

What are the three categories of scheduling and control technologies for information transfer in computer networks?
Scheduling control technology for information transmission in computer networks can be divided into three categories: congestion control, deadlock prevention and flow control; congestion control is to control the excessive number of packets in a certain part of the communication subnet, and network flow control It is a measure that uses software or hardware to control network data traffic.
The operating environment of this tutorial: Windows 10 system, DELL G3 computer.
What three categories can the scheduling control technology of information transmission in computer networks be divided into?
The scheduling control technology of information transmission in computer networks can be divided into: congestion control, deadlock prevention, Flow control
Expand knowledge
Network Control System (NCS) refers to sensors, controllers and actuators passing through the network A closed-loop feedback control system is formed. At present, most research on NCS establishes system models, analyzes system stability, and provides control methods and control rules based on the existing problems and characteristics of NCS to ensure that the system has good stability and high-quality control performance. However, the performance of NCS not only depends on the design of control strategies and control laws, but is also limited by network communication and network resources. Information scheduling tries to avoid information conflicts and congestion in the network, thereby greatly improving the service performance of the network control system.
Information characteristics and information scheduling concepts in NCS
In NCS, the information transmitted by the network is mainly divided into two categories: real-time information and non-real-time information [3]. Real-time information has very strict time requirements. If a piece of information fails to work within the upper limit of the specified time, the information will be discarded and the latest information will be used. In the NCS information scheduling strategy, two types of data information are mainly scheduled: periodic information and aperiodic information. Periodic information is a kind of real-time information, which is generally required to be transmitted to the target node within the transmission cycle. Periodic information is also called time-triggered information or synchronization information. Aperiodic information refers to information such as service requests between nodes. Their occurrence moments are random. Aperiodic information is also called event-triggered information, asynchronous information or random information.
In addition, burst information cannot be ignored in NCS information scheduling. Burst information refers to some sudden or random events that cannot be predicted in advance (such as alarm signals, exception handling, etc.). Information must be processed within a certain period of time, otherwise the system may become abnormal or even paralyzed.
In network control systems, information scheduling occurs at the application layer, that is, in the process of information transfer between sensors, controllers and actuators. When a data transmission collision occurs at a node in the system network, information scheduling stipulates the node's priority sending order, sending time and time interval to avoid network conflicts.
In NCS, if all data transmission of the network control system can be completed within the task time limit, the transmission of the network control system is said to be schedulable.
Typical NCS information scheduling algorithm
The current research on information scheduling in network control systems is mainly divided into separate design of scheduling and control and Co-design of scheduling and control.
Separate design of scheduling and control
In NCS research, one type of research is aimed at communication networks and studies on improving network service quality. Information scheduling methods; another type of research is to study control methods to improve NCS performance based on certain network information scheduling methods. Therefore, information scheduling methods play a large role in improving NCS performance.
According to the real-time requirements of information, information scheduling is divided into static scheduling (also known as offline scheduling), dynamic scheduling (also known as online scheduling) and hybrid scheduling.
Static priority scheduling
There are many static scheduling algorithms at present. This article focuses on the following typical algorithms and algorithm improvements.
The scheduling priority of the Rate Monotonic Static Priority Scheduling (RateMonotonicSchedulingModel) algorithm is determined by the task cycle. It is the best static scheduling algorithm in a synchronous real-time task system where the task cycle is equal to the time limit. However, this algorithm has shortcomings such as exponential time complexity in scheduling decisions, too strict restrictions on task execution cycles, and can only handle tasks with fixed cycles. In view of the above shortcomings, Lehoczky et al. [23] proposed an RM algorithm that expands the scheduling feasibility conditions. Sha et al. [22] considered the blocking of tasks and gave the schedulable conditions of the RM algorithm in non-preemptive service mode. Ye Ming et al. [5] proposed a new real-time scheduling algorithm (HardReal-timeCommunicationScheduler, HRTCS) based on the RM algorithm. Wen Yuanbao et al. [4] proposed an improved RM algorithm for streaming media where the relationship between task cycle and scheduling priority is not fixed.
The task priority of the DeadlineMonotonicSchedulingModel strategy is determined by the task time limit. This scheduling algorithm should prevent tasks from exceeding their time limit and not being scheduled, thus affecting the real-time performance of the system. When the task cycle and time limit are the same or all periodic tasks are synchronized, the DM algorithm is the best static scheduling algorithm.
The static bandwidth scheduling algorithm based on time windows proposed by Hong et al. avoids interference and data conflicts during data transmission on the network. Hong et al. also applied this scheduling method to cyclic service NCS and NCS under CAN network.
Considering that this scheduling method is limited to periodic data in the scheduling network, Liu Luyuan et al. proposed a time window scheduling algorithm based on synchronous phases and asynchronous phases, so that non-periodic data can also use the static scheduling algorithm based on time windows.
Dynamic Priority Scheduling
In the dynamic priority scheduling algorithm, the time constraint relationship of tasks is not completely determined, and the arrival time of new tasks is unknown. Several classic dynamic priority scheduling algorithms are introduced below.
Earliestdeadlinefirstscheduling proposed by Liu and Layland. Task priority is the difference between task deadline and task execution time. This algorithm is the best dynamic scheduling algorithm for synchronous periodic task groups. Since EDF is a preemptive scheduling algorithm, switching between tasks requires a lot of overhead. Baker [12] gave the schedulability conditions of the EDF algorithm in non-preemptive service mode. Zhang Huijuan et al. [11] proposed a priority-driven real-time scheduling algorithm based on the EDF algorithm, which largely overcomes the scheduling shortcomings of the EDF algorithm in multi-processor systems. Liu Huai et al. [10] proposed a fault-tolerant scheduling algorithm based on the EDF algorithm. Zhang Qizhi et al. [7] used the non-interruptive EDF scheduling method to improve the end-to-end delay of periodic data frames. Hong Yanwei et al. [1] proposed how to determine the feasibility of real-time tasks on simple models and complex models respectively.
Leastlaxityfirst scheduling (Leastlaxityfirst) and the EDF algorithm can be regarded as the same type of scheduling algorithm. The task priority is the difference between the completion time limit and the task execution time minus the execution time of the periodic task. The LLF algorithm tries to avoid frequent waiting and execution of long-cycle tasks, and has less jitter.
Mosterrorfirst-tryoncediscard is a scheduling algorithm based on online acquisition of network-induced transmission errors and dynamic allocation of network bandwidth proposed by Walsh et al. [8].
The dynamic scheduling based on dead zones proposed by Otanez et al. [9] dynamically discards a certain ratio of data to reduce the load on the network while ensuring system performance. However, when multiple data packets that are allowed to access the network compete for network resources at the same time, this policy cannot determine the priority of data packet sending.
Dynamic scheduling based on business smoothing is Kewon and others who use business smoothing technology to control the traffic of the Ethernet network by inserting fixed-rate business smoothers and automatic Adapt the business smoother to limit the arrival rate of MAC layer data packets and ensure the boundedness of the network-induced delay, thereby improving the service quality of the network.
Priority improvement proposed by Cena et al.—Distributed priority Queuing scheduling (PP-DPQ) can ensure that the maximum interval of real-time data transmission has a definite upper bound, and non-real-time data competes fairly for network resources during transmission.
Time window-based dynamic scheduling (DynamicTimeWindow) is Raja's improvement on the time window-based static scheduling algorithm, and proposes priority cycle services and dynamic time window bandwidth allocation strategies.
Fuzzy dynamic scheduling is Bai Tao [13] and others who introduced fuzzy control theory into NCS information scheduling and used fuzzy logic based on IF2THEN rules to determine the priority of data transmission.
Hybrid Scheduling
Zuberi et al. proposed a hybrid communication scheduling (MTS) strategy for network control systems under CAN. When designing the scheduling strategy, considering the different real-time data requirements, different scheduling strategies can be adopted to improve the schedulability of network resources. The event-triggered real-time scheduling of annealing control tasks given by Tabuada et al. [27] is based on an event-triggered scheduler with feedback examples, and the conditions for how it guarantees system performance are given.
Co-design of scheduling and control
Currently, the co-design of control and scheduling has become a research hotspot and has received more and more attention. It can be roughly divided into open-loop scheduling and Feedback controls two aspects of real-time scheduling.
Open-loop scheduling
Scheduling of the sampling period and sampling time of data transmission nodes in each control loop in NCS
Hong based on "window" Concept, a scheduling algorithm is given that reduces the impact of delay and improves network utilization by scheduling sampling time, and establishes the constraint relationship between NCS control system performance and network performance. However, this algorithm is based on the scheduling of one-dimensional objects in the token ring system (tokenpassing system) and the polling system (polling system), and the type of information in the system is limited to periodic information. Kim et al. [16] proposed a sampling time scheduling algorithm suitable for multi-dimensional objects based on the same idea. Liu Luyuan et al. [17] proposed a scheduling algorithm that uses the remaining time window to schedule non-real-time data and improve network resource utilization.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What are the three categories of scheduling and control technologies for information transfer in computer networks?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



The open network system is an "all-channel communication network." An all-channel communication network is an all-round open communication network system in which all members can communicate and contact each other without restriction; in this communication network, the degree of centralization is low and the status difference between members is small. With high morale, members can express their opinions directly, freely and fully, which is conducive to brainstorming and improving the accuracy of communication. The disadvantage is that it can easily lead to low work efficiency.

The metropolitan area network is a public network; the metropolitan area network is a computer communication network established within a city, referred to as MAN, and is a broadband local area network. Due to the use of local area network technology with active switching elements, the transmission delay in the network is small. It can be used as a backbone network to connect hosts, databases, and LANs located in different locations in the same city to each other.

The resource sharing functions of computer networks include: 1. Hardware resource sharing, which can improve equipment utilization and avoid repeated investment in equipment; 2. Software resource sharing and data resource sharing, which can make full use of existing information resources and reduce the software development process. to avoid repeated construction of large databases; 3. Communication channel resource sharing means that the same channel can be used by multiple users at the same time, which can improve the utilization of channel resources.

A computer network system within a school is a local area network (LAN). A local area network is a network composed of multiple computers used in a small area. The coverage is usually limited to 10 kilometers. It belongs to a small-scale network established by a unit or department. LAN can be divided into wireless LAN and wired LAN. Wireless LAN can transmit audio, video, and text. Now many companies and campuses are using wireless LAN.

The most prominent feature of computer networks is resource sharing. Resource sharing is one of the main purposes for people to establish computer networks. Usually, the resources required by multiple users at the same time always exceed the number of actual physical resources of the system. However, using logical (or virtual) resource allocation to realize resource sharing can better handle this contradiction and improve the efficiency of computer use.

The topology of a computer network refers to the physical structure of nodes and lines formed by computers or equipment on the Internet and transmission media. It mainly includes star topology, bus topology, ring topology, tree topology, and hybrid topology. , network topology, switching power supply topology; among them, star network topology is the most widely used network topology.

Reasons for using an intranet: 1. Resource sharing, which can provide convenient sharing of software and hardware resources, especially in the direction of hardware resources. Office automation equipment such as printers and scanners are fully utilized. 2. Facilitate teamwork. Most modern LANs provide a platform that allows multiple users to work on the same file and always use the latest version. 3. It is easy to find information, and the intranet can be used as a place to place all trusted information. 4. Reduce management costs. With the help of the intranet, online forms can be easily provided, streamlining the work process from the beginning, and greatly improving work efficiency.

Many friends who use win7 system must have encountered the problem of network connection error 711. How to solve the problem of network connection error 711 in win7 system? Today, the editor will bring you a solution to the network connection error 711 on Windows 7 computers. How to solve the computer network connection error 711 in win7 system: 1. Open "Computer", find the "C:\Windows\System32\LogFiles folder, right-click and select Properties"; 2. Click "Security Options, select Advanced"; 3. Click "Owner", select "Edit"; 4. Select the account "aaa" currently in use and click OK; 5.