Fuzzy logic based congestion control in computer networks

C. Chrysostomou, Andreas Pitsillides

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Network congestion control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. Designing effective congestion control strategies for computer networks is known to be hard because of the difficulty of obtaining realistic, cost effective, tractable analytical models. This renders the application of classical control system design methods, which rely on availability of these models, very hard, and possibly not cost effective. Computational Intelligence employing Fuzzy Logic Control methodology is reported to offer effective solutions for certain classes of control problems. It is particularly appealing in non-linear complex systems where satisfactory analytic models are costly or impractical to obtain, but where their behaviour is well understood and can be captured by linguistic models. Consequently, a number of researchers have looked at fuzzy logic in order to devise effective, robust congestion control techniques. In this paper, we discuss several control approaches currently in use, before we motivate the utility of Fuzzy Logic based control. Then, through a number of examples, we illustrate the power of the methodology by the successful application of fuzzy based congestion control in the two diverse networking technologies of ATM and TCP/IP.

Original languageEnglish
Pages (from-to)1521-1527
Number of pages7
JournalWSEAS Transactions on Communications
Volume5
Issue number8
Publication statusPublished - Aug 2006
Externally publishedYes

Keywords

  • ATM
  • Active queue management
  • Congestion control
  • Fuzzy logic
  • Quality of service
  • TCP/IP

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Fuzzy logic based congestion control in computer networks'. Together they form a unique fingerprint.

Cite this