-
Scalable and Cost Efficient Algorithms for Virtual CDN Migration
Authors:
Hatem Ibn-Khedher,
Makhlouf Hadji,
Emad Abd-Elrahman,
Hossam Afifi,
Ahmed E. Kamal
Abstract:
Virtual Content Delivery Network (vCDN) migration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV migration algorithms due to the evident huge amount of traffic to be delivered to end customers of the network.…
▽ More
Virtual Content Delivery Network (vCDN) migration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV migration algorithms due to the evident huge amount of traffic to be delivered to end customers of the network. In this paper, two approaches for finding the optimal and near optimal path placement(s) and vCDN migration(s) are proposed (OPAC and HPAC). Moreover, several scenarios are considered to quantify the OPAC and HPAC behaviors and to compare their efficiency in terms of migration cost, migration time, vCDN replication number, and other cost factors. Then, they are implemented and evaluated under different network scales. Finally, the proposed algorithms are integrated in an SDN/NFV framework. Index Terms: vCDN; SDN/NFV Optimization; Migration Algorithms; Scalability Algorithms.
△ Less
Submitted 30 August, 2016;
originally announced August 2016.
-
Network Issues in Virtual Machine Migration
Authors:
Hatem Ibn-Khedher,
Emad Abd-Elrahman,
Hossam Afifi,
Jacky Forestier
Abstract:
Software Defined Networking (SDN) is based basically on three features: centralization of the control plane, programmability of network functions and traffic engineering. The network function migration poses interesting problems that we try to expose and solve in this paper. Content Distribution Network virtualization is presented as use case.
Software Defined Networking (SDN) is based basically on three features: centralization of the control plane, programmability of network functions and traffic engineering. The network function migration poses interesting problems that we try to expose and solve in this paper. Content Distribution Network virtualization is presented as use case.
△ Less
Submitted 6 January, 2017; v1 submitted 11 August, 2015;
originally announced August 2015.
-
A Hybrid Model to Extend Vehicular Intercommunication V2V through D2D Architecture
Authors:
Emad Abd-Elrahman,
Adel Mounir Said,
Thouraya Toukabri,
Hossam Afifi,
Michel Marot
Abstract:
In the recent years, many solutions for Vehicle to Vehicle (V2V) communication were proposed to overcome failure problems (also known as dead ends). This paper proposes a novel framework for V2V failure recovery using Device-to-Device (D2D) communications. Based on the unified Intelligent Transportation Systems (ITS) architecture, LTE-based D2D mechanisms can improve V2V dead ends failure recovery…
▽ More
In the recent years, many solutions for Vehicle to Vehicle (V2V) communication were proposed to overcome failure problems (also known as dead ends). This paper proposes a novel framework for V2V failure recovery using Device-to-Device (D2D) communications. Based on the unified Intelligent Transportation Systems (ITS) architecture, LTE-based D2D mechanisms can improve V2V dead ends failure recovery delays. This new paradigm of hybrid V2V-D2D communications overcomes the limitations of traditional V2V routing techniques. According to NS2 simulation results, the proposed hybrid model decreases the end to end delay (E2E) of messages delivery. A complete comparison of different D2D use cases (best & worst scenarios) is presented to show the enhancements brought by our solution compared to traditional V2V techniques.
△ Less
Submitted 20 February, 2015;
originally announced February 2015.
-
Assisting V2V failure recovery using Device-to-Device Communications
Authors:
Emad Abd-Elrahman,
Adel Mounir Said,
Thouraya Toukabri,
Hossam Afifi,
Michel Marot
Abstract:
This paper aims to propose a new solution for failure recovery (dead-ends) in Vehicle to Vehicle (V2V) communications through LTE-assisted Device-to-Device communications (D2D). Based on the enhanced networking capabilities offered by Intelligent Transportation Systems (ITS) architecture, our solution can efficiently assist V2V communications in failure recovery situations. We also derive an analy…
▽ More
This paper aims to propose a new solution for failure recovery (dead-ends) in Vehicle to Vehicle (V2V) communications through LTE-assisted Device-to-Device communications (D2D). Based on the enhanced networking capabilities offered by Intelligent Transportation Systems (ITS) architecture, our solution can efficiently assist V2V communications in failure recovery situations. We also derive an analytical model to evaluate generic V2V routing recovery failures. Moreover, the proposed hybrid model is simulated and compared to the generic model under different constrains of worst and best cases of D2D discovery and communication. According to our comparison and simulation results, the hybrid model decreases the delay for alarm message propagation to the destination (typically the Traffic Control Center TCC) through the Road Side Unit (RSU)
△ Less
Submitted 5 February, 2015;
originally announced February 2015.
-
Hash Chain Links Resynchronization Methods in Video Streaming Security Performance Comparison
Authors:
Emad Abd-Elrahman,
Mohamed Boutabia,
Hossam Afifi
Abstract:
Hash chains provide a secure and light way of security to data authentication including two aspects: Data Integrity and Data Origin Authentication. The real challenge of using the hash chains is how it could recover the synchronization state and continue kee** the hash link in case of packet loss? Based on the packet loss tolerance and some accepted delay of video delivery which are representing…
▽ More
Hash chains provide a secure and light way of security to data authentication including two aspects: Data Integrity and Data Origin Authentication. The real challenge of using the hash chains is how it could recover the synchronization state and continue kee** the hash link in case of packet loss? Based on the packet loss tolerance and some accepted delay of video delivery which are representing the permitted tolerance for heavy loaded applications, we propose different mechanisms for such synchronization recovery. Each mechanism is suitable to use according to the video use case and the low capabilities of end devices. This paper proposes comparative results between them based on the status of each one and its overhead. Then, we propose a hybrid technique based Redundancy Code (RC). This hybrid algorithm is simulated and compared analytically against the other techniques (SHHC, TSP, MLHC and TSS). Moreover, a global performance evaluation in terms of delay and overhead is conducted for all techniques.
△ Less
Submitted 4 February, 2015;
originally announced February 2015.
-
Optimization of Quality of Experience through File Duplication in Video Sharing Servers
Authors:
Emad Abd-Elrahman,
Tarek Rekik,
Hossam Afifi
Abstract:
Consumers of short videos on Internet can have a bad Quality of Experience QoE due to the long distance between the consumers and the servers that hosting the videos. We propose an optimization of the file allocation in telecommunication operators content sharing servers to improve the QoE through files duplication, thus bringing the files closer to the consumers. This optimization allows the netw…
▽ More
Consumers of short videos on Internet can have a bad Quality of Experience QoE due to the long distance between the consumers and the servers that hosting the videos. We propose an optimization of the file allocation in telecommunication operators content sharing servers to improve the QoE through files duplication, thus bringing the files closer to the consumers. This optimization allows the network operator to set the level of QoE and to have control over the users access cost by setting a number of parameters. Two optimization methods are given and are followed by a comparison of their efficiency. Also, the hosting costs versus the gain of optimization are analytically discussed.
△ Less
Submitted 4 February, 2015;
originally announced February 2015.