A rough set control token leaky bucket in policing mechanism schemes over high speed network


  • Somchai Lekcharoen College of Information and Communication Technology, Rangsit University, Patumthani 12000, Thailand
  • Sumaman Pankham College of Information and Communication Technology, Rangsit University, Patumthani 12000, Thailand


policing mechanism, rough set, rough set token leaky bucket, token, token LB, LB, RST, TLB, VDSL


The research objective is to evaluate and compare the differences between the rough set token leaky bucket (RST) and the leaky bucket (LB) as a policing mechanism in reference to traffic fluctuations on data networks.  The original policing mechanism scheme has LB for traffic with a nearly constant burst and silence, however, when overflow occurs in the buffer router, incoming frames are dropped.  We propose an RST in policing mechanism to help prevent the drop of incoming frames and to aid in the detection of violations in parameter negotiation.  A rough set converts knowledge, which is expressed in an uncertain form to a certain form.  The simulation results show that in very-high-bit-rate digital subscriber line (VDSL) frames, the rough set control system helps improve the performance of our RST as a policing mechanism better than traditional policing mechanisms by about 12% in terms of conforming and non-conforming frames on various types of the burst/silence traffic generated.


Aeron, A. (2010). Fine tuning of fuzzy token bucket scheme for congestion control in high speed networks. Second International Conference on Computer Engineering and Applications (ICCEA), 1, 170-174. DOI: 10.1109/ICCEA.2010.41

D-Link Corporation. (2016). Broadband modems and routers. Retrieved Feb 1, 2016, from http://www.dlink.com/xk/sq/home-solutions/connect/broadband-modems-and-routers

Fares, R., & Woodward, M. (2009). A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate. International Conference for Internet Technology and Secured Transactions, 1-6. DOI: 10.1109/ICITST.2009.5402596

Goswami, A., Pattanaik, K. K., Bharadwaj, A., & Bharti, S. (2014). Loss rate control mechanism for fan-in-burst traffic in data center network. Procedia Computer Science, 32, 125-132. DOI:10.1016/j.procs.2014.05.406

Kim, S., & Suh, C. (2015). Degrees of freedom of bursty multiple access channels with a relay. 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 322-328. DOI: 10.1109/ALLERTON.2015.7447022

Kim, S., Wang, I., & Suh, C. (2015). A relay can increase degrees of freedom in bursty mimo interference networks. IEEE International Symposium on Information Theory (ISIT), 1059-1063. DOI: 10.1109/ISIT.2015.7282617

Maratsolas, E., Koutsakis. P., & Lazaris, A. (2014). Video activity-based traffic policing: a new paradigm. IEEE Transactions on Multimedia, 16(5), 1446-1459. DOI: 10.1109/TMM.2014.2310592.

Mitra, A., Satapathy. S., & Paul, S. (2013). Clustering analysis in social network using covering based rough set. 3rd International Conference on Advance Computing Conference (IACC), 476-481. DOI: 10.1109/IAdCC.2013.6514272

Mneimneh, S. (2016). Computer networks modeling arrivals and service with Poisson. Retrieved Feb 1, 2016, from http://www.cs.hunter.cuny.edu/~saad/courses/networks/notes/note10.pdf

Moraes, H. B., & Guardieiro, P. R. (2012). Traffic policing mechanism based on the token bucket method for WiMax networks. IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 885-890. DOI: 10.1109/HPCC.2012.126

Pawlak, Z. (1982). Rough sets. International Journal of Computer & Information Sciences, 11(5), 341-356. DOI: 10.1007/BF01001956

Shang, Z., Zhou, Y., Ye, Q., & Wang, X. (2012). Fault diagnosis of computer network based on rough set and BP neural network. 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), 1-4. DOI: 10.1109/WiCOM.2012.6478522

Vieira, F. H. T., Santos, Jr., J. A., & Cardoso, A. A. (2013). Estimation of backlog and delay in OFDM/TDMA systems with traffic policing using network calculus. Computers & Electrical Engineering, 39(8), 2507-2520. DOI:10.1016/j.compeleceng.2013.09.003

Wagner, D. P. (2014). Congestion policing queues - A new approach to managing bandwidth sharing at bottlenecks. 10th International Conference on Network and Service Management (CNSM) and Workshop, 206-211. DOI: 10.1109/CNSM.2014.7014160

Zhai, J., Wan, B., Zhang, S. (2015). Probabilistic tolerance rough set model. International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), 214-219. DOI: 10.1109/ICWAPR.2015.7295953




How to Cite

Somchai Lekcharoen, & Sumaman Pankham. (2023). A rough set control token leaky bucket in policing mechanism schemes over high speed network. Journal of Current Science and Technology, 6(2), 109–116. Retrieved from https://ph04.tci-thaijo.org/index.php/JCST/article/view/492



Research Article