Cart (Loading....) | Create Account
Close category search window

A novel neural network traffic enforcement mechanism for ATM networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Tarraf, A.A. ; Dept. of Electr. Eng., City Univ. of New York, NY, USA ; Habib, I.W. ; Saadawi, T.N.

ATM has been recommended by the CCITT as the transport vehicle for the future B-ISDN networks. In ATM-based networks, a set of user declared parameters that describes the traffic characteristics, is required for the connection acceptance control (CAC) and traffic enforcement (policing) mechanisms. At the call set-up phase, the CAC algorithm uses those parameters to make a call acceptance decision. During the call progress, the policing mechanism uses the same parameters to control the user's traffic within its declared values in order to protect the network's resources and avoid possible congestion problems. A novel policing mechanism using neural networks (NNs) is presented. This is based upon an accurate estimation of the probability density function (pdf) of the traffic via its count process and implemented using NNs. The pdf-based policing is made possible only by NNs because pdf policing requires complex calculations, in real-time, at very high speeds. The architecture of the policing mechanism is composed of two interconnected NNs. The first one is trained to learn the pdf of “ideal nonviolating” traffic, whereas the second is trained to capture the “actual” characteristics of the “actual” offered traffic during the progress of the call. The output of both NNs is compared. Consequently, an error signal is generated whenever the pdf of the offered traffic violates its “ideal” one. The error signal is then used to shape the traffic back to its original values

Published in:

Selected Areas in Communications, IEEE Journal on  (Volume:12 ,  Issue: 6 )

Date of Publication:

Aug 1994

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.