{"title":"ATM网络中模糊逻辑信用令牌漏桶算法","authors":"Sunya Pinaikul, W. Benjapolakul","doi":"10.1109/ICON.2001.962357","DOIUrl":null,"url":null,"abstract":"This paper proposes a new model of leaky bucket (LB) called credit token leaky bucket (CTLB). Since the leaky rate of conventional LB is more than the negotiated mean cell rate, the performance of usage parameter control (UPC) depends on the burstiness of source and the statistical characteristics of cell stream passing through UPC. Therefore, lower performance, easily caused by a malicious user, may happen. In practical application fuzzy logic is chosen to be an artificial intelligent part which makes this mechanism work dynamically. Simulation results obviously show that the sensitivity of this proposed algorithm is better than that of conventional LB and is also close to that of ideal UPC. Furthermore, in the simulation results, CTLB returns fewer excessive cells going into ATM networks than the conventional LB does, while CTLB maintains the negotiated quality of service (QoS) for conformable sources, it passes cells without delay and still works with acceptable sensitivity.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Credit token leaky bucket algorithm with fuzzy logic in ATM networks\",\"authors\":\"Sunya Pinaikul, W. Benjapolakul\",\"doi\":\"10.1109/ICON.2001.962357\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a new model of leaky bucket (LB) called credit token leaky bucket (CTLB). Since the leaky rate of conventional LB is more than the negotiated mean cell rate, the performance of usage parameter control (UPC) depends on the burstiness of source and the statistical characteristics of cell stream passing through UPC. Therefore, lower performance, easily caused by a malicious user, may happen. In practical application fuzzy logic is chosen to be an artificial intelligent part which makes this mechanism work dynamically. Simulation results obviously show that the sensitivity of this proposed algorithm is better than that of conventional LB and is also close to that of ideal UPC. Furthermore, in the simulation results, CTLB returns fewer excessive cells going into ATM networks than the conventional LB does, while CTLB maintains the negotiated quality of service (QoS) for conformable sources, it passes cells without delay and still works with acceptable sensitivity.\",\"PeriodicalId\":178842,\"journal\":{\"name\":\"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICON.2001.962357\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICON.2001.962357","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Credit token leaky bucket algorithm with fuzzy logic in ATM networks
This paper proposes a new model of leaky bucket (LB) called credit token leaky bucket (CTLB). Since the leaky rate of conventional LB is more than the negotiated mean cell rate, the performance of usage parameter control (UPC) depends on the burstiness of source and the statistical characteristics of cell stream passing through UPC. Therefore, lower performance, easily caused by a malicious user, may happen. In practical application fuzzy logic is chosen to be an artificial intelligent part which makes this mechanism work dynamically. Simulation results obviously show that the sensitivity of this proposed algorithm is better than that of conventional LB and is also close to that of ideal UPC. Furthermore, in the simulation results, CTLB returns fewer excessive cells going into ATM networks than the conventional LB does, while CTLB maintains the negotiated quality of service (QoS) for conformable sources, it passes cells without delay and still works with acceptable sensitivity.