HKUST Institutional Repository >
Electronic and Computer Engineering >
ECE Conference Papers >
Please use this identifier to cite or link to this item:
|Title: ||Fuzzy logic based ATM policing|
|Authors: ||Cheung, Kwan-Fai|
Tsang, Danny H. K.
Cheng, Chak C.
Liu, Chiu W.
|Keywords: ||Fuzzy logic (FL) based policer|
Leaky bucket (LB) based policer
|Issue Date: ||1994 |
|Citation: ||Proceedings of the IEEE ICCS '94, Singapore, November, 1994, p. 535-539|
|Abstract: ||In this paper, we will compare the performance of a fuzzy logic (FL) based policer with leaky bucket (LB) based policer. The FL based policer continuously computes the instantaneous drop-rate based on a collective evaluation of the compliance/violation level of the two parameters : (a) the ratio of the up-to-date mean burst length to the negotiated burst length, and (b) the ratio of the up-to-date mean bit rate to the negotiated mean bit rate. Compliance/violation of either of the two parameters results in an increase/decrease of the strength of the rules with consequence Pass/Drop. The throughput performance on policing mean bit rate and mean burst length of the FL based policers is compared with that based on LB based policers of different token pool sizes. Throughput performance curve of the FL based policer on policing mean bit rate is very close to the optimal performance curve of LB based policers, but significantly outperform LB based policers on policing mean burst length.|
|Rights: ||© 1994 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.|
|Appears in Collections:||ECE Conference Papers|
Files in This Item:
|iccs94.pdf||pre-published version||629Kb||Adobe PDF||View/Open|
All items in this Repository are protected by copyright, with all rights reserved.