Elsevier

Computer Communications

Volume 22, Issue 3, 25 February 1999, Pages 199-210
Computer Communications

Review
A fuzzy algorithm for combined control of traffic parameters: assessment and key issues

https://doi.org/10.1016/S0140-3664(98)00265-5Get rights and content

Abstract

One of the most critical functions in the management of high-speed networks using the ATM technique is that of “policing”. It has the task of ensuring that each traffic source complies with the traffic parameter negotiated in order to avoid network congestion. In this article we focus on a dual aim. The first is to analyse the performance of a policing mechanism based on Fuzzy Logic for the control of packetized voice sources. The results obtained show an excellent selectivity, close to that of an ideal policer, and a responsiveness, assessed by the combined measures of reaction time and rise time, which is decidedly better than that of the Leaky Bucket. The second aim addresses the capacity of the fuzzy policer in controlling not only the long-term Average Cell Rate but also the Sustainable Cell Rate. Analysis by simulation proves that fuzzy policer is extremely flexible in the combined control of these two traffic descriptors.

Introduction

The flexibility attained in Asynchronous Transfer Mode (ATM) networks to accommodate a wide variety of traffic sources raises challenging new issues on resource management [1], [2], [3]. Preventing the network from becoming congested, achieving network performance objectives and optimizing the use of network resources requires the following traffic controls: Connection Acceptance Control (CAC) and Usage Parameter Control (UPC), the latter is also referred to as flow enforcement or policing. The CAC decides, during the call set-up phase, to accept a new connection on a link and, consequently, to allocate a certain portion of bandwidth to it. This decision is based on the connection’s anticipated traffic characteristics, the required Quality of Service (QoS), and the current network load. To protect network resources from malicious as well as unintentional misbehaviour which can affect the QoS of already established connections, the UPC function, during the entire phase of the call, monitors and controls the offered traffic, by detecting violations of negotiated parameters. The action usually taken by a policer on cells detected as violating is to discard or mark them.

In order to define an efficient policing mechanism, a first issue is identifying the traffic parameters which best characterize the behaviour of a source. The difficulty lies in the fact that the sources to be characterized have different statistical properties as they range from video to data services, and it is necessary to define parameters that can be monitored during the call [4], [5], [6]. A traffic parameter contributing to a source traffic descriptor should be understandable by the user, of significant use in resource allocation, and enforceable by the network provider through the UPC. Ordinarily, UPC is performed for each traffic parameter in a source traffic descriptor. For example, if the source traffic descriptor consists of the peak bit rate and the mean bit rate, UPC is necessary for both of them.

Another key issue is defining a traffic enforcement mechanism which will be efficient in coping with the conflicting requirements of ideal flow enforcement: selectivity, that is, the capability of detecting any illegal traffic situation and transparency for connections that respect the parameter values negotiated, on whose cells no policing action need be taken; and responsiveness, that is, low response time to parameter violations.

In literature several mechanisms such as the Leaky Bucket (LB) and window mechanisms have been proposed to police Average Cell Rate (ACR) seen as the average calculated over the whole duration of the connection. An extensive review and assessment of these mechanisms can be found in Refs. [7], [8], [9]; for none of them has it been possible to achieve a satisfactory tradeoff between the aforementioned conflicting requirements. This is essentially as a result of two causes. The first is that enforcement of this parameter is very hard, since short-term statistical fluctuations of the source traffic are admissible as long as the source respects the average value negotiated, λn, in the long term. The second is related to the fact that the logic on which these mechanisms are based is of the traditional kind. This makes it difficult to compile the control know-how, probably because of nonlinearity, to the time variant behaviour of the system, or to the fact that the measurements available are of poor quality. In order to overcome the limits that traditional mechanisms seem to present several research groups have explored alternative solutions based on artificial intelligence techniques, namely artificial neural networks [10] and fuzzy logic [11], [12].

Fuzzy logic [13], [14], [15] is an important tool for formalizing processes of approximate reasoning in which the knowledge base can be acquired from a human expert. To reproduce the concepts expressed in natural language, fuzzy logic replaces true and false with continuous membership values ranging from zero to one. This allows the processing of linguistic concepts such as “small”, “big”, “low”, “high” or “approximately”, which can be expressed in the fuzzy inferential rules that describe the control algorithm. Thanks to these inherent features, fuzzy logic proves to be efficient in controlling real-time processes which are too complex to be represented by exact mathematical models.

Exploiting the advantages offered by fuzzy logic in [11] we formalized the control actions of the policer translating the know-how of an expert in the field into fuzzy rules. The fuzzy policer obtained was analysed using the same bursty sources as those examined in [8] and compared with conventional mechanisms such as the LB and the Exponential Weighted Moving Average (EWMA). The results obtained showed that fuzzy logic, when applied to policing, is extremely promising on account of both the performance obtainable and the simplicity of the control algorithm.

In this article, we focus on a dual aim. The first is to analyse extensively the behaviour of the Fuzzy Policer (FP) in controlling a real source, namely a packetized voice source, evaluating its selectivity and dynamic response. The latter is evaluated by means of a new combined measure of reaction time and rise time. The performance of the FP is compared with single and double [3] LBs. The second aim is to see whether the FP is capable of controlling not only the ACR but also the Sustainable Cell Rate (SCR) defined by ITU in [16]. Some of the main issues linked to use of the ACR as a traffic descriptor parameter are discussed and the need is shown for combined control of ACR and SCR. We then present a simulation analysis from which it emerges that the FP, unlike conventional mechanisms, is extremely flexible in the combined control of ACR and SCR, guaranteeing an optimal level of performance.

The article is organized as follows: in Section. 2, after a brief overview on fuzzy logic, we outline the model of the fuzzy policing mechanism; in Section. 3 we assess the efficiency of the fuzzy policer in the control of packetized voice sources; in Section. 4 we address some of the issues involved in use of the ACR as a descriptor of source behaviour and propose the FP for the combined control of ACR and SCR. Finally in Section. 5 some conclusions are drawn.

Section snippets

Overview on fuzzy logic

Fuzzy logic is based on the concepts of linguistic variables and fuzzy sets. A fuzzy set in a Universe of Discourse U is characterized by a membership function μf which assumes values in the interval [0,1]. A fuzzy set F is represented as a set of ordered pairs, each made up of a generic element uU and its degree of membership μf(u).

A linguistic variable x in a Universe of Discourse U is characterized by a set W(x) = (W1x,…,Wnx) and a set M(x) = (M1x,…,Mnx), where W(x) is the term-set, i.e.,

Performance evaluation in policing packetized voice sources

In [11] we considered a bursty source which is widely used as a traffic pattern for policing and refers to the bursty source characteristics studied by Rathgeb in [8] which, however, are not representative of any real source.

In this section we assess the efficiency of the FP proposed in policing a real bursty source, namely a packetized voice source. We assume that the number of cells per burst is geometrically distributed with a mean of E[x]=29 cells; the duration of the idle phase is

Issues involved in control of the average cell rate

The analysis presented in the previous section compares the capacity of the two methods to police the Average Cell Rate parameter, evaluated over the whole duration of the connection (ACR). Although this parameter has often been indicated as a traffic descriptor for several policing methods [8], there are certain cases, not taken into consideration in the previous section, in which use of this parameter conflicts with the aim of preventing network congestion.

Let us consider a source S for which

Conclusive remarks

In this article we have presented an analysis to evaluate the behaviour of a policing mechanism based on fuzzy logic. It is a window control mechanism in which the number of cells that can be accepted per window is dynamically updated in accordance with the degree of compliance of the source with the negotiated parameter. The mechanism detects the arriving cells as excessive or not according to a soft decision-making logic using truth values which are not restricted to either false (truth value

Giuseppe Ficili received his degree in Electronic Engineering from the University of Catania, Italy, in 1994. In 1994, he joined the Institute of Computer Science and Telecommunications at the University of Catania, where he is now a PhD student in computer science. His research interests are artificial neural networks, fuzzy logic and their application in the field of computer networks. His mail address is: [email protected]; Tel.: +39-095-7382352.

References (18)

  • L.A. Zadeh

    Fuzzy sets

    Inform Contr.

    (1965)
  • R.O. Onvural, Asynchronous Transfer Mode networks: performance issues, Artech House...
  • D. Hong et al.

    Congestion control and prevention in ATM networks

    IEEE Network Magazine

    (1991)
  • L. Fratta et al.

    Congestion control strategies in ATM networks

    European Transaction on Telecommunications

    (1992)
  • A. Berger, A. Eckberg, A B-ISDN/ATM traffic descriptor and its use in traffic and congestion controls, Proc. GLOBECOM...
  • A. Berger, Desiderable properties of traffic descriptors for ATM connections in a Broadband ISDN, Proc. of the 14th...
  • J. Andrade, ATM source traffic descriptor based on the peak, mean and second moment of the cell rate, Proc. of the 14th...
  • M. Butto, E. Cavallero, A. Tonietti, Effectiveness of the Leaky Bucket policing mechanism in ATM networks, IEEE Journal...
  • E. Rathgeb

    Modeling and performance comparison of policing mechanisms for ATM networks

    IEEE Journal on Selected Areas in Communications

    (1991)
There are more references available in the full text version of this article.

Cited by (4)

  • An integrated framework for traffic control in ATM networks based on soft-computing techniques

    2001, Information Sciences
    Citation Excerpt :

    Besides these parameters, there are others that describe certain statistical properties of traffic flows, like the ACR, the Average Burst Length, etc. Here we have considered the ACR, that gives an estimation of the transmission speed of a source in the long term, as this parameter (whose value is always lower than that of the SCR) favours more efficient allocation of network resources, as discussed in [7,10]. The traditional criteria used up to now to evaluate the efficacy of a policing mechanism which aims to control the above parameters are:

  • A protocol independent policer and shaper design using virtual scheduling algorithm

    2002, 2002 International Conference on Communications, Circuits and Systems and West Sino Exposition, ICCCAS 2002 - Proceedings
  • Soft computing agents

    2001, Annual Conference of the North American Fuzzy Information Processing Society - NAFIPS
  • On intelligent human intelligible routing

    2000, 4th International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, KES 2000 - Proceedings

Giuseppe Ficili received his degree in Electronic Engineering from the University of Catania, Italy, in 1994. In 1994, he joined the Institute of Computer Science and Telecommunications at the University of Catania, where he is now a PhD student in computer science. His research interests are artificial neural networks, fuzzy logic and their application in the field of computer networks. His mail address is: [email protected]; Tel.: +39-095-7382352.

Daniela Panno received her “Laurea” degree in Electrical Engineering and a PhD in Telecommunications from the University of Catania, Italy, in 1989 and 1993, respectively. In 1989, she joined the Institute of Computer Science and Telecommunications at the University of Catania, where she is now an Associate Professor. Her research interests are MAN architectures and protocols, traffic management and performance evaluation in broadband networks and fuzzy logic application in the field of telecommunications. Her mail address is: [email protected]; Tel.: +39-095-7382369.

View full text