1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: lnit@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers....[Read More]

An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network

Somchai Lekcharoen
Faculty of Information Technology, Rangsit University, Thailand

Abstract—High-speed communication network describes about high bandwidth and low delay communication. The problem in delay occurs traffic congestion. A method to solve this problem, we use a policing mechanism scheme. It is a method help monitor the amount of ingress traffic. If congestion occurs at the buffer before entering the network. Another approach must drop incoming frames from which buffer is not available and has to rely on the end-to-end protocols for the recovery of lost frames. In this way, it may not be able to cope their quality-of-service (QoS) requirements because it must have more delay time. However, one way to solve this problem, we use Fuzzy type-2 control double token leaky bucket and back-pressure to control network congestion but it is suitable for low traffic.  It could help to improve the performance in policing mechanisms much better than conventional policing one while various types of burst/silence traffic are being generated.

Index Terms—type-2fuzzy control, policing mechanism

Cite: Somchai Lekcharoen, "An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network," Lecture Notes on Information Theory, Vol.1, No.1, pp. 48-52, March 2013. doi: 10.12720/lnit.1.1.48-52

Copyright © 2012-2018 Lecture Notes on Information Theory, All Rights Reserved