Catalog Home Page

An adaptive fuzzy control traffic shaping scheme over wireless networks

Lekcharoen, S. and Fung, C.C. (2007) An adaptive fuzzy control traffic shaping scheme over wireless networks. In: Asia-Pacific Conference on Communications, 2007. APCC 2007., 18-20 Oct. 2007, Bangkok.

[img]
Preview
PDF - Published Version
Download (1511kB) | Preview
    Link to Published Version: http://dx.doi.org/10.1109/APCC.2007.4433527
    *Subscription may be required

    Abstract

    In this paper, we propose an adaptive fuzzy control traffic shaping scheme based on leaky bucket in order to solve the traffic congestion problem over wireless networks. It is found that backpressure algorithm is suitable for low traffic and, it prevents buffer overflows. When buffer exceeds the upper threshold, the source receives a backpressure signal and, it pauses sending frames until it receives a signal from the same server. In backoff time using leaky bucket over traffic shaping mechanism, it is suitable for high traffic, Backoff time computations are widely used in order to avoid the impact on the network performance whenever the increment of the offered load arises. The fluctuation of offered load will cause the congestion at waiting room. We propose a fuzzy control backpressure and backoff time in traffic shaping that aims at detecting violations in parameter negotiation. We evaluate and compare the performance of fuzzy backpressure and backoff time in traffic shaping schemes. The studied approaches are fuzzy backpressure and exponential backoff time (FBE), backpressure in leaky bucket (BP), and exponential backoff time (EB). The performance of fuzzy control backpressure and backoff time has been investigated through fluctuations in telecommunication traffic streams (burst/silent type). Simulation results show that on wireless frames, the fuzzy logic control scheme helps to improve the performance in traffic shaping schemes much better than conventional backpressure algorithm and exponential backoff time. This has been verified by testing various types of burst/silence traffic.

    Publication Type: Conference Paper
    Murdoch Affiliation: School of Information Technology
    Publisher: IEEE
    Copyright: (c) 2007 IEEE.
    Notes: Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
    URI: http://researchrepository.murdoch.edu.au/id/eprint/596
    Item Control Page

    Downloads

    Downloads per month over past year