Peak rate enforcement in ATM networks
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 2)
On the asymptotic behavior of heterogeneous statistical multiplexer with applications
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 2)
A comparative analysis of fuzzy versus conventional policing mechanisms for ATM networks
IEEE/ACM Transactions on Networking (TON)
A VLSI fuzzy expert system for real-time traffic control in ATM networks
IEEE Transactions on Fuzzy Systems
New directions in communications (or which way to the information age?)
IEEE Communications Magazine
Modeling and performance comparison of policing mechanisms for ATM networks
IEEE Journal on Selected Areas in Communications
Flow enforcement algorithms for ATM networks
IEEE Journal on Selected Areas in Communications
Equivalent capacity and its application to bandwidth allocation in high-speed networks
IEEE Journal on Selected Areas in Communications
A novel neural network traffic enforcement mechanism for ATM networks
IEEE Journal on Selected Areas in Communications
Fuzzy neural control of voice cells in ATM networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.24 |
Resource allocation algorithms in ATM networks operate on the basis of the value of certain source traffic descriptors and the extent to which the network resources are occupied. The different types of algorithms exhibit varying degrees of efficiency in estimating the resource to be allocated. However, the values any of them estimate will only be reliable if the traffic descriptors values remain, throughout the lifetime of the connections, the same as those negotiated in the call set-up phase. This can be guaranteed by a source traffic policing function which forces the traffic of any violating sources to respect the values negotiated. Unfortunately, a certain amount of excess traffic escapes the control of real policing mechanisms. This overloads the ATM switch for access to the network and consequently may cause an increase in the cell loss ratio. The article estimates the correction required by the CAC algorithm to avoid this risk. We compare two different policing mechanisms, one based on conventional logic and another on fuzzy logic, assessing the influence of their degree of selectivity on the additional bandwidth the CAC algorithm needs to reserve in order to guarantee the QoS requirements of all connections.