A rough set control token leaky bucket in policing mechanism schemes over high speed network
Keywords:policing mechanism, rough set, rough set token leaky bucket, token, token LB, LB, RST, TLB, VDSL
The research objective is to evaluate and compare the differences between the rough set token leaky bucket (RST) and the leaky bucket (LB) as a policing mechanism in reference to traffic fluctuations on data networks. The original policing mechanism scheme has LB for traffic with a nearly constant burst and silence, however, when overflow occurs in the buffer router, incoming frames are dropped. We propose an RST in policing mechanism to help prevent the drop of incoming frames and to aid in the detection of violations in parameter negotiation. A rough set converts knowledge, which is expressed in an uncertain form to a certain form. The simulation results show that in very-high-bit-rate digital subscriber line (VDSL) frames, the rough set control system helps improve the performance of our RST as a policing mechanism better than traditional policing mechanisms by about 12% in terms of conforming and non-conforming frames on various types of the burst/silence traffic generated.
Aeron, A. (2010). Fine tuning of fuzzy token bucket scheme for congestion control in high speed networks. Second International Conference on Computer Engineering and Applications (ICCEA), 1, 170-174. DOI: 10.1109/ICCEA.2010.41
D-Link Corporation. (2016). Broadband modems and routers. Retrieved Feb 1, 2016, from http://www.dlink.com/xk/sq/home-solutions/connect/broadband-modems-and-routers
Fares, R., & Woodward, M. (2009). A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate. International Conference for Internet Technology and Secured Transactions, 1-6. DOI: 10.1109/ICITST.2009.5402596
Goswami, A., Pattanaik, K. K., Bharadwaj, A., & Bharti, S. (2014). Loss rate control mechanism for fan-in-burst traffic in data center network. Procedia Computer Science, 32, 125-132. DOI:10.1016/j.procs.2014.05.406
Kim, S., & Suh, C. (2015). Degrees of freedom of bursty multiple access channels with a relay. 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 322-328. DOI: 10.1109/ALLERTON.2015.7447022
Kim, S., Wang, I., & Suh, C. (2015). A relay can increase degrees of freedom in bursty mimo interference networks. IEEE International Symposium on Information Theory (ISIT), 1059-1063. DOI: 10.1109/ISIT.2015.7282617
Maratsolas, E., Koutsakis. P., & Lazaris, A. (2014). Video activity-based traffic policing: a new paradigm. IEEE Transactions on Multimedia, 16(5), 1446-1459. DOI: 10.1109/TMM.2014.2310592.
Mitra, A., Satapathy. S., & Paul, S. (2013). Clustering analysis in social network using covering based rough set. 3rd International Conference on Advance Computing Conference (IACC), 476-481. DOI: 10.1109/IAdCC.2013.6514272
Mneimneh, S. (2016). Computer networks modeling arrivals and service with Poisson. Retrieved Feb 1, 2016, from http://www.cs.hunter.cuny.edu/~saad/courses/networks/notes/note10.pdf
Moraes, H. B., & Guardieiro, P. R. (2012). Traffic policing mechanism based on the token bucket method for WiMax networks. IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 885-890. DOI: 10.1109/HPCC.2012.126
Pawlak, Z. (1982). Rough sets. International Journal of Computer & Information Sciences, 11(5), 341-356. DOI: 10.1007/BF01001956
Shang, Z., Zhou, Y., Ye, Q., & Wang, X. (2012). Fault diagnosis of computer network based on rough set and BP neural network. 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), 1-4. DOI: 10.1109/WiCOM.2012.6478522
Vieira, F. H. T., Santos, Jr., J. A., & Cardoso, A. A. (2013). Estimation of backlog and delay in OFDM/TDMA systems with traffic policing using network calculus. Computers & Electrical Engineering, 39(8), 2507-2520. DOI:10.1016/j.compeleceng.2013.09.003
Wagner, D. P. (2014). Congestion policing queues - A new approach to managing bandwidth sharing at bottlenecks. 10th International Conference on Network and Service Management (CNSM) and Workshop, 206-211. DOI: 10.1109/CNSM.2014.7014160
Zhai, J., Wan, B., Zhang, S. (2015). Probabilistic tolerance rough set model. International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), 214-219. DOI: 10.1109/ICWAPR.2015.7295953
How to Cite
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.