Credit Token Leaky Bucket algorithm with fuzzy logic in ATM networks

被引:0
作者
Pinaikul, S [1 ]
Benjapolakul, W [1 ]
机构
[1] Chulalongkorn Univ, Fac Engn, Dept Elect Engn, Bangkok 10330, Thailand
来源
NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS | 2001年
关键词
D O I
10.1109/ICON.2001.962357
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new model of Leaky Bucket (LB) called Credit Token Leaky Bucket (CTLB). Since the leaky rate of conventional LB is more than the negotiated mean cell rate, the performance of Usage Parameter Control (UPC) depends on the burstiness of source and the statistical characteristics of cell stream passing through UPC. Therefore, the lower performance, easily caused by malicious user, may happen. In practical application, fuzzy logic is chosen to be an artificial intelligent part which makes this mechanism work dynamically. Simulation results obviously show that the sensitivity of this proposed algorithm is better than that of conventional LB and is also close to that of ideal UPC. Furthermore, in the simulation results, CTLB returns fewer excessive cells going into ATM networks than the conventional LB does, while CTLB maintains the negotiated Quality of Service (QOS) for conformable sources, it passes cells without delay and still works with acceptable sensitivity.
引用
收藏
页码:296 / 301
页数:4
相关论文
共 9 条
[1]  
[Anonymous], 1997, COMPUTATIONAL APPROA
[2]  
CATANIA V, 1995, GLOB TEL C 1995 GLOB, V2, P1338
[3]  
JIANG Z, 1996, COMM TECHN P 1996 IC, V1, P24
[4]  
JIANG Z, 1997, P 1997 IEEE INT S, V1, P669
[5]  
Law A. M. E., 1991, SIMULATION MODELING
[6]   MODELING AND PERFORMANCE COMPARISON OF POLICING MECHANISMS FOR ATM NETWORKS [J].
RATHGEB, EP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1991, 9 (03) :325-334
[7]  
Vakil F., 1991, IEEE LTS, V2, P55, DOI 10.1109/80.93306
[8]  
YANG T, 1992, GLOBECOM 92 COMMUNIC, V1, P511
[9]  
YIN N, 1991, GLOB TEL C 1991 GLOB, V1, P254