Abstract

This paper studies the decentralized routing control of data communication networks. Taking the physical constraints on the data flow and the network-induced delays into consideration, the decentralized routing control problem is reformulated as a constrained control problem, and the restriction of initial message lengths is no longer needed. By defining a general Lyapunov functional and applying a reciprocally convex combination technique to deal with the network-induced delays, less conservative and less complex designing conditions are obtained in terms of linear matrix inequalities (LMIs). A simulation example is also given to illustrate the effectiveness of the proposed designing scheme.

1. Introduction

Routing control plays an indispensable role in complex and crowded networks such as transportation networks and data communication networks [119]. The fundamental idea of routing control is that the most suitable route for data packets from source to destination through other nodes is to be determined such that certain objective functions are minimized.

Early routing algorithms, such as those implemented in the ARPANET [2] and TYMNET [3], were designed for optimally achieving some prespecified objective, such as shortest time or shortest path from the initial node to the destination node, minimization of a cost function related to the link congestion [14], or minimization of a generic measure of link flows. However, the performance of the crowded networks with these routing algorithms will deteriorate significantly, since the channel communication capacity is usually limited and the link congestion problems may often occur in many practical networks [20]. Therefore, it is essential to take the physical constraints, such as limited channel capacity and limited energy source, into consideration in designing proper routing control scheme.

It is very known that the network-induced delays (i.e., transmission delay, propagation delay, and processing delay) may induce instability, oscillation, and poor performance, and have a major impact on the routing control design. Several researchers have also attempted to address the problem of delay-constrained routing in recent years [1319, 2124]. Different techniques such as capacity allocation [16] and neural networks [19] are adopted to obtain the proper routing paths that minimizing or guaranteeing the boundedness of different types of network delays. However, more general index may be specified in evaluating the network performance, and many physical constraints of networks also should be taken into consideration. Under such a circumstances, the routing control problem becomes a difficult task and cannot be tackled with the above-mentioned methods. As stated in [18, 19], the fluid flow conservation principle is frequently employed in deriving the queuing dynamics, wherein each state of the subsystem (node) represents a queue corresponding to a given destination node. With the aid of linear matrix inequality (LMI) approach, the recent paper [20] provides a promising framework to revisit and reformulate the routing control problems as a constrained optimal control problem for time-delay systems; hence, a number of physical constraints can be easily imposed on the routing problem.

In [20], a continuous-time system model was used to describe the dynamics of traffic networks, and the physical constraints on traffic flows and queues were transformed into a set of LMI-based conditions. Then, robust centralized as well as decentralized routing control strategies were introduced for networks with a fixed topology based on the minimisation of the worst-case queuing length, which is related to the queuing delays. Similar treatment was adopted in [25]. It is worth pointing out that the derivatives of network-induced delays were assumed to be less than 1. However, according to [26], such assumptions are false. Meanwhile, a parameter should be given a priority and the initial values of all message queue lengths are required to be in the transformation of the physical constraints, which may be harsh for many practical applications and may result in some conservatism.

In this paper, we study routing control of data communication networks that arise from many practical applications [19]. A discrete-time model instead of continuous-time model [20] is used to describe the communication network dynamics and the data constraints on the data flow. Furthermore, in order to facilitate the practical implementation for large-scale data communication networks, we are dedicated to design decentralized controllers instead of centralized controllers. Thus, vulnerable failures and large communication overheads in the network may be avoided. To this end, some new techniques will be adopted to tackle the extra difficulty in the related LMI manipulation and derivation, which are caused because of the decentralized controller structure. Different from the existing works, a reciprocally convex combination method is used to deal with delays, the physical constraints are successfully transformed into a set of LMIs and the restriction that initial message queue lengths should be is removed, and each LMI-based condition involved in the designing of decentralized routing control is only related to an oriented link in the data communication network, which can effectively reduce both the conservatism and the complexity.

Notation.Throughout this paper, a real symmetric matrix  (≥0) denotes being a positive definite (positive semidefinite) matrix, and means (≥0). is used to denote an identity matrix with proper dimension. Matrices, if not explicitly stated, are assumed to have compatible dimensions. The symmetric terms in a symmetric matrix are denoted by . For a real vector ,  (0) denotes every component of being nonnegative (positive). In this case, is called nonnegative (positive). Likewise, is nonnegative or positive if every entry of is nonnegative or positive, respectively, which is written as or , respectively.

2. Problem Formulation

Consider a data communication network, , consisting of a directed graph with a set of nodes and a set of -oriented links. Each message has a destination node , and all destination nodes form a set . Each node receives messages from the upstream nodes within the network. Messages are absorbed as soon as they arrive at their destination nodes. Messages arriving to a node other than their final destination are put into a queue (or buffer) and eventually are sent out to a downstream node. It is assumed that the network is “connected,” that is, each node of the network must be reachable from each other node. In the worst case, where all the nodes are source as well as destination, at each node there will be queues in which messages are stored for all destinations, . We also assume that the rate of messages that are sent from one node to another is updated (synchronously throughout the communication network) by control variables at discrete instants , where is a positive scalar.

Similar to [19], the data communication network dynamics can be expressed as where : message queue length at node destined to node at instant : set of upstream neighbors of node ; : set of downstream neighbors of node ; : traffic flow routed from node to node destined to node at instant ; : subset of , that is, ; : time-varying delay in transmitting, propagating, and processing of messages (including identifying the destination, inserting in the queue, and routing computation) with destination routed from node to node , which satisfies where are constants.

Due to the physical significance of and the constraints on the data flow through each link and the message queue buffer size at each node, the following conditions should be satisfied: where positive scalars and represent the maximal length of the message queue length at node and the maximal capacity of oriented link (it is also called “edge”), respectively.

Define then (1) can be rewritten as where and are vectors; , and represent the numbers of nodes contained in , and , respectively; and are constant matrices. Obviously, the entries of are equal to or , and the ones of are equal to or , which reflect the network connectivity of node in graph [20].

In this paper, a decentralized routing control scheme is proposed to stabilize the origin system (1), where state feedback controllers are to be designed. Such a constrained control problem can be found by solving a set of linear matrix inequalities (LMIs). Different from the one given in [20], the obtained routing control scheme is at edge-level; that is, each inequality is only dependent on an edge in . This implies that the dimension of each inequality is low, so the computational complexity is reduced effectively. In addition, since some constraints are discarded, the conservatism of the obtained LMI-based conditions is also reduced.

Through this paper, Jensen's integral inequality [27] and a reciprocally convex combination technique [28] will be used, so it is listed as the following lemmas.

Lemma 1 (see [27]). For any positive symmetric constant matrix , scalars satisfying , a vector function such that the integrations concerned are well defined, then

Lemma 2 (see [29]). For given positive semidefinite matrices and , if there exists a matrix such that then the following inequality for any holds

3. Main Results

3.1. Stability Analysis

Now, we give a new stability criterion for the origin of system (7) with (2) as follows.

Theorem 3. For given scalars and , the origin of system (7) with (2) is globally asymptotically stable if there exist matrices , , , , and    with appropriate dimensions, such that where and , and

Proof. The proof is provided in the Appendix.

Remark 4. In Theorem 3, a sufficient condition of globally asymptotical stability for the origin of system (7) with (2) is given in terms of LMIs. Different from the one in [20], positive definite matrices , and correspond to the oriented link , so the Lyapunov functional is more general. Meanwhile, each inequality in (13) is also related to an oriented link in , so its dimension is lower. Combined with using a reciprocally convex technique [28], the computational complexity and the conservatism are reduced.

3.2. A Decentralized Routing Control Scheme
3.2.1. Controller Design without the Physical Constraints

From (13), one can find that are negative definite, this implies that are nonsingular. Set pre- and postmultiplying the left side of inequality (13) by and its transpose, and from the Schur complement, we get the following.

Theorem 5. For given scalars and , the origin of system (7) with (2) is globally asymptotically stable if there exist matrices , , , and , and with appropriate dimensions, such that where and , and The gains of the subsystem controllers in (8) are given by

3.2.2. LMI-Based Conditions for the Physical Constraints

Now, we translate the physical constraints (3)–(5) into LMI-based conditions.

(1) Nonnegativity Constraint on Data Traffic Flow. From (1), it is easy to see that the nonnegativity of and can be guaranteed if and are nonnegative for all , and .

Note that the negative definiteness of , and from (17), the nonnegativity of and can be guaranteed if are diagonal for all and (2) Upper Bound on the Buffer Size. Note that where So, the constraint (4) can be represented as

From , it follows that . So, there exist a small enough such that Since and , inequality (24) implies If (16) and (17) in Theorem 5 are feasible, under the assumption for all , from we get where is defined in .

Thus, (23) can be guaranteed if From the Schur complement, the above inequality is equivalent to So, from the above analysis, it is known that (23) can be guaranteed if (24) and (30) hold for any .

(3) Capacity Constraints on Links. For , it is known that there exists a nonnegative integer such that the numbers of nodes contained in are less than and the ones of nodes contained in are greater than . Thus, We get where so the constraint (5) can be represented as

Similarly, constraint (33) can be satisfied if (24) and

Therefore, considering the physical constraints (3)–(5), a decentralized routing control scheme can be get as follows.

Theorem 6. For given scalars and , the origin of system (7) with (2) is globally asymptotically stable if there exist a scalar , matrices , , , and , and diagonal matrices with appropriate dimensions, such that (16), (17), (20), (24), (30), and (34) hold.

Correspondingly, the gains of the subsystem controllers in (8) are given by (19).

Remark 7. In [20, 25], a scalar was needed to be selected before and the restriction in transforming the physical constraints into LMI-based conditions. Contrastively, involved in inequalities (30) and (34) is a variable and it can be found by solving these LMIs. More importantly, the restriction is not needed here.

Remark 8. Different from [20, 25], positive definite matrix in Theorem 6 is not required to be diagonal, which discards the constraint on .

4. Numerical Example

Consider a data communication network shown in Figure 1 [20, 30]. The capacity of each link is also indicated in the figure, the unit of which is kbit/sec. All the nodes are assumed to be sources as well as destinations. From Figure 1, it follows that there are 6 queues (the states of the system) and 8 output flows for these queues (the input signals). The queue dynamic of the communication network can be described as follows where

Assume that the maximal buffer sizes, , are given by , , and . For the case of for all , by Theorem 6 with , one can get

Now, we provide a simulation.

Suppose that the initial states of are given by , and . With the obtained controller gains in (37), the state responses of the system are depicted in Figures 2, 3, and 4, which shows that the system is asymptotically stable. Figures 5, 6, 7, and 8 show the data flows between nodes in the communication network. From Figures 58, one can see that the physical constraints are satisfied although initial state is not equal to . So, the proposed decentralized routing control scheme is effective.

5. Conclusion

In this paper, the routing control problem of data communication networks has been investigated. By considering both the network-induced delays and the physical constraints, a decentralized routing control scheme is proposed, which can be realized by solving a set of LMIs. Since a method is used to relax the transformation conditions of the physical constraints, and a reciprocally convex combination technique is employed to dealing with the network-induced delays, a less complex and less conservative designing result is obtained. A simulation example is given to illustrate the effectiveness of the presented designing scheme.

Appendix

Proof of Theorem 3. Choose a Lyapunov functional as where and , , , are to be determined.
Note that We get Similarly, taking the differences of along the trajectory of (7) yields that Since and from Lemma 1, we get Thus, from Lemma 2, it yields that
On the other hand, for any matrices , and with appropriate dimensions, it follows that So, combining (A.4)–(A.9), we get that where From the Schur complement, it is known that the globally asymptotical stability of system (7) can be guaranteed if (12) and (13) hold for any and .
Thus, the proof is completed.

Acknowledgments

This work was supported by the National High Technology Research and Development Programme of China (863 Programme) under Grant 2009AA012201, the National Natural Science Foundation of China under Grant 61174085, the Training Excellent Young Teachers in Shanghai Universities (B37-0109-10-008), the Shanghai University Innovation Foundation (Grant no. A.10-0109-10-014), and the Industry-University-Research Project of Shanghai.