{"title":"A fuzzy logic approach to congestion control in ATM networks","authors":"C. Douligeris, G. Develekos","doi":"10.1109/ICC.1995.524539","DOIUrl":null,"url":null,"abstract":"The principles of fuzzy logic are deployed to tackle the problem of congestion control, an issue that is of prime importance in a multiservice environment like B-ISDN. Using the leaky bucket and moving window mechanisms as building blocks, we develop a fuzzy rule-based system that is transparent to sources that, are compliant to the traffic contract, effective in shutting down noncompliant sources and quick to respond to mean and peak rate violations, as well as to peak rate violations that do not affect the mean rate, compared to the mechanisms previously proposed. The system is intuitive in concept, simple in its implementation and computationally efficient according to the restrictions imposed by the high-speed network environment it operates in.","PeriodicalId":241383,"journal":{"name":"Proceedings IEEE International Conference on Communications ICC '95","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1995-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"58","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE International Conference on Communications ICC '95","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC.1995.524539","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 58
Abstract
The principles of fuzzy logic are deployed to tackle the problem of congestion control, an issue that is of prime importance in a multiservice environment like B-ISDN. Using the leaky bucket and moving window mechanisms as building blocks, we develop a fuzzy rule-based system that is transparent to sources that, are compliant to the traffic contract, effective in shutting down noncompliant sources and quick to respond to mean and peak rate violations, as well as to peak rate violations that do not affect the mean rate, compared to the mechanisms previously proposed. The system is intuitive in concept, simple in its implementation and computationally efficient according to the restrictions imposed by the high-speed network environment it operates in.