{"title":"基于模糊逻辑的ATM网络拥塞控制","authors":"C. Douligeris, G. Develekos","doi":"10.1109/ICC.1995.524539","DOIUrl":null,"url":null,"abstract":"The principles of fuzzy logic are deployed to tackle the problem of congestion control, an issue that is of prime importance in a multiservice environment like B-ISDN. Using the leaky bucket and moving window mechanisms as building blocks, we develop a fuzzy rule-based system that is transparent to sources that, are compliant to the traffic contract, effective in shutting down noncompliant sources and quick to respond to mean and peak rate violations, as well as to peak rate violations that do not affect the mean rate, compared to the mechanisms previously proposed. The system is intuitive in concept, simple in its implementation and computationally efficient according to the restrictions imposed by the high-speed network environment it operates in.","PeriodicalId":241383,"journal":{"name":"Proceedings IEEE International Conference on Communications ICC '95","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1995-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"58","resultStr":"{\"title\":\"A fuzzy logic approach to congestion control in ATM networks\",\"authors\":\"C. Douligeris, G. Develekos\",\"doi\":\"10.1109/ICC.1995.524539\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The principles of fuzzy logic are deployed to tackle the problem of congestion control, an issue that is of prime importance in a multiservice environment like B-ISDN. Using the leaky bucket and moving window mechanisms as building blocks, we develop a fuzzy rule-based system that is transparent to sources that, are compliant to the traffic contract, effective in shutting down noncompliant sources and quick to respond to mean and peak rate violations, as well as to peak rate violations that do not affect the mean rate, compared to the mechanisms previously proposed. The system is intuitive in concept, simple in its implementation and computationally efficient according to the restrictions imposed by the high-speed network environment it operates in.\",\"PeriodicalId\":241383,\"journal\":{\"name\":\"Proceedings IEEE International Conference on Communications ICC '95\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1995-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"58\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings IEEE International Conference on Communications ICC '95\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICC.1995.524539\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE International Conference on Communications ICC '95","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC.1995.524539","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A fuzzy logic approach to congestion control in ATM networks
The principles of fuzzy logic are deployed to tackle the problem of congestion control, an issue that is of prime importance in a multiservice environment like B-ISDN. Using the leaky bucket and moving window mechanisms as building blocks, we develop a fuzzy rule-based system that is transparent to sources that, are compliant to the traffic contract, effective in shutting down noncompliant sources and quick to respond to mean and peak rate violations, as well as to peak rate violations that do not affect the mean rate, compared to the mechanisms previously proposed. The system is intuitive in concept, simple in its implementation and computationally efficient according to the restrictions imposed by the high-speed network environment it operates in.