Leaky bucket mechanism with learning algorithm for ATM traffic policing

被引:0
|
作者
Atlasis, AF
Stassinopoulos, GI
Vasilakos, AV
机构
关键词
D O I
10.1109/ISCC.1997.615973
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traffic policing in ATM networks is one of the most critical preventive congestion control mechanisms. It intends to ensure that each source conforms to its traffic parameters negotiated during the Call Admission Control phase. In this paper, we enhance the known Leaky Bucket mechanism with a Learning Algorithm in order to police the distribution of the traffic, observing the values that the counter of the Leaky Bucket takes. As it will be shown, tighter and faster control is achieved by the proposed methodology, for any type of traffic source, resulting in more statistical gain and better guarantee of the QoS constraints.
引用
收藏
页码:68 / 72
页数:5
相关论文
共 50 条
  • [21] Priority leaky buckets with extra token pool for policing traffic in ATM networks
    Sermtechathavorn, K
    Benjapolakul, W
    GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 2419 - 2424
  • [22] BLLB: A novel traffic policing mechanism for ATM networks
    Salamah, M
    Lababidi, H
    8TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 2000, : 411 - 415
  • [23] A second-order leaky bucket algorithm to guarantee QOS in ATM networks
    Hluchyj, MG
    Yin, NY
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1090 - 1096
  • [24] Leaky bucket algorithm with penalty mechanisms for usage parameter control in ATM networks
    Chang, Chung-Ju
    Eul, Zohnshiun
    Chang, Chih-Sheng
    Journal of the Chinese Institute of Electrical Engineering, Transactions of the Chinese Institute of Engineers, Series E/Chung KuoTien Chi Kung Chieng Hsueh K'an, 2000, 7 (04): : 275 - 285
  • [26] The token-bank leaky bucket mechanism for group connections in ATM networks
    Wu, SL
    Chen, WSE
    1996 INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 1996, : 226 - 233
  • [27] Performance analysis of leaky-bucket bandwidth enforcement algorithm in ATM networks
    Guanghong, Lu
    High Technology Letters, 1997, 3 (01): : 54 - 58
  • [28] Traffic Policing Mechanism Based on The Token Bucket Method For Wimax Networks
    Moraes, Henaldo Barros
    Guardieiro, Paulo Roberto
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 885 - 890
  • [29] Fuzzy leaky bucket congestion control in ATM networks with Markovian and self-similar traffic
    Weng, JQ
    Lambadaris, I
    Devetsikiotis, M
    ICC'97: 1997 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - TOWARDS THE KNOWLEDGE MILLENNIUM, CONFERENCE RECORD - VOLS 1-3, 1997, : 838 - 843
  • [30] Performance characteristics of a packet-based leaky-bucket algorithm for ATM networks
    Ozawa, T
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1999, E82B (01) : 184 - 187