolution
Chapter 3
Hak Ju Kim
This article seeks to develop a richer understanding of the suitability of IP telephony in the Public Switched Telephony Network (PSTN) with an... Sample PDF
Suitability of IP Telephony in the Public Switched Telephone Network (PSTN): A Case Study
Chapter 4
Abid Al Ajeeli
This chapter describes a detailed framework configuration infrastructure design for a high performance network. The configuration is described based... Sample PDF
A Framework for High-Speed Networking
Chapter 5
Nurul I. Sarkar, Catherine Byrne, Nabeel A.Y. Al-Qirim
Ethernet network technology is still one of the most popular LAN technologies in use today by many organizations and educational institutions... Sample PDF
Updating on Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization
Chapter 6
M. Chandrasekaran, R. S.D. Wahida Banu
This chapter introduces and analyses a class of non-linear congestion control algorithms called polynomial congestion control algorithms. These... Sample PDF
Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks
Chapter 7
Xabiel G. Pañeda
This chapter presents a method for performance analysis and configuration of audio/video-on-demand services. These kind of services makes use of an... Sample PDF
A Systematic Approach to the Analysis and Configuration of Audio/Video-on-Demand Services
Chapter 8
Say Ying Lim
As more and more servers appearing in the wireless environment provide accesses to mobile users, more and more demand and expectation is required by... Sample PDF
Mobile Information Processing Involving Multiple Non-Collaborative Sources
Chapter 9
Vilmos Simon
In the next generation IP-based mobile networks, one of the most important QoS parameters are the delay and the delay variation. The cell handover... Sample PDF
Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks
Chapter 10
Joon-Yeoul Oh, John P. Mullen
This chapter proposes a very effective heuristic algorithm to address a variation of the cellular network expansion problem and discusses each... Sample PDF
A Heuristic Solution to the Large Scale Cellular Telecommunication Network Expansion Problem
Chapter 11
Manuel Vilas
This article introduces a distributed system, called wireless proxy, to mitigate the effects of user mobility over streaming services on IEEE 802.11... Sample PDF
Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs
Chapter 12
R. Radhakrishnan, K. R. Shankarkumar, A. Ebenezer Jeyakumar
In this chapter, we propose a new scheme for Multi User Detection (MUD) using Parallel Interference Cancellation (PIC) technique. This technique... Sample PDF
Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA
Chapter 13
Ghassan Kbar
This chapter introduces a new radio resource management technique based on distributed dynamic channel assignment, and sharing load among Access... Sample PDF
Distributed Resources Management in Wireless LANs that Support Fault Tolerance
Chapter 14
Mieso K. Denko
This article proposes a cooperative data caching and prefetching scheme for Mobile Ad Hoc Networks (MANETs). In this scheme, multiple hosts... Sample PDF
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
Chapter 15
Essam Natsheh
The challenge in creating a routing protocol for ad-hoc networks is to design a single protocol that can adapt to the wide variety of conditions... Sample PDF
A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad-Hoc Networks
Chapter 16
Essam Natsheh
Mobile ad-hoc network is a network without infrastructure, where every node has its own protocols and services for powerful cooperation in the... Sample PDF
Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks
Chapter 17
Yun Wang, Lee Seidman
The use of network traffic audit data for retrieving anomaly intrusion information and profiling user behavior has been studied previously, but the... Sample PDF
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
Chapter 18
Rania Wehbi
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing... Sample PDF
Network Setup for Secure Routing in Inter-Vehicle Communication Networks
Chapter 19
Antonios Alexiou, Christos Bouras, John Papagiannopoulos, Dimitrios Primpas
This chapter presents the design principles that cover the implementation of broadband infrastructure in the region of Western Greece, by examining... Sample PDF
Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models
About the Contributors