0000000000908871

AUTHOR

Nader Mbarek

showing 38 related works from this author

Fuzzy Logic based model for self-optimizing energy consumption in IoT environment

2021

Energy optimization is essential in IoT environments due to energy constraints for some IoT components. In fact, energy consumption has a direct impact on IoT system lifetime, which represents an important Quality of Service (QoS) parameter for IoT environments. In order to extend the IoT system lifetime, energy consumption optimization should be considered in several IoT components. In this paper, we specify an energy self-optimizing mechanism allowing to minimize data transmission energy consumption of IoT objects. This mechanism enables selecting specific objects to send the desired data while minimizing the energy consumed for the corresponding communication. Our proposal is made of a M…

Computer scienceQuality of serviceDistributed computingContext (language use)Energy consumptionObject (computer science)Energy minimizationFuzzy logicEnergy (signal processing)Data transmission2021 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

A Novel Multi-hop Broadcasting Method for VANETs Based on Autonomic Computing Paradigm

2014

One of the three best papers, Selected for the Annals of Telecommunications journal; International audience; Broadcasting is widely used in Vehicular Ad hoc Networks (VANETs) but it is hard to achieve efficiently since it depends on the network density, i.e. may cause network congestion if the protocols are not well designed. This paper introduces a novel Autonomic Dissemination Method (ADM) which delivers messages in accordance with given priority and density levels. The proposed approach is based on two steps: an offline optimization process and an online adaptation to the network characteristics. The aim is to make effective use of radio resources when there are many messages to send imu…

OptimizationVehicular ad hoc network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industryWireless ad hoc networkDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Autonomic computingBroadcastingPriority levelHop (networking)Autonomic computingNetwork congestionDensity evaluation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEEBroadcasting (networking)Broadcasting protocolbusinessComputer network
researchProduct

Gestion du niveau de service dans l’Internet des objets (IdO)

2020

International audience

[INFO]Computer Science [cs][INFO] Computer Science [cs]ComputingMilieux_MISCELLANEOUS
researchProduct

Self-establishing a Service Level Agreement within Autonomic Cloud Networking Environment

2014

International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). Several research works have been proposed for the SLA establishing in cloud computing, but not in cloud networking. In this paper, we propose an architecture for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and a …

Cloud computing security[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE/IFIPbusiness.industryComputer scienceQuality of service[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Data_MISCELLANEOUSQoSCloud computingComputer securitycomputer.software_genreService-level agreement[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Cloud testingAutonomic Cloud NetworkingData as a serviceArchitectureSLAbusinesscomputerDrawbackComputer network
researchProduct

Towards global service level guarantee within autonomic computing systems

2011

International audience; In this paper, we specify a global service level guarantee including not only QoS but also security and taking into account user mobility. This global service level could be guaranteed within several autonomic computing systems managed by different autonomic domain managers. For that purpose, we propose an end-to-end Service Level Negotiation Protocol, called SLNP, to provide those autonomic managers with a negotiation capability. This allows achieving an agreement on the service level of each offered service between the different domains involved in the transport of that service. SLNP Implementation is made of Web Services technologies to enable interoperability in …

Service (business)Process management[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industryQuality of service[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]InteroperabilityService level objective020206 networking & telecommunicationsService level requirement02 engineering and technologycomputer.software_genreAutonomic computing[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]020204 information systemsService level0202 electrical engineering electronic engineering information engineeringWeb servicebusinesscomputerComputer network
researchProduct

IMRR and IMPR Routing Protocols For Inter and Intra Wireless Mesh Communications

2015

Given the evolution of wireless technologies, Wireless Mesh Networks (WMN) have appeared as an emerging low-cost solution to ensure last-mile connectivity to the Internet network. However, providing real-time and streaming applications, such as VoIP (Voice over IP) and VoD (Video on Demand), with a satisfying QoS level is considered as an important challenge within these networks. In this paper, we propose a QoS based routing protocol, called Hybrid QoS Mesh Routing (HQMR), jointly with a clustering algorithm to improve the scalability of mesh networks. HQMR is composed of two routing sub- protocols: a reactive QoS based routing protocol for intra-mesh infrastructure communications and a pr…

Routing protocolStatic routingZone Routing ProtocolDynamic Source Routing[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryComputer scienceHQMRDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolNetwork simulationWireless Routing ProtocolQoS020206 networking & telecommunications02 engineering and technologyWMNRouting protocolLink-state routing protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolbusinessComputer network
researchProduct

Self-configuring multipath intra-mesh infrastructure QoS based routing

2016

International audience; Multi-path routing concept was largely exploited in wireless networks to provide benefits such as fault tolerance, load balancing, performance improvement in terms of latency, etc. In this paper, we propose a multi-path routing based protocol named MP-IMRR (Multi-path Intra-Mesh infrastructure Routing protocol) to improve our previously defined QoS based routing protocol for wireless mesh networks (i.e. IMRR). MP-IMRR is defined in order to achieve better reactivity and faster recovery from eventual route failures than the IMRR protocol by adopting the backup routes concept. Besides, given the complexity increase while considering network management systems, we adopt…

Routing protocolDynamic Source RoutingPerformance Evaluation[ INFO ] Computer Science [cs]Computer scienceDistributed computingQoS routingEnhanced Interior Gateway Routing ProtocolWireless communicationnetwork simulator ns-3Wireless Routing Protocol02 engineering and technologyRouting protocolsBandwidth0202 electrical engineering electronic engineering information engineeringMP-IMRRmultipath routing based protocolWireless Mesh Network[INFO]Computer Science [cs][ SDV.IB ] Life Sciences [q-bio]/BioengineeringComputer architectureMP-IMRR protocolRoutingStatic routingZone Routing Protocolautonomic computing paradigmQoS based routing protocolbusiness.industrymultipath intramesh infrastructure routing protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultipath channels020206 networking & telecommunicationsMulti-path routingwireless mesh networksbackup routes conceptLink-state routing protocolself-configuring infrastructurequality of service020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolSelf-configuring[SDV.IB]Life Sciences [q-bio]/Bioengineeringbusinessnetwork management systemsComputer network
researchProduct

QoS Multi-tree Based Routing Protocol for Inter-mesh Infrastructure Communications

2016

Part 5: Network Protocols; International audience; Quality of service (QoS) in wireless mesh networks (WMN) is an active area of research, which is driven by the increasing demand for real-time and multimedia applications, such as VoIP (Voice over IP) and VoD (Video on Demand). In this paper, we propose a QoS multi-tree based routing protocol for wireless mesh environments, named Inter-Mesh Infrastructure Proactive Routing (IMPR). It is a proactive multi-tree routing protocol enabling QoS guarantee for communications from/towards the Internet network through the Mesh Gateway (MG) of the mesh infrastructure. We describe and analyze the simulation results of different scenarios conducted on t…

Routing protocolDynamic Source RoutingMulti-tree routing[ INFO ] Computer Science [cs]Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Enhanced Interior Gateway Routing ProtocolWireless Routing Protocol02 engineering and technology[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0502 economics and business0202 electrical engineering electronic engineering information engineeringQos routing[INFO]Computer Science [cs]IMPRWireless mesh networkZone Routing ProtocolWireless mesh networkbusiness.industry05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020207 software engineeringLink-state routing protocolPerformance evaluationHazy Sighted Link State Routing ProtocolNetworksbusiness050203 business & managementComputer network
researchProduct

Distributed Leader Election and Computation of Local Identifiers for Programmable Matter

2019

International audience; The context of this paper is programmable matter, which consists of a set of computational elements, called particles, in an infinite graph. The considered infinite graphs are the square, triangular and king grids. Each particle occupies one vertex, can communicate with the adjacent particles, has the same clockwise direction and knows the local positions of neighborhood particles. Under these assumptions, we describe a new leader election algorithm affecting a variable to the particles, called the k-local identifier, in such a way that particles at close distance have each a different k-local identifier. For all the presented algorithms, the particles only need a O(…

Vertex (graph theory)0209 industrial biotechnologyLeader electionComputer scienceComputation[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technology[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Topology01 natural sciencesGraphIdentifier[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Programmable matter020901 industrial engineering & automation010201 computation theory & mathematicsGraph coloring
researchProduct

Service level guarantee framework for IoT environments

2017

Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-SLA (iSLA). These different SLAs enable IoT service provision with Quality of Service (QoS) guarantee. Achieving this guarantee requires several communications and interactions between the components of the proposed IoT architecture. These interactions allow an IoT Service Provider (IoT-SP) to conclude the iSLA with an IoT Client (IoT-C). We specif…

business.industryComputer scienceQuality of service020206 networking & telecommunications02 engineering and technologyService providerTask (project management)Order (business)Service level0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessInternet of ThingsComputer networkProceedings of the 1st International Conference on Internet of Things and Machine Learning
researchProduct

Gestion du niveau de service dans le Cloud

2020

International audience

[INFO]Computer Science [cs][INFO] Computer Science [cs]ComputingMilieux_MISCELLANEOUS
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct

A new proposed cloud computing based architecture for space ground data systems

2018

International audience; Many companies decided to move towards the cloud computing technology in order to manage, monitor and explore huge space data amount in the space ground data systems. The corresponding transition adaptation needs a study to classify each space related service in the appropriate cloud computing service model layer; SaaS, PaaS and IaaS. In this paper, we specify a representation of proposed cloud computing based ground data system architecture for earth observation missions. The proposed architecture takes into consideration the collaboration aspect between multiple space agencies. We evaluate the time, storage and processing performance when using the cloud computing …

Network architectureService (systems architecture)Earth observationComputer Networks and Communicationsbusiness.industryComputer scienceQuality of serviceSoftware as a serviceDistributed computingNetwork architectureQoS020206 networking & telecommunicationsCloud computing02 engineering and technologySpace mission0202 electrical engineering electronic engineering information engineeringSystems architectureCloud computingGround data systemData system[INFO]Computer Science [cs]020201 artificial intelligence & image processingbusinessInternational Journal of Communication Networks and Distributed Systems
researchProduct

A new Media Access Control layer Quality of Service multicast scheme for IEEE 802.11s based wireless mesh networks

2014

Inderscience Publishers; International audience; We propose a new Media Access Control (MAC) layer enabling Quality of Service (QoS) multicast scheme for IEEE 802.11s networks, where a unicast routing protocol called HWMP (Hybrid Wireless Mesh Protocol) is defined. The HWMP protocol is more adapted for best effort traffic, that's why its usage is not suitable for real time multimedia applications. The goal of our proposed mechanism is to take into account multicast communication under QoS constraints for the IEEE 802.11s mesh networks where no QoS multicasting has been defined. Our multicasting scheme handles QoS guarantee for real time applications. Indeed, our scheme is based on finding t…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless mesh networksDistance Vector Multicast Routing ProtocolQoSHWMP[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Multicast addressIEEE 802.11sXcastMAC layer multicastPragmatic General Multicastreal time multimedia applications.Protocol Independent MulticastMulticast[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMAC routingSource-specific multicastreal time multimedia applicationsIP multicastbusinesscomputerComputer network
researchProduct

Broker and Federation Based Cloud Networking Architecture for IaaS and NaaS QoS Guarantee

2016

International audience; Today, the Cloud networking aspect is a critical factor for adopting the Cloud computing approach. The main drawback of Cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). This paper presents a framework for resource allocation according to an end-to-end SLA established between a Cloud Service User (CSU) and several Cloud Service Providers (CSPs) in a Cloud networking environment. We focus on QoS parameters for Network as a Service (NaaS) and Infrastructure as a Service (IaaS) services. In addition, we propose algorithms for the best CSPs selection to allocate Vi…

020203 distributed computing[SPI] Engineering Sciences [physics]business.industryComputer scienceQuality of service020207 software engineeringCloud computing02 engineering and technologyMobile QoScomputer.software_genre[SPI.TRON] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/Electronics[ SPI.TRON ] Engineering Sciences [physics]/Electronics[SPI]Engineering Sciences [physics]Service-level agreementNetwork as a serviceVirtual machineCloud testing0202 electrical engineering electronic engineering information engineering[ SPI ] Engineering Sciences [physics]Resource allocationbusinesscomputerSimulationComputer network
researchProduct

Priority Levels Based Multi-hop Broadcasting Method for Vehicular Ad hoc Networks

2015

International audience; This paper deals with broadcasting problem in vehicular ad hoc networks (VANETs). This communication mode is commonly used for sending safety messages and traffic information. However, designing an efficient broadcasting protocol is hard to achieve since it has to take into account some parameters related to the network environment, for example, the network density, in order to avoid causing radio interferences. In this paper, we propose a novel Autonomic Dissemination Method (ADM) which delivers messages in accordance with given priority and density levels. The proposed approach is based on two steps: an offline optimization process and an adaptation to the network …

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesOptimizationVANETWireless ad hoc networkbusiness.industryComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Autonomic computingQuality of ServiceMessage priority levelAutonomic computingHop (networking)Computer Science - Networking and Internet ArchitectureDensity evaluation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Electrical and Electronic EngineeringbusinessComputer networkBroadcast
researchProduct

Statistical learning and multiple linear regression model for network selection using MIH

2014

Award of Appreciation; International audience; A key requirement to provide seamless mobility and guaranteeing Quality of Service in heterogeneous environment is to select the best destination network during handover. In this paper, we propose a new schema for network selection based on Multiple Linear Regression Model (MLRM). A horough investigation, on a huge live data collected from GPRS/UMTS networks led to identify the Key Performance Indicators (KPIs) that play the most important role in the handover process. These KPIs are: Received Signal Code Power (RSCP), received energy per chip (Ec/No) and Available Bandwidth (ABW) of the destination network. To extract a handover model from col…

IEEE 802.21multiple linear regressionseamless handover[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industry[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Quality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyPredictive analyticsMedia-independent handoverstatistical learning[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE 802.21Handover020204 information systems0202 electrical engineering electronic engineering information engineeringReceived signal code powerPerformance indicatorGeneral Packet Radio ServicebusinessComputer networkThe Third International Conference on e-Technologies and Networks for Development (ICeND2014)
researchProduct

IoT-MAAC: Multiple Attribute Access Control for IoT environments

2020

Access Control is an important security service that should be considered in IoT environments in order to offer reliable IoT services. Access control in IoT environments concerns not only the access of IoT users to IoT services and objects, but also the access of IoT objects to IoT gateways. In this paper, we specify an access control mechanism that considers the access of IoT objects to IoT gateways in order to enhance the reliability of IoT data provided by the IoT objects. Our proposed access control mechanism, called IoT-MAAC (Multi Attribute Access Control), allows retrieving requested data from the most reliable and secured IoT objects among the available objects in the IoT environmen…

Trust levelService Level Agreements[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industryReliability (computer networking)Access ControlIoT environments020206 networking & telecommunicationsAccess control02 engineering and technology[INFO] Computer Science [cs]Security service0202 electrical engineering electronic engineering information engineeringSecurity020201 artificial intelligence & image processingInternet of ThingsbusinessComputer networkMultiple attribute
researchProduct

A new inter-cloud service-level guarantee protocol applied to space missions

2017

Nowadays, the term cloud computing often falsely assumes the availability of an unlimited pool of resources. On the contrary, if a cloud provider reaches its limits, it may pose the risk of breaking their service level agreement (SLA). Space agencies could start using the cloud computing model within their IT infrastructure with multiple ground control points around the world to reduce the cost. An inter-cloud communication protocol with a guarantee of the service level will significantly reduce the cost if each ground control segment is considered as a cloud provider. This paper outlines a new protocol that was developed to take into consideration the end-to-end service-level guarantee. Th…

business.industryComputer scienceQuality of serviceDistributed computingApplied MathematicsCloud computing02 engineering and technology01 natural sciencesComputer Science ApplicationsManagement Information SystemsService-level agreement020204 information systemsService level0103 physical sciencesScalability0202 electrical engineering electronic engineering information engineeringSpace industrybusinessCommunications protocol010303 astronomy & astrophysicsProtocol (object-oriented programming)Computer networkInternational Journal of Grid and Utility Computing
researchProduct

A new way of achieving multi-path routing in wireless networks

2020

In the 21st century, the wireless technology is still developing rapidly and trying to be 'Faster, Higher, and Stronger': faster data rate, higher bandwidth and stronger connectivity. Wireless Mesh Networks (WMN) have been envisioned as an important solution to the next generation wireless networking which can be used in wireless community networks, wireless enterprise networks, transportation systems, home networking and last-mile wireless internet access. They also provide a cheap, quick and effective way for building wireless data networks. Considering the nature of these networks, routing is a key process for operating the WMN. This paper proposes a new way of creating multi-path routin…

Routing protocolWireless mesh networkMulticastGeneral Computer ScienceComputer sciencebusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDistance-vector routing protocolAd hoc On-Demand Distance Vector Routing[INFO]Computer Science [cs]UnicastRouting (electronic design automation)Electrical and Electronic EngineeringbusinessComputingMilieux_MISCELLANEOUSComputer networkInternational Journal of Wireless and Mobile Computing
researchProduct

QoS Based Routing Protocol for Intra-Mesh Infrastructure Communications

2015

International audience; Mesh Networks (WMNs) have been considered as a promising alternative to conventional wired networks, thanks to its flexibility and easy deployment. Thus, to ensure a satisfying level of QoS guarantees for real-time and streaming applications such as Voice over IP (VoIP) and Video on Demand (VoD), we propose a novel QoS based routing protocol for wireless mesh environments, called Hybrid QoS Mesh Routing (HQMR), jointly with a clustering algorithm to enhance scalability issues within the mesh infrastructure. HQMR is composed of two routing sub-protocols: a reactive routing sub-protocol for intra-infrastructure communications and a proactive QoS based multi-tree routin…

Routing protocolDynamic Source RoutingPerformance EvaluationComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Enhanced Interior Gateway Routing ProtocolWireless Routing Protocol02 engineering and technologyClusteringNetwork simulationRouting Information Protocol[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringWirelessWireless Mesh NetworkIMRRHierarchical routingZone Routing ProtocolStatic routingVoice over IPQoS Routing[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless mesh networkAdaptive quality of service multi-hop routingbusiness.industryQuality of servicePolicy-based routingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsOrder One Network ProtocolAd hoc wireless distribution serviceIEEEDistance-vector routing protocolOptimized Link State Routing ProtocolLink-state routing protocolMultipath routingInterior gateway protocol020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolbusinessComputer network
researchProduct

Autonomic Brokerage Service for an End-to-End Cloud Networking Service Level Agreement

2014

8 pages; International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) assurance and management in conformance with a corresponding Service Level Agreement (SLA). In this paper, we propose a framework for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and multiple Cloud Service Providers (CSPs) in a cloud networking environment using brokerage service. We focus on Qo…

Cloud computing security[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryService delivery frameworkComputer scienceCloud NetworkingQuality of service[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Quality of ServiceService level requirementCloud computingAutonomic computingService-level agreement[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEECloud testingService catalogAutonomic ComputingCloudSimScalabilityVideoconferencingService Level AgreementData as a servicebusinessComputer network
researchProduct

A global service level guarantee in NGN networks

2010

In this paper, we propose an end-to-end service level negotiation protocol which enables a global service offer covering quality of service (QoS) and security while taking into account user's mobility in this offer. This protocol provides all the domains involved in the transport of a various offered services with a negotiation capability to achieve an agreement on a service level. This paper shows also results of measurements evaluating the performances of the considered negotiation protocol and security impact on QoS.

Service (business)User profileService delivery frameworkbusiness.industryComputer scienceQuality of serviceService level objectiveService level requirementMobile QoScomputer.software_genreSecurity serviceService levelNext-generation networkWeb servicebusinesscomputerComputer networkThe Second International Conference on Communications and Networking
researchProduct

Leader election and local identifiers for three‐dimensional programmable matter

2020

International audience; In this paper, we present two deterministic leader election algorithms for programmable matter on the face-centered cubic grid. The face-centered cubic grid is a 3-dimensional 12-regular infinite grid that represents an optimal way to pack spheres (i.e., spherical particles or modules in the context of the programmable matter) in the 3-dimensional space. While the first leader election algorithm requires a strong hypothesis about the initial configuration of the particles and no hypothesis on the system configurations that the particles are forming, the second one requires fewer hypothesis about the initial configuration of the particles but does not work for all pos…

Leader electionComputer Networks and CommunicationsComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technology[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM][INFO] Computer Science [cs]Computer securitycomputer.software_genre01 natural sciencesComputer Science ApplicationsTheoretical Computer ScienceIdentifierProgrammable matter[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computational Theory and Mathematics010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputerSoftware
researchProduct

Gestion de la qualité de service dans les réseaux maillés sans fil

2020

International audience

[INFO]Computer Science [cs][INFO] Computer Science [cs]ComputingMilieux_MISCELLANEOUS
researchProduct

QBAIoT: QoS Based Access for IoT Environments

2018

[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]
researchProduct

A Global Service Level Guarantee in NGN NetworksA Global Service Level Guarantee in NGN Networks

2010

International audience

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputingMilieux_MISCELLANEOUS
researchProduct

Hybrid QoS Based Routing for IEEE 802.16j Mesh Infrastructure

2014

Acceptance rate: 29%; International audience; With the growth of wireless networks, Wireless Mesh Network (WMN) has appeared as an emerging key solution for broadband Internet access with a low-cost deployment. Moreover, providing QoS guarantees for real-time and streaming applications such as VoIP (Voice over IP) and VoD (Video on Demand) is a challenging issue in such environment. In this paper, we propose a hybrid wireless mesh architecture to provide mesh clients with Internet access while guaranteeing QoS. It is formed by an IEEE 802.16j based infrastructure and several IEEE 802.11s based client domains. A lustering algorithm is developed to enhance scalability issues within the mesh i…

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]HQMRQoS routing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Mesh NetworkIEEE 802.16j
researchProduct

IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments

2017

International audience; One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Netw…

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]mobility management protocolshandover latency[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSeamless vertical handover[INFO]Computer Science [cs][INFO] Computer Science [cs]IEEE 802.21 MIH
researchProduct

Towards Service Level Guarantee within IoT Sensing Layer

2019

IoT[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service LevelQBAIoTQoSIoT objectsSlotted CSMA/CAIoT Gateway
researchProduct

Resource Self-management under an SLA within a Cloud Networking Environment

2015

International audience; Today, cloud networking is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). In this paper, we propose a framework for self-establishing an end-to-end SLA between a Cloud Service User (CSU) and several Cloud Service Providers (CSPs) in a cloud networking environment (inter-cloud Broker and Federation architecture). Then, we propose the self-management of cloud resources under the established SLA using specific autonomic cloud managers. We simulate our proposed fra…

[ INFO ] Computer Science [cs]Cloud NetworkingAutonomic ComputingSelf-managementService Level Agreement[INFO]Computer Science [cs][INFO] Computer Science [cs]Quality of Service.
researchProduct

Routage Hybride basé sur la QoS pour une infrastructure IEEE 802.16j maillé sans fil

2014

International audience

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputingMilieux_MISCELLANEOUS
researchProduct

Autonomous base manager based on cognitive radio systems dedicated to 5G networks

2019

International audience

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO]Computer Science [cs][INFO] Computer Science [cs]ComputingMilieux_MISCELLANEOUS
researchProduct

Hybrid Localization Approach Based on DV-Distance and Fruit Fly Optimization Algorithm for WSNs

2021

[INFO] Computer Science [cs]
researchProduct

Gestion du niveau de service dans les environnements émergents

2020

International audience

[INFO]Computer Science [cs][INFO] Computer Science [cs]ComputingMilieux_MISCELLANEOUS
researchProduct

Autonomic Computing and VANETs

2017

[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO] Computer Science [cs]
researchProduct

HQMR: Hybrid QoS based Routing Protocol for Wireless Mesh Environment

2015

International audience; Wireless Mesh Networks (WMNs) have been attracting more and more interest from both academic and industrial environments for their seamless broadband connectivity to Internet networks. Besides, providing QoS guarantees for real-time and streaming applications such as Voice over IP (VoIP) and Video on Demand (VoD) is a challenging issue in such environment. Thus, we propose a novel QoS based routing protocol for wireless mesh infrastructure, called Hybrid QoS Mesh Routing (HQMR). Moreover, a clustering algorithm is developed to enhance scalability issues within the mesh infrastructure. HQMR is composed of two routing sub-protocols: a reactive routing protocol for intr…

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]ns-3[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]HQMRQoS routingNetwork Simulator[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Mesh Network
researchProduct