Use of neural networks in policing bursty traffic sources in Broadband ISDN ATM networks

被引:0
|
作者
Nleya, B
Mazana, N
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper discusses the possibility of using artificial neural networks to effectively police the user traffic irrespective of its nature in Broadband ISDN ATM networks. A multi-layer neural network is used to control the user's traffic parameters within their declared values in order to protect the network's resources. This is achieved by actually employing two neural networks in parallel. One is trained to learn (memorise) the characteristics of a compliant source, whereas the other is used to accurately estimate the characteristics (p.d.f) of the actual offered user traffic. The two are compared and in case of any incompliance an error signal is generated and the user forced to reduce or modify its traffic generation pattern or else risk some of its cells (violating) being discarded. The paper discusses the possible use of neural networks in policing user traffic in Broadband ATM networks.
引用
收藏
页码:411 / 414
页数:4
相关论文
共 50 条
  • [1] PERFORMANCE EVALUATION OF ATM MULTIPLEXING SCHEMES FOR BURSTY TRAFFIC SOURCES IN LOSSY ATM NETWORKS
    DESANCTIS, M
    COSTABILE, R
    [J]. MODELLING AND PERFORMANCE EVALUATION OF ATM TECHNOLOGY, 1993, 15 : 157 - 171
  • [2] Access control of bursty voice traffic in ATM networks
    City Univ of New York, New York, United States
    [J]. Comput Networks ISDN Syst, 10 (1411-1427):
  • [3] ANALYSIS OF INTERDEPARTURE PROCESSES FOR BURSTY TRAFFIC IN ATM NETWORKS
    OHBA, Y
    MURATA, M
    MIYAHARA, H
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1991, 9 (03) : 468 - 476
  • [4] ACCESS-CONTROL OF BURSTY VOICE TRAFFIC IN ATM NETWORKS
    HABIB, IW
    SAADAWI, TN
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1995, 27 (10): : 1411 - 1427
  • [5] Modeling of traffic sources in ATM networks
    Yuan, XH
    Ilyas, M
    [J]. IEEE SOUTHEASTCON 2002: PROCEEDINGS, 2002, : 82 - 87
  • [6] Policing method for Markovian traffic descriptors of VBR MPEG sources over ATM networks
    Yoo, SJ
    Kim, SD
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (02): : 70 - 76
  • [7] BLLB: A novel traffic policing mechanism for ATM networks
    Salamah, M
    Lababidi, H
    [J]. 8TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 2000, : 411 - 415
  • [8] Analysis of the leaky bucket algorithm for bursty sources in ATM networks
    Jiang, Zhigang
    Li, Lemin
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1995, 23 (01): : 8 - 14
  • [9] Phase assignment control for periodic and bursty sources in ATM networks
    Ishizaki, F
    Ohta, C
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 1999, E82B (07) : 1064 - 1068
  • [10] A NEW APPROXIMATION FOR ANALYZING THE MULTIPLEXING OF BURSTY SOURCES IN ATM NETWORKS
    MARAFIH, NM
    PICKHOLTZ, RL
    ZHANG, YQ
    [J]. TELECOMMUNICATION SYSTEMS, 1995, 4 (1-2) : 3 - 31