Home Technology Mathematical prediction model construction of network packet loss rate and nonlinear mapping user experience under the Internet of Things
Article Open Access

Mathematical prediction model construction of network packet loss rate and nonlinear mapping user experience under the Internet of Things

  • Bin Fan EMAIL logo and B. Nagaraj
Published/Copyright: September 26, 2023
Become an author with De Gruyter Brill

Abstract

In order to further improve the prediction accuracy, the network packet loss rate (PLR) prediction mathematical model based on the Internet of Things (IoTs) was proposed. First, the network data transmission module was established, and the network PLR prediction process was developed based on IoTs; second, the prediction framework of PLR was designed to obtain more accurate prior information. The relationship between PLR and user experience quality QoE is univariate and nonlinear. The mapping between PLR and user experience quality QoE is established using univariate nonlinear regression analysis; finally, a mathematical model of network PLR prediction is constructed to further improve the prediction accuracy. Experimental results show that the delays of network nodes are all within 5 s, which can ensure the real-time nature of data transmission. When the total number of packets and the number of lost packets are the same, the PLR predicted by the mathematical model designed by the authors is consistent with the actual PLR. Conclusion: The prediction effect of the model is better and has higher promotion value.

1 Introduction

The Internet of Things (IoTs) refers to the transfer of anything through information-sensing devices according to agreed protocols. The body is connected with the network, and the object carries on the information exchange and communication through the information media letter, to achieve intelligent identification, positioning, tracking, supervision, and other functions. In addition, the communication process of IoTs can use electromagnetic signals to transmit information or data, capable of obtaining relevant data more quickly. With the rapid development of the Internet, the number of Internet users has shown an explosive growth; however, the development speed of network infrastructure is far behind the growth rate of users. Wireless communication is the use of electromagnetic wave signals to transmit information, so that people can easily and quickly obtain the required information [1]. Wireless communication has penetrated into every corner of people’s lives, and with the maturity of technology, wireless communication technology has become a great driving force for human progress and technological development. Radio technology uses radio waves for signal transmission. The current changes in the conductor will generate radio waves. The information can be loaded onto the radio waves by modulation. The electric wave at the receiving end generates current in the conductor, and the information can be extracted through demodulation, thus completing the transmission of information [2]. The first-generation mobile communication system that appeared in the 1980s brought people into the era of wireless communication, changed people’s lifestyle, and promoted social development. So far, the mobile communication system has been updated again and again, and the communication quality has been improved continuously. However, in the wireless communication environment, the wireless channel becomes unstable due to the influence of noise interference, multipath effect, shadow effect, and other factors, and the energy of the signal will also weaken with the increase of transmission distance, making the transmission error rate higher, thus affecting the quality of data transmission. Wireless network operation environment is complex, nodes move rapidly, link bandwidth is unstable, and link-level packet loss is large, so link quality and link packet loss are the factors that must be considered by the upper-layer protocol. Although the spectrum analyzer can observe the signal fading characteristics of the actual link and then estimate the bit error ratio (BER) of the link, the BER does not fully reflect the packet loss rate (PLR). The packet of the wireless channel is composed of bit sequences of different lengths, and it is difficult to calculate the success rate of transmission of different length sequences only from the BER, so it is necessary to obtain the PLR by means of actual measurement, find its laws and characteristics, and provide direct support for upper-layer protocol design and service quality assurance [3]. By analyzing the detection data of PLR in the process of channel transmission and reception and some basic data of the surrounding environment, we can judge the change rule of PLR in the current situation and ensure the transmission of important information.

With the development of tactile Internet, Internet of Vehicles, industrial automation, remote surgery, and smart grid applications, the design of network control system puts forward higher requirements for the real time and reliability of the system. Therefore, how to realize real-time control in the future wireless network, that is, how to provide support for real-time wireless control of the network control system, has become the focus of current research. In the real-time network control system, wireless communication will inevitably experience deep fading, so when data passes through wireless channel (sensor – controller link – there is delay and data loss during the transmission of actuator link). At present, many studies have conducted relevant research and discussion on how to deal with the impact of delay and packet loss on system performance. First of all, in order to deal with the impact of network-induced delay on control performance, predictive control is widely used in existing research to compensate for communication delay. Network packet loss may have the following potential impacts on user experience and overall network performance: reduce user experience. Network packet loss may cause data transmission interruption, increased delay, or data corruption, thereby reducing user experience. For real-time applications such as voice calls, video streaming, and online games, lost data packets may cause audio or video interruptions, stuttering, or degraded image quality. For non-real-time applications such as Internet browsing and file transfer, lost data packets may lead to extended page loading time or file transfer errors. Impact application performance and network packet loss may affect application performance. The loss of critical data packets may result in abnormal application functionality or inability to function properly. For example, in remote desktop applications, lost data packets may cause control delays and command errors, thereby affecting users’ operations on remote computers. For large-scale distributed applications or cloud services, lost data packets may cause data consistency issues, task failures, or system crashes.

In the process of measuring the quality of prediction model, the prediction accuracy of PLR is the basis. This index is also a necessary index to evaluate the overall performance of the model by predicting packet loss. The mathematical model of network PLR prediction based on IoTs is designed. The method designed in this study can provide a reference for improving the quality of network service.

2 Literature review

Xie et al. mainly discuss a compensation technique for communication delays in networked control systems, considering a system with randomly varying transmission delays and uncertain process parameters; the system realizes the compensation of delay through its buffer at the actuator side and the state estimator at the controller side. At the same time, the authors propose a sufficient condition based on linear matrix inequality (LMI) to ensure the stability of NCS with compensation mechanism [4]. Duan et al. modeled NCS for the delay and packet loss caused by communication networks and proposed a class of memory-less controller feedback gains [5]. By solving a set of LMIs, the authors can derive the maximum allowable value of network delay for the system. The authors mainly propose the problem of co-design of wireless network and control system and analyze the influence of communication on system performance. At the same time, the communication delay and packet loss caused by the network are modeled, and the compensation technology for transmission delay is proposed. Therefore, how the network control system copes with the impact of delay and packet loss has become a key issue for subsequent research. A predictive control method with time delay estimation based on the random multi-hop routing protocol is proposed to transmit sensor and controller signals over wireless networks [6]. To cope with network-induced delays, an adaptive generalized predictive control based on the Kalman state estimator is proposed [7]. Kuc discussed the relationship between power consumption and real-time performance of communication control systems using short-range communication. In particular, in order to increase the impact of energy consumption and act in real time according to the consumption scenario, the author is a cooperative communication management model that can send data packets at the right time [8]. Góngora et al. aimed at real-time network control systems using short-packet communication, the close interaction between the control system and the communication system is studied, and the relationship between production planning and control and wireless resource consumption is explored [9]. Freshness of Information (AoI) proposed by Huang and Yang has emerged as an emerging metric for quantifying the freshness of received state updates, and it has attracted great attention from researchers [10]. The freshness of information is defined as the elapsed time since the generation time of the latest status update at the receiver, so it can better reflect the timeliness of the status update at the receiver. Since reducing the AoI at the receiver can effectively improve the control performance, the design of network control systems based on information freshness provides researchers with a new idea. Also, since the network control system will inevitably lead to delay and packet loss, the AoI at the receiver will be affected to a certain extent. Although IoTs has brought many conveniences to people’s daily lives, the rate of network packet loss has increased with the gradual increase in network traffic. In order to reduce network packet loss, the authors proposed a mathematical model for predicting network PLR based on IoTs.

3 Research methods

3.1 Establish network data transmission module

First, the network data transmission module is established, and the network PLR prediction process is developed based on IoTs. Second, the prediction framework of PLR is designed to obtain more accurate prior information; finally, the mathematical model of network PLR prediction is constructed to further improve the prediction accuracy. The network data transmission module is an important part of the prediction of the network PLR and adopts a task-driven mode to process parameters [11]. The realization mechanism of the data transmission module is divided into four steps, which are loading socket library, server initialization, Listen Thread Func monitoring thread, and Test Task thread. First, use the Init InstanceO function in the App to enable the loaded socket library to receive network data, add the WSA Startup function, create a socket, and initialize it before initialization. Second, use CServer D1g to increase the msocket variable into SOCKET, privatize the access authority of the socket library, increase the return value of the InitSocket function, and initialize the network server. When the socket generated by the msocket function is the same as the socket library, it means that the server is initialized successfully. Third, use the listen function to monitor the client, that is, the listening thread Listen Thread Func, and change the parameters through the listening thread to achieve the goal of monitoring multiple clients. In addition, the accept function in the listening thread can generate a new socket; at this time, the accept function is in the successful execution state, and the m_ISOK function becomes the TRUE function to determine the connection state between each client and the server. Fourth, each client sends a test task to the Test Task thread after a successful connection with the server, and its structure is RECVPARAM, which can pass parameters and sockets to transmission control protocol (TCP) to facilitate the use of related functions [12]. Since the network PLR is associated with the threshold of the data transmission module, after the threshold of the data packet is input, the test task is sent, and it can be judged whether the relevant parameters are input successfully. After success, start the communication connection between the server and the client. Through the aforementioned mechanism, data transmission is completed.

3.2 Develop a network PLR prediction process based on IoTs

IoTs is used to train and estimate network data in the network packet loss estimation phase. The process of calculating the amount of network packet loss is as follows: first, create a training-level estimate, obtain the network control data by calculating the background of IoTs, and pass the network connection in a slide step. Second, the prior information about the transmission probability of each link is used to obtain the predicted initial information of the network. In addition, the authors detect the package through sendback-to-back in IoT, the transmission probability of each network path is transmitted to the next sliding link, and the corresponding link transmission probability is found. The prior information obtained from it can be used as the input premise of the prediction step to achieve the goal of prediction. Third, in order to find the loss situation at a specific time point, resampling according to the obtained particle set, directly predict the target state, find the link transmission probability in the network sliding stage, and then obtain the state of the network transfer packet. Fourth, according to the probability value of each link in the sliding phase and the transmission probability of each link at the previous moment, predict the network PLR.

In the prediction stage of the network PLR, IoTs is used to train and predict the network data. The procedure for predicting the network PLR is as follows. First, the prediction training phase is created. Network observation data is obtained by statistics of the background traffic of IoTs, and the transmission probability of network links is obtained by sliding steps. Second, the initial particle set of network prediction is obtained by using the prior information of transmission probability of each link. In addition, this study transmits the transmission probability of each network path to the next sliding link through the sendback-to-back detection packet in IoTs to find the corresponding link transmission probability. The prior information obtained from it can be used as the input premise of the prediction step, thus achieving the goal of prediction. Third, in order to find the loss situation at a specific time point, resampling is conducted according to the obtained particle set to directly predict the target state, find the link transmission probability of the network sliding stage, and then obtain the state of the network transfer packet. Fourth, according to the probability value of each link in the sliding stage and the transmission probability of each link at the previous moment, the network PLR is predicted.

Using two test cases, verify that the data transfer module can be used when encountering obstacles – no normal transmission. Firstly, confirm that the server and client connections are normal based on the startup status of the transmission server and client. Second, the preconditions are the same as the expected results: enter the destination client address, click the start button, and wait for the result. The specific processes are as follows:

  1. Data collection: collect information related to network data packets generated by IoT devices or sensors. This information may include packet transmission timestamp, packet size, transmission path, and network topology.

  2. Feature extraction: extract features related to the network PLR from the collected data. For example, metrics such as packet transmission delay, loss count, and link load can be calculated as features.

  3. Data preprocessing: preprocess the extracted features to eliminate noise and outlier, making the data more suitable for model training. This can include data cleansing, feature normalization, missing value processing, and other steps.

  4. Data partitioning: divide the dataset into training and testing sets. The training set is used for model learning and parameter estimation, while the testing set is used to evaluate the performance of the model.

  5. Model selection: select a suitable prediction model to model the network PLR. Machine learning algorithms (such as regression, decision tree, and Random Forest) or statistical models (such as time-series analysis and Bayesian network) can be considered.

  6. Model training: use the training set to train the selected model. Depending on the selected model, it may be necessary to adjust the hyperparameters of the model and use appropriate optimization algorithms for model parameter estimation.

  7. Model evaluation: use a test set to evaluate the performance of the model. Various indicators can be used, such as root-mean-square deviation, mean absolute error, and coefficient of determination (R²), to measure the fit and accuracy of the model.

  8. Model optimization: based on the evaluation results, optimize and improve the model. This may include adjusting the model structure, improving feature extraction, and adding more training data.

  9. Prediction: use the trained model to predict the future network PLR. Predictions can be updated based on real-time collected data, and network configuration and resource allocation can be adjusted in a timely manner.

  10. Monitoring and adjustment: continuously monitor the prediction performance of the network PLR, and adjust and optimize the model and system as required to improve the prediction accuracy and network performance.

3.3 Design the frame of PLR prediction

In order to solve the problem of packet loss in the network, a prediction method is developed and a method for calculating the link PLR is proposed. When modeling, consider network conditions: some predictive models consider changes in network conditions during the modeling process. They may use variables such as latency and bandwidth as features and incorporate them into the model for modeling. Such a model can improve prediction performance by establishing more accurate correlations with changes in network conditions. Dynamic update models: some models can dynamically update predictions based on the real-time observed network conditions. For example, if latency or bandwidth changes, the model can adapt to new network conditions by retraining or adjusting parameters. This method can improve the adaptability and accuracy of the model. Figure 1 shows the link PLR predictions based on this model.

Figure 1 
                  Frame of PLR prediction.
Figure 1

Frame of PLR prediction.

As can be seen from Figure 1, the prediction framework is mainly composed of two parts: the first part is the training part, which uses the network measurement method to obtain prior information, and the second part is mainly for prediction, without sending data packets; the data packets can be sent to the destination node through the background traffic, and the network link PLR can be predicted by the acquired prior information [13]. If the network is unstable, it will lead to errors in the prediction results; therefore, the authors adopt the active transmission method to obtain the detection data packets of the prior information in advance. This process does not need to send detection packets, and the observation data can be obtained by relying on the background flow. Therefore, the logic tree topology T composed of nodes and links represented by V and E is first considered in the prediction, and T = ( V , E ) is obtained at this time, and the path from the source node S to the destination node D i can be represented by P ( S , D i ) . Since the sum of the link PLRs is 1, the link PLR can be obtained only by preliminary prediction of the link transmission probability. From M target nodes and N links, M equations can be obtained from source and target nodes containing N variables. The calculation model is as follows:

(1) P i = n = 1 K α n ,

where P i is the end-to-end path prediction result between the source node S and the destination node D i , K is the total number of network links, and α n is the predicted probability of link n. If M < N , the network packet loss prediction equation has no unique solution.

3.4 Establish the mapping between PLR and user experience quality QoE

The mathematical prediction model for network PLR may have some limitations and assumptions in its application. The following are some common limitations and assumptions: steady-state assumption – many mathematical prediction models assume that the network PLR is predicted under steady-state conditions. This means that the model assumes that the characteristics of the network (such as latency, bandwidth, and traffic) remain unchanged during the prediction period. However, in actual networks, these features may change, which may affect the accuracy of the model. Assume a specific distribution: some prediction models may assume that the arrival time and service time of data packets follow a specific probability distribution, such as Poisson distribution or exponential distribution. However, the distribution of actual network data may be more complex and may not fully comply with these assumptions. This may have a certain impact on the accuracy of the model. Based on the study of the impact of packet loss on the quality of user experience QoE, the mapping of PLR to video quality QoE is established. As we all know, the evaluation methods of QoE mainly include subjective methods and objective methods, which are very difficult to operate. Therefore, the objective QoE evaluation method will map the measured PLR to the user experience quality QoE, which becomes a new idea.

According to the scatter diagram of the relationship between the PLR and the peak signal-to-noise ratio (PSNR) value, it is found that there is a cubic relationship between the PLR and the PSNR value after matching the linear, square, mixed, logarithmic, power, cubic, and other models. Form: y = ax + bx2 + cx3 + d. Here, the regression equation is established: y = ax3 + bx2 + cx + d. From this expression, we can see that this is a univariate nonlinear equation, and the coefficient of the equation can be obtained using the univariate nonlinear fitting method. It can also be seen as the fitting of univariate third-order polynomial.

3.5 Build a mathematical model for network PLR prediction

The bit-level errors generated in the simulation can not only effectively improve the resilience of network packets, but also improve the prediction reliability. However, the interval of bit-level errors is long, which requires long-term observation, and the amount of computation increases accordingly. In order to further reduce the amount of calculation, the mathematical symbol of the packet loss state is defined, if the network packet is lost during transmission, its mathematical symbol is 0, and if the receiving end loses the packet, the mathematical symbol is 1. In order to reduce the computational cost, a hidden Markov model (HMM) is used to analyze the packet loss state of digital signals and allocate the estimated packet loss state, and the calculation model is as follows:

(2) a 1 k = d k d 1 + d 2 + + d N ,

where a 1 k represents the network packet loss prediction state, d 1 + d 2 + + d N represents the HMM length corresponding to the error-free state, and d k represents the HMM length corresponding to the burst state k [14]. Substitute the packet loss state distribution model in (1) to obtain the network PLR prediction model as shown in Figure 2.

Figure 2 
                  Prediction model of network PLR.
Figure 2

Prediction model of network PLR.

3.6 PLR and retransmission rate

TCP provides a reliable transport protocol, and one way to use it is to accept data received from the other end. But both the data set and the confirmation message will disappear. TCP solves this problem by setting the time to send gas. If no notification is received when the timer expires, the data will be sent again. When multiple packets of the same window are lost, TCP transmission performance may be greatly affected. TCP uses a cumulative acknowledgment mechanism, forcing the sender to wait a round-trip time to find the lost packets. Although retransmitting unnecessary packets that may have been received can reduce overall throughput, most TCP congestion control algorithms, including the improved congestion control mechanism based on traditional TCP-Reno used by Windows and the default BIC and improved CUBIC used by Linux, do not use the selective acknowledgement (SACK) mechanism, that is, the data receiver can notify the sender of all successfully sent data packets, and the sender only needs to send the real lost data. Therefore, the phenomenon of retransmission still exists to a large extent. This is also the basis for most of the research on the PLR and the author’s use of retransmission to determine packet loss. This is because in the TCP transmission process, the transmission of payment information can be bidirectional or unidirectional. Therefore, a situation arises where the client only responds to the information sent by the server [15]. At this point, the number of contiguous packets sent by the client is the same, but the response number is different. Therefore, it cannot be judged that the message is retransmitted only based on the sequence number matching. Therefore, the retransmission message is defined as follows:

Definition 1: in a unidirectional TCP flow, a message with completely consistent message information is called a retransmission message.

Definition 2: the retransmission rate is the ratio of the number of retransmitted packets to all packets in a unidirectional TCP flow.

The specific formula is as follows (3):

(3) p rp = p resent packets = N r N s ,

where N r represents the number of retransmitted packets, and N s represents the total number of packets.

In the TCP transmission process, when the receiver receives an out-of-sequence segment, it will immediately generate an acknowledge character (ACK) (repeated ACK) to let the sender know that it has received an out-of-sequence segment and tell the sender the serial number it wants to receive. Therefore, the sender does not know whether a duplicate ACK is caused by a missing segment or just a segment reordering, which may only result in 1–2 duplicate ACKs. The repeated ACKs at this time are not due to packet loss. If the sender receives three or more ACKs, it determines that the packet has been lost and resends the lost data. This process is a TCP fast retransmission mechanism. At this point, the data packet returned by the sender is subject to packet loss, so the ACK packet returned by the receiver cannot be considered as packet loss. Also, if the P packet is dropped before the indicator, then the P packet and the subsequent return packet will appear on the indicator only once, and the drop of the P packet will be a packet return; if the packet P is lost after the indicator, the return packet P and the return packet can be found on the indicator; and if the packet is returned, the lost packet P can be found at this time. So there are the following points.

Definition 3: at the receiving end, after sorting a unidirectional TCP stream by sequence number, if the non-pure ACK packet P 2 is retransmitted after the packet P 1 , and the P 1 is not a retransmitted packet, the P 1 or P 2 is a packet loss packet.

According to this definition, if a retransmitted packet occurs after a non-retransmitted packet is observed, and the retransmitted packet is not a pure ACK packet, it is impossible to determine which packet is the lost packet, but it can be determined that the retransmitted packet is not a pure ACK packet – packet loss.

Packet loss will cause retransmission; therefore, it is a commonly used research method to estimate the PLR by counting retransmitted packets. Many previous studies were based on PLR; strictly speaking, it is actually based on the retransmission rate. Cllsen evaluates the PLR by comparing the number of retransmitted packets and the total number of packets; it also shows that for the TCP algorithm that does not use the SACK mechanism, this method, which is evaluated in terms of retransmission rate, may overestimate the PLR [16]. Under normal circumstances, when a packet loss occurs, the TCP sender will retransmit all the sent packets after the packet loss. Obviously, the number of retransmitted packets will be larger than the number of lost packets. Therefore, the retransmission rate should be related to the basic PLR, but there are different measures. Therefore, the authors start from the comparison between the retransmission rate and the PLR and, specifically, studies the relationship between the retransmission rate and the PLR.

Network data transmission module is an important part of network PLR prediction. Parameters are processed in task-driven mode using data transmission module implementation machine. The system is divided into four steps, namely, loading socket library, server initialization, ListenThreadFunc that listens to the wiretap, and TestTask wiretap. Receive Leigh Load socket library with InitInstanceO function in App Network data, add WSAStartup function, create socket before initialization Word, and initialize it. Second, use CServerD1g to increase msocket change Volume into SOCKET, privatize socket library access, and increase return Value InitSocket to initialize the network server. msocket generated by the function is the same as the socket library, representing server initialization Success. Thirdly, use the listening thread “ListenThreadFunc” to listen to clients, and achieve the goal of listening to multiple clients by changing the listening thread parameters. In addition, listen to the accept function in the thread, which can generate a new. The accept function is in the successful execution state, m_ISOK function. The change to TRUE function determines the connection status of each client to the server. Fourth, after each client successfully connects to the server, it sends the test task to the TestTask thread. Its RECVPARAM structure passes parameters and sockets to TCP, and sends test tasks after inputting packet thresholds. You can determine whether the related parameters are entered successfully. After the connection is successful, the connection between the server and the client is enabled – letter connection. Through the aforementioned mechanism, data transmission is completed.

3.7 Other related lateral degrees

3.7.1 First packet loss measurement

If the result of transition from a congestion-free network state to a congested state is to be evaluated, the object of interest is the loss of the first packet. It has been proven that the network is congested after the first packet is lost, and theoretically, more packet losses occur. Therefore, comparing the first PLR with the total PLR, it is possible to study the effectiveness of packet loss regulation, that is, theoretically, the total PLR will be greater than the initial PLR. Therefore, the authors will use this measurement, the original packet loss measurement, and compare it to the overall packet loss [17]. The specific definitions are as follows:

Definition 4: for a TCP flow with packet loss, the first packet loss is called the first packet loss.

Definition 5: the total number of packets sent before the first packet is lost is the number of packets sent before the first packet is lost.

According to Definition 5, if a TCP flow has packet loss, the packet forwarded before the first packet loss is the packet forwarded before the first packet loss; if no packet loss occurs in a TCP flow, the forwarded packets before the first packet loss are all the packets of this flow.

Definition 6: The ratio of the total number of the first packet loss to the total number of forwarded packets before the first packet loss is called the first PLR.

The specific formula is as follows:

(4) p fl = p firstloss = N f N fs ,

where N f is the total number of packets lost for the first time, and N fs is the total number of packets before the first packet loss, including the sum of the total number of packets in the flow without packet loss and the number of packets before the packet loss in the flow with packet loss.

For example, the following is two complete end-to-end TCP transmission processes with packet loss, as shown in Figure 3. Among them, sequence 1 is the TCP flow without packet loss, and the number of packets is n 1; sequence 2 is the TCP flow with packet loss, and the number of packets is n 2. Assuming that unordered factors are not taken into account, the sequence of TCP packets observed at the receiving end (i.e. sorted by time) can be distinguished by the following method:

Figure 3 
                     Sequence of messages sorted by time.
Figure 3

Sequence of messages sorted by time.

In sequence 2 of Figure 3, underlined messages indicate retransmission messages. The packet sequence obtained by sorting it according to the sequence number is shown in Figure 4.

Figure 4 
                     Message sequence sorted by message sequence number.
Figure 4

Message sequence sorted by message sequence number.

In sequence 2 of Figure 4, by definition 3, since t 4 is retransmitted and t 3 is not retransmitted, if t 4 is not a pure ACK packet, t 3 is a packet loss packet, which is represented by a*. If the observed objects are generally these two TCP streams, then according to definitions 2–3, the retransmission rate is 2 n 1 + n 2 ; according to definition 6, the first PLR parameter N f is 1, and the parameter N fs is all the packets marked with O, namely, n 1 + 3 , so the first PLR is 1 n 1 + n 3 .

3.7.2 Collector packet loss measurement

When data is collected based on passive measurement methods, the collection device may lose packets, which is a device packet loss, and this packet loss will have an impact on the calculation of the packet loss measure of the measured data. To reduce PLR error based on measurement data, consider the PLR measurement of the transport process as well as the collector PLR. All packages will be paid based on this. The packet loss measure of the collector is also a very important parameter to measure the performance of the collector, which is defined in the following.

Definition 7: the PLR is the ratio of the number of packets lost by the sender to the number of packets lost by the sender over all packets sent.

The specific calculation formula is as follows:

(5) p cl = p collector loss = N c N c + N w ,

where N c represents the number of packets lost by the collector, and N w represents the total number of packets sent by the sender observed at the collection point. Therefore, in practice, the total number of packets sent by the sender should be the sum of N c and N w . All the statistics of the relevant measures of the PLR of the authors are based on the compensation for the packet loss of the collector [18].

3.7.3 Out-of-order rate measurement

In the transmission of TCP packets, each packet carries a unique sequence number identifier. The TCP sequence numbers of network packets arriving in normal order should be non-decreasing; the network phenomenon that the arriving sequence numbers do not appear in the expected non-decreasing manner is called disorder.

The Internet usually uses parallel connections to reduce the cost of device or port aggregation and, at the same time, achieve load balancing to meet bandwidth requirements and improve the reliability of the network, which will not be affected by a single point of failure. But parallel connections can also cause routing instability. When the same data flow information has more than two forwarding paths or is allocated to multiple buffers for processing, if these paths have different transmission times or buffer service efficiency levels, the order of arrival of packets may be changed and disordered. The ever-increasing connection speed, the degree of parallelism between routers and switches, the support of QoS, and load balancing will all lead to an increase in the degree of disorder in the Internet in the future. A large number of out-of-order packets will have the following effects: (i) may cause unnecessary retransmission; (ii) make the TCP congestion window unable to grow regularly; (iii) the real packet loss may be masked and the retransmission efficiency is reduced; and (iv) the estimation of round-trip time is also affected, which greatly affects the performance of TCP. In practice, the ability of the receiver to restore the order of the packets is limited. In different aspects (such as the number of messages, the number of bytes, or the duration), the size of the receiver buffer is limited. If the out-of-order rate is too high, the received packets will be rejected by the receiver, resulting in packet loss. Therefore, the statistics of out-of-order rate measurement are also valuable for the study of PLR. In previous studies, the out-of-order rate is often used as an indicator to describe the packet rearrangement. However, this indicator is often vague and unclear, without a unified definition. For example, for the two groups of message sequences (1,3,4,2,5) and (1,4,3,2,5), there can be the following out-of-order explanations:

  1. The packets 2, 3, and 4 are out of order in the two sequences:

  2. The packets 2 and 3 in the two sequences are out of order;

  3. Packet 2 is out of order in the first sequence, and packets 2 and 3 are out of order in the second sequence;

  4. The packets 2, 3, and 4 are out of order in the first sequence, and the packets 4 and 2 in the second sequence are out of order.

There are many other metrics that avoid this ambiguity by defining to count only late or early packets. According to RFC5236, if the metric is only based on early packets, it cannot accurately capture the disorder caused by late packets; similarly, only based on late packets, it cannot accurately capture the disorder caused by early packets out of order [19]. Therefore, the complete out-of-order metric should include both early and late packets.

Out-of-order is clearly defined in RFC5236 as follows:

Definition 8: if the message sequence number is inconsistent with the next expected sequence number NextExp, record its out-of-order flag Type-P-Reordered as TRUE; otherwise, it is FALSE.

At the same time, the calculation formula of out-of-order rate is given as follows:

(6) R = Count of packets with Type P Reordered = TRUE L ,

where L represents the total number of received packets.

This is the currently widely accepted and accepted definition and calculation method of out-of-order rate. Based on the above criteria, it is necessary to determine the disorder rate after determining the disorder and count all disorder groups. This is also the definition used by the authors.

4 Results analysis

4.1 Test process

Using two test cases, verify that the data transfer module can transfer normally when it encounters obstacles. First, the precondition is to perform a piling test on the client, the data transmission server and the client are both enabled, and the link between the server and the client is normal. Second, the prerequisites are the same as expected: increase the amount of data to 5,000, enter the address of the target user, click the start button, and wait for the result [20]. The authors modeled the slow data transmission in the complex network environment in the platform as shown in Figure 5.

Figure 5 
                  Data transmission delay in complex network environment.
Figure 5

Data transmission delay in complex network environment.

Under normal circumstances, the data transmission delay can ensure the real-time performance of network data packet transmission within 5 s. As shown in Figure 5, the delays of network nodes are all within 5 s, so the real-time nature of data transmission can be guaranteed.

4.2 Test results

To analyze the network packet loss problem of the model developed by the authors, the data loss rate (PLR) is calculated and the model is as follows:

(7) PLR = lost packets total × 100 % ,

where PLR represents the packet loss rate of data packets, the number of data packets lost in the estimated path, and the total data text packet in a predictable manner. The test results are shown in Table 1.

Table 1

Test results

Frequency Total packets (pcs) Lost packets (pc) Actual PLR (%) The PLR predicted by the mathematical model designed by the authors (%)
1 1,243 100 8.05 8.05
2 1,526 168 11 11
3 2,458 358 14.57 14.57
4 3,569 1,437 40.27 40.27
5 4,235 2,569 60.67 60.67
6 5,000 3,521 70.43 70.43

Based on the data in Table 1, we can observe that the predicted PLR of the mathematical model designed in this study is consistent with the actual PLR when the total number of packets is the same as the number of lost packets. This consistent result indicates that the mathematical model designed in this study has precise characteristics in predicting network PLR. This consistent result means that our mathematical model can accurately capture the factors that cause network packet loss and effectively predict packet loss events. The consistency between the predicted results of the model and the actual observed values proves the effectiveness and accuracy of the model.

When the total data packets and the number of lost data packets are the same, the PLR predicted by the mathematical model is consistent with the actual PLR. The mathematical model designed in this study has the characteristic of accurate prediction effect.

The mathematical prediction model for network PLR may perform better in specific scenarios or network configurations, while it may not reach its optimal state in other situations. The following are some examples of specific scenarios and network configurations that may cause the model to fail to reach the optimal state: complex network topology. If the network has a complex topology, such as large-scale distributed systems or multi-level networks, traditional mathematical prediction models may not accurately capture the changes and propagation of network PLR. This is because these models are usually based on simplified assumptions and topological structures, while ignoring the complexity of network topology. In a highly dynamic network environment, traditional mathematical prediction models may not be able to adapt to changes in a timely manner, such as significant fluctuations in link quality and sudden increases in traffic. This is because these models are typically based on steady-state assumptions and historical data for prediction, and in highly dynamic environments, models may need to be updated and adjusted more frequently. When facing these specific scenarios or network configurations, targeted adjustments or selection of more suitable prediction models may be necessary. This may include adopting more complex models, considering more network features, adding more training data, or using models specifically tailored to specific scenarios. Taking into account network conditions and model characteristics, selecting a suitable prediction model can improve the accuracy and reliability of predictions.

5 Conclusion

Objects exchange information and communicate through information media letter, to achieve intelligent identification, positioning, tracking, supervision, and other functions. In addition, the communication process of IoTs can use electromagnetic signals to transmit information or data, capable of obtaining relevant data more quickly. IoTs for people’s daily life brings a lot of convenience, but as the network load gradually increases, the network is lost and the packet rate is getting higher and higher. In order to reduce the network PLR, a new method was based on the mathematical model of network PLR prediction in IoTs. The authors study net neutrality from local to global. Locally, through external observation, the improved link neutrality determination algorithm is used to obtain the non-neutral link sequence in the network; the improved algorithm is more accurate than the original algorithm to a certain extent. On the other hand, cross-sectional analysis examines the changes in Internet service provider Internet crime over time and place using loss rates. When evaluating the strengths and weaknesses of a prediction model, the prediction accuracy of the PLR is a convenient indicator, and it is a suitable indicator to evaluate the overall performance of the model. Accurate estimation of packet loss can provide information to improve the quality of network service. The authors wish to refer to related research and developed a mathematical model to estimate the network packet loss based on the IoTs network.

  1. Funding information: The authors state no funding involved.

  2. Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  3. Conflict of interest: The authors state no conflict of interest.

References

[1] Leong YR, Tajudeen FP, Yeong WC. Bibliometric and content analysis of the internet of things research: A social science perspective. Online Inf Rev. 2021;45(6):1148–66.10.1108/OIR-08-2020-0358Search in Google Scholar

[2] Roda-Sanchez L, Olivares T, Garrido-Hidalgo C, Vara J, Fernández-Caballero A. Human-robot interaction in industry 4.0 based on an internet of things real-time gesture control system. Integr Comput Eng. 2021;28(2):1–17.10.3233/ICA-200637Search in Google Scholar

[3] Sharma SK, Khuntia B. Integrated security for data transfer and access control using authentication and cryptography technique for internet of things. Int J Knowl Intell Eng Syst. 2021;24(4):303–9.10.3233/KES-190116Search in Google Scholar

[4] Xie H, Wang Y, Gao Z, Ganthia B, Truong C. Research on frequency parameter detection of frequency shifted track circuit based on nonlinear algorithm. Nonlinear Eng. 2021;10(1):592–9.10.1515/nleng-2021-0050Search in Google Scholar

[5] Duan Z, Wang L, Sun M. Efficient heuristics for learning Bayesian network from labeled and unlabeled data. Intell Data Anal. 2020;24(2):385–408.10.3233/IDA-194509Search in Google Scholar

[6] Gupta R, Singh YN. Trust estimation in peer-to-peer network using blue. Peer-to-Peer Netw Appl. 2021;14(4):103–5.10.1007/s12083-020-01049-3Search in Google Scholar

[7] Sharma A, Kumar R. Performance comparison and detailed study of AODV, DSDV, DSR, TORA and OLSR routing protocols in ad hoc networks. Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC); 2016 Dec 22–24; Waknaghat, India. IEEE, 2016.10.1109/PDGC.2016.7913218Search in Google Scholar

[8] Kuc R. Artificial neural network classification of surface reflectors and volume scatterers using sequential echoes acquired with a biomimetic audible sonar. J Acoust Soc Am. 2020;147(4):2357–64.10.1121/10.0001083Search in Google Scholar PubMed

[9] Góngora DM, Caneghem JV, Haeseldonckx D, Leyva EG, Mendoza MR, Dutta A. Post-combustion artificial neural network modeling of nickel-producing multiple hearth furnace. Int J Chem React Eng. 2020;18(7):5–6.10.1515/ijcre-2019-0191Search in Google Scholar

[10] Huang R, Yang X. The application of TiO2 and noble metal nanomaterials in tele materials. J Ceram Process Res. 2022;23(2):213–20.Search in Google Scholar

[11] Lan H, Lan H, Xu J, Xu J, Wang Q, Wang Q, et al. Packet loss measurement based on sampled flow. Symmetry. 2021;13(11):2149–58.10.3390/sym13112149Search in Google Scholar

[12] Yang H, Riley GF, Blough DM. Stereos: Smart table entry eviction for openflow switches. IEEE J Sel Areas Commun. 2020;38(2):377–88.10.1109/JSAC.2019.2959184Search in Google Scholar

[13] Zhang S. Link loss inference algorithm with network topology aware in communication networks. Math Probl Eng. 2020;2020(1):1–10.10.1155/2020/5836248Search in Google Scholar

[14] Subramani M, Kumaravelu VB. A three-stage fuzzy-logic-based handover necessity estimation and target network selection scheme for next generation heterogeneous networks. J Circuits Syst Comput. 2020;29(06):261–85.10.1142/S0218126620500929Search in Google Scholar

[15] Tianwei LU, Yao E, Liu S, Zhou W. Short-time forecast of entrance and exit passenger flow for new line of urban rail transit during growth period. Tiedao Xuebao/J Chin Railway Soc. 2020;42(5):19–28.Search in Google Scholar

[16] Xiao Y, Tian X, Liu JJ, Cao G, Dong Q. Tourism traffic demand prediction using google trends based on eemd-dbn. Engineering. 2020;12(3):194–215.10.4236/eng.2020.123016Search in Google Scholar

[17] Quijano-Quiones RF, Guadarrama-Moreno J, Quesadas-Rojas M, Mena-Rejón GJ, Cáceres-Castillo D. The origin of the regiospecificity of acrolein dimerization. RSC Adv. 2021;11(13):7459–65.10.1039/D0RA10084FSearch in Google Scholar

[18] Tan L, Su W, Miao J, Zhang W. Findint: detect and locate the lost in-band network telemetry packet. IEEE Netw Lett PP. 2021;99:1.10.1109/LNET.2021.3067343Search in Google Scholar

[19] Kabanikhin S, Krivorotko O, Bektemessov Z, Bektemessov M, Zhang S. Differential evolution algorithm of solving an inverse problem for the spatial Solow mathematical model. J Inverse Ill-Posed Probl. 2020;28(5):761–74.10.1515/jiip-2020-0108Search in Google Scholar

[20] Pollack K, Bongaerts JC. Mathematical model on the integration of renewable energy in the mining industry. Int J Energy Sect Manag. 2020;14(1):229–47.10.1108/IJESM-12-2018-0006Search in Google Scholar

Received: 2023-03-26
Revised: 2023-07-14
Accepted: 2023-07-28
Published Online: 2023-09-26

© 2023 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Research Articles
  2. The regularization of spectral methods for hyperbolic Volterra integrodifferential equations with fractional power elliptic operator
  3. Analytical and numerical study for the generalized q-deformed sinh-Gordon equation
  4. Dynamics and attitude control of space-based synthetic aperture radar
  5. A new optimal multistep optimal homotopy asymptotic method to solve nonlinear system of two biological species
  6. Dynamical aspects of transient electro-osmotic flow of Burgers' fluid with zeta potential in cylindrical tube
  7. Self-optimization examination system based on improved particle swarm optimization
  8. Overlapping grid SQLM for third-grade modified nanofluid flow deformed by porous stretchable/shrinkable Riga plate
  9. Research on indoor localization algorithm based on time unsynchronization
  10. Performance evaluation and optimization of fixture adapter for oil drilling top drives
  11. Nonlinear adaptive sliding mode control with application to quadcopters
  12. Numerical simulation of Burgers’ equations via quartic HB-spline DQM
  13. Bond performance between recycled concrete and steel bar after high temperature
  14. Deformable Laplace transform and its applications
  15. A comparative study for the numerical approximation of 1D and 2D hyperbolic telegraph equations with UAT and UAH tension B-spline DQM
  16. Numerical approximations of CNLS equations via UAH tension B-spline DQM
  17. Nonlinear numerical simulation of bond performance between recycled concrete and corroded steel bars
  18. An iterative approach using Sawi transform for fractional telegraph equation in diversified dimensions
  19. Investigation of magnetized convection for second-grade nanofluids via Prabhakar differentiation
  20. Influence of the blade size on the dynamic characteristic damage identification of wind turbine blades
  21. Cilia and electroosmosis induced double diffusive transport of hybrid nanofluids through microchannel and entropy analysis
  22. Semi-analytical approximation of time-fractional telegraph equation via natural transform in Caputo derivative
  23. Analytical solutions of fractional couple stress fluid flow for an engineering problem
  24. Simulations of fractional time-derivative against proportional time-delay for solving and investigating the generalized perturbed-KdV equation
  25. Pricing weather derivatives in an uncertain environment
  26. Variational principles for a double Rayleigh beam system undergoing vibrations and connected by a nonlinear Winkler–Pasternak elastic layer
  27. Novel soliton structures of truncated M-fractional (4+1)-dim Fokas wave model
  28. Safety decision analysis of collapse accident based on “accident tree–analytic hierarchy process”
  29. Derivation of septic B-spline function in n-dimensional to solve n-dimensional partial differential equations
  30. Development of a gray box system identification model to estimate the parameters affecting traffic accidents
  31. Homotopy analysis method for discrete quasi-reversibility mollification method of nonhomogeneous backward heat conduction problem
  32. New kink-periodic and convex–concave-periodic solutions to the modified regularized long wave equation by means of modified rational trigonometric–hyperbolic functions
  33. Explicit Chebyshev Petrov–Galerkin scheme for time-fractional fourth-order uniform Euler–Bernoulli pinned–pinned beam equation
  34. NASA DART mission: A preliminary mathematical dynamical model and its nonlinear circuit emulation
  35. Nonlinear dynamic responses of ballasted railway tracks using concrete sleepers incorporated with reinforced fibres and pre-treated crumb rubber
  36. Two-component excitation governance of giant wave clusters with the partially nonlocal nonlinearity
  37. Bifurcation analysis and control of the valve-controlled hydraulic cylinder system
  38. Engineering fault intelligent monitoring system based on Internet of Things and GIS
  39. Traveling wave solutions of the generalized scale-invariant analog of the KdV equation by tanh–coth method
  40. Electric vehicle wireless charging system for the foreign object detection with the inducted coil with magnetic field variation
  41. Dynamical structures of wave front to the fractional generalized equal width-Burgers model via two analytic schemes: Effects of parameters and fractionality
  42. Theoretical and numerical analysis of nonlinear Boussinesq equation under fractal fractional derivative
  43. Research on the artificial control method of the gas nuclei spectrum in the small-scale experimental pool under atmospheric pressure
  44. Mathematical analysis of the transmission dynamics of viral infection with effective control policies via fractional derivative
  45. On duality principles and related convex dual formulations suitable for local and global non-convex variational optimization
  46. Study on the breaking characteristics of glass-like brittle materials
  47. The construction and development of economic education model in universities based on the spatial Durbin model
  48. Homoclinic breather, periodic wave, lump solution, and M-shaped rational solutions for cold bosonic atoms in a zig-zag optical lattice
  49. Fractional insights into Zika virus transmission: Exploring preventive measures from a dynamical perspective
  50. Rapid Communication
  51. Influence of joint flexibility on buckling analysis of free–free beams
  52. Special Issue: Recent trends and emergence of technology in nonlinear engineering and its applications - Part II
  53. Research on optimization of crane fault predictive control system based on data mining
  54. Nonlinear computer image scene and target information extraction based on big data technology
  55. Nonlinear analysis and processing of software development data under Internet of things monitoring system
  56. Nonlinear remote monitoring system of manipulator based on network communication technology
  57. Nonlinear bridge deflection monitoring and prediction system based on network communication
  58. Cross-modal multi-label image classification modeling and recognition based on nonlinear
  59. Application of nonlinear clustering optimization algorithm in web data mining of cloud computing
  60. Optimization of information acquisition security of broadband carrier communication based on linear equation
  61. A review of tiger conservation studies using nonlinear trajectory: A telemetry data approach
  62. Multiwireless sensors for electrical measurement based on nonlinear improved data fusion algorithm
  63. Realization of optimization design of electromechanical integration PLC program system based on 3D model
  64. Research on nonlinear tracking and evaluation of sports 3D vision action
  65. Analysis of bridge vibration response for identification of bridge damage using BP neural network
  66. Numerical analysis of vibration response of elastic tube bundle of heat exchanger based on fluid structure coupling analysis
  67. Establishment of nonlinear network security situational awareness model based on random forest under the background of big data
  68. Research and implementation of non-linear management and monitoring system for classified information network
  69. Study of time-fractional delayed differential equations via new integral transform-based variation iteration technique
  70. Exhaustive study on post effect processing of 3D image based on nonlinear digital watermarking algorithm
  71. A versatile dynamic noise control framework based on computer simulation and modeling
  72. A novel hybrid ensemble convolutional neural network for face recognition by optimizing hyperparameters
  73. Numerical analysis of uneven settlement of highway subgrade based on nonlinear algorithm
  74. Experimental design and data analysis and optimization of mechanical condition diagnosis for transformer sets
  75. Special Issue: Reliable and Robust Fuzzy Logic Control System for Industry 4.0
  76. Framework for identifying network attacks through packet inspection using machine learning
  77. Convolutional neural network for UAV image processing and navigation in tree plantations based on deep learning
  78. Analysis of multimedia technology and mobile learning in English teaching in colleges and universities
  79. A deep learning-based mathematical modeling strategy for classifying musical genres in musical industry
  80. An effective framework to improve the managerial activities in global software development
  81. Simulation of three-dimensional temperature field in high-frequency welding based on nonlinear finite element method
  82. Multi-objective optimization model of transmission error of nonlinear dynamic load of double helical gears
  83. Fault diagnosis of electrical equipment based on virtual simulation technology
  84. Application of fractional-order nonlinear equations in coordinated control of multi-agent systems
  85. Research on railroad locomotive driving safety assistance technology based on electromechanical coupling analysis
  86. Risk assessment of computer network information using a proposed approach: Fuzzy hierarchical reasoning model based on scientific inversion parallel programming
  87. Special Issue: Dynamic Engineering and Control Methods for the Nonlinear Systems - Part I
  88. The application of iterative hard threshold algorithm based on nonlinear optimal compression sensing and electronic information technology in the field of automatic control
  89. Equilibrium stability of dynamic duopoly Cournot game under heterogeneous strategies, asymmetric information, and one-way R&D spillovers
  90. Mathematical prediction model construction of network packet loss rate and nonlinear mapping user experience under the Internet of Things
  91. Target recognition and detection system based on sensor and nonlinear machine vision fusion
  92. Risk analysis of bridge ship collision based on AIS data model and nonlinear finite element
  93. Video face target detection and tracking algorithm based on nonlinear sequence Monte Carlo filtering technique
  94. Adaptive fuzzy extended state observer for a class of nonlinear systems with output constraint
Downloaded on 31.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/nleng-2022-0309/html
Scroll to top button