dc.contributor.author |
Atlasis Antonios, F |
en |
dc.contributor.author |
Stassinopoulos Georgios, I |
en |
dc.contributor.author |
Vasilakos Athanasios, V |
en |
dc.date.accessioned |
2014-03-01T02:41:28Z |
|
dc.date.available |
2014-03-01T02:41:28Z |
|
dc.date.issued |
1997 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/30478 |
|
dc.subject |
Atm Networks |
en |
dc.subject |
Call Admission Control |
en |
dc.subject |
Congestion Control |
en |
dc.subject |
Leaky Bucket |
en |
dc.subject |
Learning Algorithm |
en |
dc.subject.other |
Call admission control |
en |
dc.subject.other |
Leaky bucket mechanism |
en |
dc.subject.other |
Stochastic estimator learning algorithms (SELA) |
en |
dc.subject.other |
Computer simulation |
en |
dc.subject.other |
Congestion control (communication) |
en |
dc.subject.other |
Finite automata |
en |
dc.subject.other |
Learning algorithms |
en |
dc.subject.other |
Probability |
en |
dc.subject.other |
Random processes |
en |
dc.subject.other |
Telecommunication traffic |
en |
dc.subject.other |
Vectors |
en |
dc.subject.other |
Asynchronous transfer mode |
en |
dc.title |
Leaky bucket mechanism with learning algorithm for ATM traffic policing |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/ISCC.1997.615973 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/ISCC.1997.615973 |
en |
heal.publicationDate |
1997 |
en |
heal.abstract |
The traffic policing in ATM networks is one of the most critical preventive congestion control mechanisms. It intends to ensure that each source conforms to its traffic parameters negotiated during the Call Admission Control phase. In this paper, we enhance the known Leaky Bucket mechanism with a Learning Algorithm in order to police the distribution of the traffic, observing the values that the counter of the Leaky Bucket takes. As it will be shown, tighter and faster control is achieved by the proposed methodology for any type of traffic source, resulting in more statistical gain and better guarantee of the QoS constraints. |
en |
heal.journalName |
IEEE Symposium on Computers and Communications - Proceedings |
en |
dc.identifier.doi |
10.1109/ISCC.1997.615973 |
en |
dc.identifier.spage |
68 |
en |
dc.identifier.epage |
72 |
en |