Skip to main content

An Application of Neuro-Fuzzy Systems for Access Control in Asynchronous Transfer Mode Networks

  • Chapter
  • 182 Accesses

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

Usage Parameter Control (UPC), or traffic policing in Asynchronous Transfer Mode (ATM) networks, aims at protecting the existing connection from violating the contract with Call Admission Control (CAC) in connection setup phase, in order to protect congestion and violation of the Quality of Service (QoS) of the other connections. UPC performs this, by having penalty measure to malicious users. Thus, UPC functions as the “police” in the ATM network. Many methods or mechanisms have been proposed to function as the traffic policing in ATM networks. These conventional mechanisms can be categorized into two trends: Leaky Bucket (LB) and window mechanisms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rathgeb E P (1991) Modeling and Performance Comparison of Policing Mechanisms for ATM Networks, IEEE J. Select. Areas in Commun., Vol. 9, No. 3, pp. 325–334.

    Article  Google Scholar 

  2. Butto M, Cavallero E, Tonietti A (1991) Effectiveness of the Leaky Bucket Policing Mechanism in ATM Networks, IEEE J. Select. Areas Commun., Vol. 9, No. 3, pp. 335–342.

    Article  Google Scholar 

  3. Tarraf A A, Habib I W, Saadawi T N (1994) A Novel Neural Network Traffic Enforcement Mechanism for ATM Networks, IEEE J. Select. Areas Commun., Vol. 12, No. 6, pp. 1088–1096.

    Article  Google Scholar 

  4. Ndousse T D (1994) Fuzzy Neural Control of Voice Cells in ATM Networks, IEEE J. Select. Areas Commun., Vol. 12, No. 9, pp. 1488–1494.

    Article  Google Scholar 

  5. Catania V, Ficili G, Palazzo S, Panno D (1995) A Fuzzy Expert System for Usage Parameter Control in ATM Networks, IEEE GLOBECOM’ 95, Vol. 2, pp. 1338–1342.

    Google Scholar 

  6. Catania V, Ficili G, Palazzo S, Panno D (1996) A Comparative Analysis of Fuzzy versus Conventional Policing Mechanism for ATM Networks, IEEE/ACM Trans. Networking, Vol. 4, pp. 449–459.

    Article  Google Scholar 

  7. Kwok A, McLeod R (1996) ATM Congestion Control using a Fuzzy Neural Network, Canadian Conference on Electrical and Computer Engineering, Vol. 2, pp. 814–817.

    Google Scholar 

  8. Runkler T A, Glesner Z E (1994) Efficient Algorithms for High Resolution Fuzzy Controllers with Piecewise Linearities. Proc. 3rd IEEE Conf. Fuzzy System, Vol. 1, pp. 189–191.

    Article  Google Scholar 

  9. Laongmal J, Benjapolakul W (1999) Aggregate Bandwidth Allocation of Heterogeneous Sources in ATM Networks, IEEE Symposium on Intelligent Signal Processing and Communication Systems, pp. 215–218.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Benjapolakul, W., Niruntasukrat, A. (2004). An Application of Neuro-Fuzzy Systems for Access Control in Asynchronous Transfer Mode Networks. In: Stavroulakis, P. (eds) Neuro-Fuzzy and Fuzzy-Neural Applications in Telecommunications. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18762-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18762-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-62281-6

  • Online ISBN: 978-3-642-18762-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics