An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network

Main Article Content

Somchai Lekcharoen

Abstract

When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it over°ows. In backpressure algorithm suitable for low traffic [1], it prevents buffer overflows. In backo® time in leaky bucket over traffic policing mechanism suitable for high traffic [2], Backoff time computations are wildly used in order to avoid the impact on the network performance. In this paper, we propose a fuzzy control double leaky bucket using backpressure and backoff time detects violations in parameter negotiation. We evaluate and compare the performance of a fuzzy control backpressure and backo® time in double-leaky bucket as a policing mechanism (FBBD), a leaky bucket (LB), a jumping window (JW), a triggered jumping window (TJW) and a double-leaky bucket (DLB). The performance of fuzzy control backpressure and backo® time in double-leaky bucket was investigated through fluctuations in telecommunications traffic streams (burst/silent type). Simulation results show that in VDSL frames, the fuzzy logic control system helps improve the performance of our fuzzy control double-leaky bucket using backpressure and backoff time schemes as a policing mechanism much better than conventional policing mechanism by about 25 % in terms of conforming and non-conforming frames once various types of burst/silence traffic are generated.

Article Details

How to Cite
Lekcharoen, S. (2007). An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network. ECTI Transactions on Electrical Engineering, Electronics, and Communications, 6(2), 107–116. https://doi.org/10.37936/ecti-eec.200862.171771
Section
Research Article

References

[1] S. Lekcharoen and C. Jittawiriyanukoon, "Scheduling and qos for backpressure over telecommunications network," in International Conference on Telecommunications and Computer Networks (TCN'05), pp. 56-60, 2005.

[2] S. Lekcharoen and C. Jittawiriyanukoon, "Deadlock of avoidance backo schemes in policing mechanisms," in IEE Proceedings of the International Mobility Conference (MobiCon '05), pp. 1-5, 2005.

[3] L. Ma and W. Nutt, "Frequency operators for condensative queries over data streams," in IEE International Conference on e-Business Engineering (ICEBE2005), pp. 518-525, 2005.

[4] A. AlWehaibi, A. Agarwal, S. AlWakeel, N-E. Rikli, and A. ElHakeem, "Performance behavior evaluation of internet congestion control policing mechanisms," in IEEE Canadian Conference on Electrical and Computer Engineering (IEEE CCECE2003), vol. 2, pp. 1017-1020, 2003.

[5] H. H. Takada and A. Anzaloni, "A multifractual traffc policing mechanism," in IEEE Communications Letters, vol. 10, pp. 120-122, 2006.

[6] L. Bajzik, L. Korossy, K. Veijalainen, and C. Vulkan, "Cross-layer backpressure to improve hsdpa performance," in IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5, 2006.

[7] G. Sapountzis and M. Katevenis, "Benes switching fabrics with o(n)-complexity internal backpressure," in Workshop on High Performance Switching and Routing (HPSR 2003), pp. 11-16,2003.

[8] A.Zolfaghari and S. J. Golestani, "Performance study of backpressured packet networks using a soft fluid flow model," in Canadian Conference on Electrical and Computer Engineering, pp. 55-60, 2005.

[9] S. Lekcharoen and C. Jittawiriyanukoon, "Qossensitive fuzzy backo schemes in policing mechanisms," in International Conference on Mobile Technology, Applications and Systems, 2005.

[10] K. Takahashi, "Performance analysis of a back o algorithm using finish tags in ieee 802.11 networks," in Conference Asia-Pacific, pp. 600-604.

[11] Byung-Jae Kwak, Nah-Oak Song, and Leonard E. Miller, "Performance analysis of exponential backoff," in IEEE/ACM Transactions on Networking(TON), pp. 343-355.

[12] Sebastia Galms and Ramon Puigjaner, "The response time distribution of a discrete-time queue under a generalized batch arrival process," in Proceedings of the 3rd international IFIP/ACM Latin American conference on Networking (LANC), pp. 31-39.

[13] L. Zhang, A. Vaidhiyanathan, and K. R. Subramanian, "Characterisation of singapore one atm network," in IEE Proceedings Communications.

[14] Sebastia Galms and Ramon Puigjaner, "An algorithm for computing the mean response time of a single server queue with generalized on/off trac arrivals," in ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '03).

[15] Vijay Raghunathan, Saurabh Ganeriwal, Mani Srivastava, and Curt Schurgers, "Energy ecient wireless packet scheduling and fair queuing," in ACM Transactions on Embedded Computing Systems (TECS), vol. 13, pp. 3-24.

[16] M. Salamah and H Lababidi, "A novel trac policing mechanism for atm networks," in International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 411-415.

[17] Martin A. Brown, "Double leaky bucket meter," http://linuxip.net/gl/tcng/node55.html.

[18] Cisco, "Cisco ons 15454 sonet/sdh ml¡series multilayer ethernet card software feature and configuration guide, release 4.6," http://www.cisco.com/univercd/cc/td/doc/product/ong/15400/r46docs/r46mlios/qos cf.htm.

[19] S. Lekcharoen and C. Jittawiriyanukoon, "Bandwidth contention with backpressure scheme over vdsl," in Network. International Journal of Computer Science and Network Security, pp. 12-20.

[20] P. Siripongwutikorn, S. Banerjee, and D. Tipper, "Fuzzy-based adaptive bandwidth control for loss guarantees," in IEEE Transactions on Neural Networks, pp. 1147-1162.

[21] Rose Qingyang Hu and David W. Petr, "A predictive self-tuning fuzzy-logic feedback rate controller," in IEEE/ACM transactions on networking, pp. 697-709.

[22] Chung-Ju Chang, Terng-Yuan Liu, and Fang Ching Ren, "Fuzzy/neural congestion control for integrated voice and data ds-cdma/frma cellular networks," in IEEE Journal on Selected Areas in
Communications, pp. 283-293.

[23] D-Link Corporation/D-Link Systems, "D-link dev3001 datasheet," http://www.dlink.pl/docs/datenblatt/DEV3001 datasheet en.pdf.

[24] ETSI, "The european telecommunications standards institute," http://www.etsi.org.