search
HomeCommon ProblemWhat are the three categories of scheduling and control technologies for information transfer in computer networks?

Scheduling control technology for information transmission in computer networks can be divided into three categories: congestion control, deadlock prevention and flow control; congestion control is to control the excessive number of packets in a certain part of the communication subnet, and network flow control It is a measure that uses software or hardware to control network data traffic.

What are the three categories of scheduling and control technologies for information transfer in computer networks?

The operating environment of this tutorial: Windows 10 system, DELL G3 computer.

What three categories can the scheduling control technology of information transmission in computer networks be divided into?

The scheduling control technology of information transmission in computer networks can be divided into: congestion control, deadlock prevention, Flow control

Expand knowledge

Network Control System (NCS) refers to sensors, controllers and actuators passing through the network A closed-loop feedback control system is formed. At present, most research on NCS establishes system models, analyzes system stability, and provides control methods and control rules based on the existing problems and characteristics of NCS to ensure that the system has good stability and high-quality control performance. However, the performance of NCS not only depends on the design of control strategies and control laws, but is also limited by network communication and network resources. Information scheduling tries to avoid information conflicts and congestion in the network, thereby greatly improving the service performance of the network control system.

Information characteristics and information scheduling concepts in NCS

In NCS, the information transmitted by the network is mainly divided into two categories: real-time information and non-real-time information [3]. Real-time information has very strict time requirements. If a piece of information fails to work within the upper limit of the specified time, the information will be discarded and the latest information will be used. In the NCS information scheduling strategy, two types of data information are mainly scheduled: periodic information and aperiodic information. Periodic information is a kind of real-time information, which is generally required to be transmitted to the target node within the transmission cycle. Periodic information is also called time-triggered information or synchronization information. Aperiodic information refers to information such as service requests between nodes. Their occurrence moments are random. Aperiodic information is also called event-triggered information, asynchronous information or random information.

In addition, burst information cannot be ignored in NCS information scheduling. Burst information refers to some sudden or random events that cannot be predicted in advance (such as alarm signals, exception handling, etc.). Information must be processed within a certain period of time, otherwise the system may become abnormal or even paralyzed.

In network control systems, information scheduling occurs at the application layer, that is, in the process of information transfer between sensors, controllers and actuators. When a data transmission collision occurs at a node in the system network, information scheduling stipulates the node's priority sending order, sending time and time interval to avoid network conflicts.

In NCS, if all data transmission of the network control system can be completed within the task time limit, the transmission of the network control system is said to be schedulable.

Typical NCS information scheduling algorithm

The current research on information scheduling in network control systems is mainly divided into separate design of scheduling and control and Co-design of scheduling and control.

Separate design of scheduling and control

In NCS research, one type of research is aimed at communication networks and studies on improving network service quality. Information scheduling methods; another type of research is to study control methods to improve NCS performance based on certain network information scheduling methods. Therefore, information scheduling methods play a large role in improving NCS performance.

According to the real-time requirements of information, information scheduling is divided into static scheduling (also known as offline scheduling), dynamic scheduling (also known as online scheduling) and hybrid scheduling.

Static priority scheduling

There are many static scheduling algorithms at present. This article focuses on the following typical algorithms and algorithm improvements.

The scheduling priority of the Rate Monotonic Static Priority Scheduling (RateMonotonicSchedulingModel) algorithm is determined by the task cycle. It is the best static scheduling algorithm in a synchronous real-time task system where the task cycle is equal to the time limit. However, this algorithm has shortcomings such as exponential time complexity in scheduling decisions, too strict restrictions on task execution cycles, and can only handle tasks with fixed cycles. In view of the above shortcomings, Lehoczky et al. [23] proposed an RM algorithm that expands the scheduling feasibility conditions. Sha et al. [22] considered the blocking of tasks and gave the schedulable conditions of the RM algorithm in non-preemptive service mode. Ye Ming et al. [5] proposed a new real-time scheduling algorithm (HardReal-timeCommunicationScheduler, HRTCS) based on the RM algorithm. Wen Yuanbao et al. [4] proposed an improved RM algorithm for streaming media where the relationship between task cycle and scheduling priority is not fixed.

The task priority of the DeadlineMonotonicSchedulingModel strategy is determined by the task time limit. This scheduling algorithm should prevent tasks from exceeding their time limit and not being scheduled, thus affecting the real-time performance of the system. When the task cycle and time limit are the same or all periodic tasks are synchronized, the DM algorithm is the best static scheduling algorithm.

The static bandwidth scheduling algorithm based on time windows proposed by Hong et al. avoids interference and data conflicts during data transmission on the network. Hong et al. also applied this scheduling method to cyclic service NCS and NCS under CAN network.

Considering that this scheduling method is limited to periodic data in the scheduling network, Liu Luyuan et al. proposed a time window scheduling algorithm based on synchronous phases and asynchronous phases, so that non-periodic data can also use the static scheduling algorithm based on time windows.

Dynamic Priority Scheduling

In the dynamic priority scheduling algorithm, the time constraint relationship of tasks is not completely determined, and the arrival time of new tasks is unknown. Several classic dynamic priority scheduling algorithms are introduced below.

Earliestdeadlinefirstscheduling proposed by Liu and Layland. Task priority is the difference between task deadline and task execution time. This algorithm is the best dynamic scheduling algorithm for synchronous periodic task groups. Since EDF is a preemptive scheduling algorithm, switching between tasks requires a lot of overhead. Baker [12] gave the schedulability conditions of the EDF algorithm in non-preemptive service mode. Zhang Huijuan et al. [11] proposed a priority-driven real-time scheduling algorithm based on the EDF algorithm, which largely overcomes the scheduling shortcomings of the EDF algorithm in multi-processor systems. Liu Huai et al. [10] proposed a fault-tolerant scheduling algorithm based on the EDF algorithm. Zhang Qizhi et al. [7] used the non-interruptive EDF scheduling method to improve the end-to-end delay of periodic data frames. Hong Yanwei et al. [1] proposed how to determine the feasibility of real-time tasks on simple models and complex models respectively.

Leastlaxityfirst scheduling (Leastlaxityfirst) and the EDF algorithm can be regarded as the same type of scheduling algorithm. The task priority is the difference between the completion time limit and the task execution time minus the execution time of the periodic task. The LLF algorithm tries to avoid frequent waiting and execution of long-cycle tasks, and has less jitter.

Mosterrorfirst-tryoncediscard is a scheduling algorithm based on online acquisition of network-induced transmission errors and dynamic allocation of network bandwidth proposed by Walsh et al. [8].

The dynamic scheduling based on dead zones proposed by Otanez et al. [9] dynamically discards a certain ratio of data to reduce the load on the network while ensuring system performance. However, when multiple data packets that are allowed to access the network compete for network resources at the same time, this policy cannot determine the priority of data packet sending.

Dynamic scheduling based on business smoothing is Kewon and others who use business smoothing technology to control the traffic of the Ethernet network by inserting fixed-rate business smoothers and automatic Adapt the business smoother to limit the arrival rate of MAC layer data packets and ensure the boundedness of the network-induced delay, thereby improving the service quality of the network.

Priority improvement proposed by Cena et al.—Distributed priority Queuing scheduling (PP-DPQ) can ensure that the maximum interval of real-time data transmission has a definite upper bound, and non-real-time data competes fairly for network resources during transmission.

Time window-based dynamic scheduling (DynamicTimeWindow) is Raja's improvement on the time window-based static scheduling algorithm, and proposes priority cycle services and dynamic time window bandwidth allocation strategies.

Fuzzy dynamic scheduling is Bai Tao [13] and others who introduced fuzzy control theory into NCS information scheduling and used fuzzy logic based on IF2THEN rules to determine the priority of data transmission.

Hybrid Scheduling

Zuberi et al. proposed a hybrid communication scheduling (MTS) strategy for network control systems under CAN. When designing the scheduling strategy, considering the different real-time data requirements, different scheduling strategies can be adopted to improve the schedulability of network resources. The event-triggered real-time scheduling of annealing control tasks given by Tabuada et al. [27] is based on an event-triggered scheduler with feedback examples, and the conditions for how it guarantees system performance are given.

Co-design of scheduling and control

Currently, the co-design of control and scheduling has become a research hotspot and has received more and more attention. It can be roughly divided into open-loop scheduling and Feedback controls two aspects of real-time scheduling.

Open-loop scheduling

Scheduling of the sampling period and sampling time of data transmission nodes in each control loop in NCS

Hong based on "window" Concept, a scheduling algorithm is given that reduces the impact of delay and improves network utilization by scheduling sampling time, and establishes the constraint relationship between NCS control system performance and network performance. However, this algorithm is based on the scheduling of one-dimensional objects in the token ring system (tokenpassing system) and the polling system (polling system), and the type of information in the system is limited to periodic information. Kim et al. [16] proposed a sampling time scheduling algorithm suitable for multi-dimensional objects based on the same idea. Liu Luyuan et al. [17] proposed a scheduling algorithm that uses the remaining time window to schedule non-real-time data and improve network resource utilization.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What are the three categories of scheduling and control technologies for information transfer in computer networks?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
计算机网络的资源共享功能包括哪些计算机网络的资源共享功能包括哪些Jul 15, 2022 pm 04:29 PM

计算机网络的资源共享功能包括:1、硬件资源共享,可以提高设备的利用率,避免设备的重复投资;2、软件资源共享和数据资源共享,可以充分利用已有的信息资源,减少软件开发过程中的劳动,避免大型数据库的重复建设;3、通信信道资源共享,就是将同一个信道供多个用户同时使用,可以提高信道资源的利用率。

城域网是公网吗城域网是公网吗Aug 31, 2022 am 10:53 AM

城域网是公网;城域网是在一个城市范围内所建立的计算机通信网,简称为MAN,属宽带局域网,由于采用具有有源交换元件的局域网技术,网中传输时延较小,可以用作骨干网,通过它将位于同一城市内不同地点的主机、数据库,以及LAN等互相联接起来。

沟通网络中开放式的网络系统是什么沟通网络中开放式的网络系统是什么Aug 22, 2022 pm 02:17 PM

开放式的网络系统是“全通道式沟通网络”。全通道式沟通网络是全方位开放式的沟通网络系统,所有成员之间都能进行相互的不受限制的信息沟通与联系;在这种沟通网络中,集中化程度低,成员地位差异小,士气高,成员可以直接、自由而充分地发表意见,有利于集思广益,提高沟通准确性,缺点是容易导致工作效率低。

学校内的一个计算机网络系统属于什么学校内的一个计算机网络系统属于什么Jul 13, 2022 pm 04:43 PM

学校内的一个计算机网络系统属于局域网(LAN)。局域网是一种在小区域内使用的,由多台计算机组成的网络,覆盖范围通常局限在10千米范围之内,属于一个单位或部门组建的小范围网。局域网可分为无线局域网和有线局域网,其中无线局域网可以传输音频、视频、文字,现在很多公司和校园都在用无线局域网。

计算机网络最突出的特征是什么计算机网络最突出的特征是什么Jan 13, 2021 pm 03:13 PM

计算机网络最突出的特征是:资源共享。资源共享是人们建立计算机网络的主要目的之一。通常多用户同时需要的资源总是超过系统实际物理资源的数量,但采用逻辑(或虚拟)资源分配的方式,实现资源共享,可较好地处理这个矛盾,从而提高计算机的使用效率。

计算机网络的拓扑结构有哪些计算机网络的拓扑结构有哪些Feb 22, 2023 am 11:30 AM

计算机网络的拓扑结构是指网上计算机或设备与传输媒介形成的结点与线的物理构成模式,主要有星型拓扑结构、总线拓扑结构、环型拓扑结构、树型拓扑结构、混合型拓扑结构、网型拓扑结构、开关电源拓扑结构;其中,星型网络拓扑结构是应用最广泛的一种网络拓扑结构。

win7系统计算机网络连接错误711如何解决win7系统计算机网络连接错误711如何解决Jul 17, 2023 am 08:41 AM

很多使用win7系统的小伙伴一定都遇到过网络连接错误711的问题,win7系统计算机网络连接错误711如何解决?今日小编就带给大家一个关于win7电脑网络连接错误711的解决方法。win7系统计算机网络连接错误711如何解决:1.打开计算机“,找到”C:\Windows\System32\LogFiles文件夹,单击右键选择属性";2.点击"安全选项,选择高级";3.点击“所有者,选择”编辑“;4.选择当前正在使用的帐户"aaa",单击确定;5.

公司为什么要用内网公司为什么要用内网Aug 22, 2022 pm 03:57 PM

用内网的原因:1、资源共享,可提供方便的软硬件资源共享,尤其是在硬件资源方向更显突出,打印机和扫描仪等办公自动化设 备得到充分的利用。2、便于团队合作,大多数现代局域网提供了一个平台,可以让多个用户处理同一个文件且始终使用最新版本。3、易于查找信息,内网可作为放置所有受信任信息的位置。4、减少管理成本,借助内网,可轻松提供联机表单,从一开始就理顺工作流程,大大地提高了工作效率。

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.