A. Halim Zaim

Istanbul University, İstanbul, Istanbul, Turkey

Are you A. Halim Zaim?

Claim your profile

Publications (38)10.62 Total impact

  • [Show abstract] [Hide abstract]
    ABSTRACT: In parallel with the enormous spread of Internet usage, the tendency of users for high capacity applications (HDTV, Online Games, P2P File Transfer) are rising. This increase in needs of data communication, compel the service providers to act to end users better than before. At this point, Passive Optical Networks (PONs) distinguish in access network solutions due to its capability of carrying high amount of data over longer distances. Although they are still in development, existing electronic based data communication techniques (ADSL, double twisted copper telephony systems like VDSL, cable modem coaxial cable CATV systems) can operate over short distances and have large amount of energy consumption. In this paper, basic schemes of dynamic bandwidth allocation algorithms on EPON have been presented and a novel online-offline based method called hcDBA (Half Cycling Dynamic Bandwidth Allocation) has been introduced. In addition, hcDBA algorithm has been improved with early prediction mechanism (p-hcDBA). By the simulation studies, it has been investigated that hcDBA algorithm performs better than existing mechanism in terms of byte loss ratio and access delays criteria. p-hcDBA also improved the performance in terms of access delay. In this study, we stated that when the bandwidth increases the prediction approached has more impact of the overall performance.
    Optical Switching and Networking 06/2014; · 0.72 Impact Factor
  • Source
    Ali Norouzi, A Halim Zaim
    [Show abstract] [Hide abstract]
    ABSTRACT: There are several applications known for wireless sensor networks (WSN), and such variety demands improvement of the currently available protocols and the specific parameters. Some notable parameters are lifetime of network and energy consumption for routing which play key role in every application. Genetic algorithm is one of the nonlinear optimization methods and relatively better option thanks to its efficiency for large scale applications and that the final formula can be modified by operators. The present survey tries to exert a comprehensive improvement in all operational stages of a WSN including node placement, network coverage, clustering, and data aggregation and achieve an ideal set of parameters of routing and application based WSN. Using genetic algorithm and based on the results of simulations in NS, a specific fitness function was achieved, optimized, and customized for all the operational stages of WSNs.
    The Scientific World Journal 01/2014; 2014:286575. · 1.73 Impact Factor
  • Source
    Ali Norouzi, Faezeh S. Babamir, A. Halim Zaim
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we describe an interactive approach to design mobile sensor networks. The node-mobility aspect requires an online or interactive algorithm to determine the optimal network-coverage solution for a given area of interest. Hence, we develop a real-time genetic algorithm to find the suitable direction of node locomotion, considering either coverage of the target area or estimation of the optimum energy consumption. The main purpose is to provide a solution that can extend the network lifetime. The simulation results indicate that the proposed fitness function achieves our objectives.
    Studies in Informatics and Control 06/2013; 22. · 0.55 Impact Factor
  • Taner Çevik, Abdül Halim Zaim
    [Show abstract] [Hide abstract]
    ABSTRACT: Depending upon the technological developments, the same fast evolution has occurred in the structures of sensor networks, their composing devices which are sensor nodes, and their application areas. Those tiny, energy-constrained, mostly non-real-time data transmitting sensor nodes have evolved to more energy-containing, camera-adapted, real-time multimedia-data-transmitting devices. Developments in the usage areas and the capabilities have revealed some other problems such as time limited data transmission. In this paper, we propose a multichannel cross-layer architecture for Quality of Service (QoS) constrained multimedia sensor networks. The proposed architecture considers both the time and energy efficiency concepts. Energy efficiency is succeeded by ensuring the fair load distribution among the nodes during a real-time multimedia packet stream transmission. Besides ensuring the fair load distribution, on-time packet transmission is also assured by constructing the paths with a hard reservation technique depending on the predetermined QoS constraints. Simulations show that the proposed architecture provides higher performance than the Greedy approach and the LEERA scheme.
    International Journal of Distributed Sensor Networks 03/2013; 2013. · 0.92 Impact Factor
  • Safak Durukan Odabasi, A. Halim Zaim
    Int. Conference on Networking and Future Internet (ICNFI 2012); 04/2012
  • Source
    Ali Norouzi, A. Halim Zaim
    Real-Time Systems, Architecture, Scheduling, and Application, 04/2012; , ISBN: 978-953-51-0510-7
  • [Show abstract] [Hide abstract]
    ABSTRACT: This study is about a prediction approach for our previous dynamic bandwidth allocation algorithm for Ethernet Passive Optical Networks (EPON). Our previous work (hcDBA) is based on half cycle timing for bandwidth allocation. That can be handled as a middle way between online and offline bandwidth allocation schemes. In PONs, prediction is used for bandwidth allocation to grant loaded nodes with early responses. However, due to the versatile nature of data traffic, prediction algorithms have a handicap to provide a better solution in classical approaches. In this study, a novel prediction approach integrated with hcDBA algorithm described. Performance comparison of hcDBA with & without prediction and IPACT algorithm is given. According to the simulation results, prediction on hcDBA seems to give some performance improvements in terms of access-delay.
    Computers and Communications (ISCC), 2012 IEEE Symposium on; 01/2012
  • [Show abstract] [Hide abstract]
    ABSTRACT: Metropolitan ring networks are usually used to connect the high speed backbone networks with access networks. Until now, the metropolitan network and the access network are gained much attention of researchers. However they have been investigated in separate ways. There is no work in which the end- to-end performance from end-users of the access network to metropolitan network is evaluated. How to simulate a complete end-to-end network while keeping basic characteristics of access and metro traffic is an emergence problem to evaluate the end-to- end performance. In reality, a complete end-to-end network in which hundreds of Ethernet Passive Optical Network (EPON) are connected to metro ring networks cannot be simulated because of the huge amount of traffic generated from the access network side. In this paper, we aim to obtain trace files of incoming traffic at the entrance of Optical Line Terminal (OLT) by running simulations of an EPON network which implements Interleaved Polling with Adaptive Cycle Time (IPACT). Then, the generated traffic pattern will be characterized in order to find corresponding traffic model among well known traffic models and this model will be used as output traffic of OLTs. After, we can use this traffic model without simulating a complete EPON network. Through various simulations, we observe that the generated traffic that comes to OLT is similar to the traffic obtained with Poisson sources.
    Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey, 4-8 July, 2011; 01/2011
  • Taner Cevik, A. Halim Zaim
    [Show abstract] [Hide abstract]
    ABSTRACT: With the evolution of electronics, wireless sensor networks have been very popular in many domains of human life such as health, industry and military. This popularity has taken the attention on to the researches about wireless sensor networks. Wireless Sensor Networks are especially very favorable in conditions where it is physically difficult and dangerous for human being to gather information. Therefore, lifetime of those networks must be prolonged as much as possible, since it will be also infeasible to replace the energy depleted sensors with the new ones deployed in such geographical areas that are difficult and dangerous for human being to enter. In this paper, we present a localized energy aware routing method LEERA-MS and an alternative LEERA-MS-TH method that are used incorporation with an energy efficient sleep-wakeup schedule which is included with pipelining mechanism we have proposed before. Employing multiple sinks improve the performance by providing the fairly distribution of the load. Simulation results show that this routing method applied on a multiple sinks topology when employed together with the pipelined sleep-wakeup schedule provides 40% longer lifetime for wireless sensor networks.
    Distributed Computing in Sensor Systems, 7th IEEE International Conference and Workshops, DCOSS 2011, Barcelona, Spain, 27-29 June, 2011, Proceedings; 01/2011
  • Computer and Information Sciences II - 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011; 01/2011
  • Safak Durukan Odabasi, A. Halim Zaim
    [Show abstract] [Hide abstract]
    ABSTRACT: Today, Internet has become an indispensable part of our daily lives. It has a growing user community in many fields from banking transactions to online entertainment. It will be very efficient for users, as the next generation internet access becomes wireless like frequently used services such as cellular phones. But for providing this, a new network is needed to be designed or an existing network must be improved as well as making changes on infrastructure. At this point, mesh network infrastructure arises and offers more sophisticated internet access with less need. The most important advantage of mesh networks is the capability of working without infrastructure. Mesh networks are an additional access technology more than being a renewed one in the next generation wireless networks called 4G. In this study, wireless mesh networks and example applications are mentioned. Base architecture and design factors are emphasized, current routing protocols that are used on wireless mesh networks and routing metrics on which these protocols are based, are explained. Finally, the performance effects of these protocols and metrics on different network topologies are referred.
    IJEMME-International Journal of Electronics, Mechanical and Mechatronics Engineering Journal. 01/2011; 2(1):92-104.
  • Source
    Taner Cevik, Derya Yiltas, A. Halim Zaim
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless sensor networks are comprised of energy constraint, battery powered small devices that sense the environment and transmit the data to the sink in order to take action according to data. Since the sensors are small energy constraint devices energy consumption is the main problem for wireless sensor networks. Energy spent during data communication is much more than spent during in-sensor computing. Most of the effort is spent on designing protocols in order to conserve energy. This paper proposes an improved version of energy efficient MAC protocol STEM by including pipelining mechanism. Results show that the proposed method overperform the original version of STEM by sustaining less delay.
    Procedia CS. 01/2011; 3:96-103.
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this article, we are interested in improving the handover quality of Host Identity Protocol (HIP) in the case of micro mobility by (i) proposing the Local Rendezvous Server architecture as a first attempt to minimize the handover delay in the mobility process, (ii) introducing an adaptive early update mechanism to improve the handover quality during mobility by introducing early HIP (eHIP) and finally (iii) we propose a method that minimizes the total radio resource utilization in our architecture subject to the QoS constraints of Mobile Nodes (MNs) especially the delay of real-time applications. We prove through simulations that our scheme can achieve significant gains in terms of radio resource utilization while taking into account the mobility of MNs along with the respect of their QoS parameters for their ongoing real-time applications.
    Proceedings of the IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2010, 26-29 September 2010, Istanbul, Turkey; 01/2010
  • [Show abstract] [Hide abstract]
    ABSTRACT: Social networking has become a part of our life. We redundantly share our personal information with people in social networks and Internet. These networks allow users to share just about everything: data, photos, videos, favorite music, status updates, and more applications. Sharing large amounts of information causes privacy and security problems for users in these networks. To prevent privacy problems, we can provide built-in applications that help to protect our privacy by limiting the friends who get access to our personal information. Many users still do not make use of these applications. Users fail to use the application either because they are not aware that it exists or because of the tedious process that is involved when manually grouping friends into different categories to form a friends list. The privacy problem has prompted us to provide a solution that offers the social networks users an opportunity to protect their privacy. In this study, a privacy and security technique, its algorithm and design were mentioned. Our approach proposes an API, which provides grouping of friends through an automated system into different social groups by analyzing the user's social graph and depending on what common information they would like to share that should not be accessed by other friends. We assume that a user shares the same information in a group, as we call social circles. Finding these social circles will help users to group their friends easily and meaningfully.
    Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on; 01/2010
  • [Show abstract] [Hide abstract]
    ABSTRACT: Nowadays, fiber optic networks that make transmission possible in high capacities become widespread. There is a partial decrease in network problems with the capabilities provided by these networks such as telephone, wide area network, Internet, video conference on a single fiber line. Also in optical networks, optical burst switching that is a new technology stands out by its some partial benefits. Optical burst switching (OBS) is a promising solution for all optical networks. In this paper, a program is developed which simulates signaling channel of an OBS switch, for signaling messages that uses signaling protocols while going from source node to destination node through intermediate OBS switches. In this study, some models for inter-arrival time of the signaling messages and processing time in the service are used and a comparison of these models with the other well known models is done (M/M/1/K queuing model and a model using self-similar traffic as arrival process).
    International Journal of Computer Science Issues(IJCSI). 01/2010; 7(5).
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article presents a comparative study between Optical Burst Switching (OBS) and Optical Packet Switching (OPS) with variable-size packets on mono-service and multi-service network with Quality of Service (QoS) support. In terms of performance criteria, loss rate in byte and access delay are considered. A 2-state Markov Modulated Poisson Process (MMPP) traffic generator is used. A 14-nodes mesh network topology illustrating NSFNET and a ring topology are designed as the testbed. NS2 Network Simulation tool is used for our tests. According to the simulation results, we have seen that in both mono-service and multi-service networks, OPS is better than OBS under low traffic loads. However, OBS performs better than OPS in mono-service networks and low priority service classes under high traffic loads. In this study, we have shown that choosing one of these two switching technologies (OPS or OBS) in the future depends on the traffic load and the topology of network, together with the considered service differentiation scheme.
    Optical Switching and Networking. 01/2010; 7:85-94.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known attacks whereas anomaly detection based IDSs can also detect new attacks by using heuristic methods. In this paper we propose a hybrid IDS by combining the two approaches in one system. The hybrid IDS is obtained by combining packet header anomaly detection (PHAD) and network traffic anomaly detection (NETAD) which are anomaly-based IDSs with the misuse-based IDS Snort which is an open-source project.The hybrid IDS obtained is evaluated using the MIT Lincoln Laboratories network traffic data (IDEVAL) as a testbed. Evaluation compares the number of attacks detected by misuse-based IDS on its own, with the hybrid IDS obtained combining anomaly-based and misuse-based IDSs and shows that the hybrid IDS is a more powerful system.
    Computers & Electrical Engineering. 01/2009; 35:517-526.
  • Derya Yiltas, A. Halim Zaim
    [Show abstract] [Hide abstract]
    ABSTRACT: All communication systems must be controlled by strong traffic management architectures. In such systems, many calls are transmitted through many nodes. In this way, a call is blocked if the system is overloaded or the link between the current nodes is deactivated. In this study, we analyze and control the traffic of our sample communication system under different criteria to avoid these problems. We consider low-earth orbit (LEO) satellite systems, because satellites become a vital requirement for today's dense communication areas. We present a mathematical model to calculate call blocking probabilities (CBPs) with a new traffic density function which is based on coverage areas and current time slots. We also use the channel numbers of the links between satellites in CBP formulas to specify the communication lines and to mean different delivery buses for the calls. Then we compare the results under different CBP values.
    Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009; 01/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: In current internet architecture, IP address plays both roles of locator and identification of attached nodes in the network. As the mobility of devices increases, the dual role of IP addresses makes mobility management complicated from security and QoS point of views. Host Identity Protocol (HIP) proposed by the IETF and IRTF introduces a new approach to solve the problem of IP addresses' dual role. HIP introduces the concept o identifier being different from the IP address to identify uniquely the node, no matter which IP address it has. The network keeps the correspondence between this HIP identifier and the current IP address of the mobile node. In this paper, we examined the micro mobility issues and challenges of HIP and we propose a hierarchical approach to improve the HIP update process and a new early update mechanism in order to improve the handover latency.
    Proceedings of the 6th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2009, Nice, France, September 2-4, 2009; 01/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this study, a wavelength grouping approach has been proposed for core nodes in OBS in order to control byte drop rates for different classes of traffic. Preemptive Channel Scheduling Algorithm (PCSA) has been used for channel scheduling in OBS. In terms of performance criteria, loss rate in bytes is considered. A 2-state MMPP (Markov Modulated Poisson Process) traffic generator on a 14-node mesh network topology illustrating NSFNET is designed as the testbed. NS2 Network Simulation tool is used for our tests. In OBS algorithms, bursts are created using a hybrid model that takes into account both timeout and maximum length threshold mechanisms. In nodes, in order to satisfy QoS requirements, priority based queuing and Regulative Wavelength Grouping (RWG) are used. In priority based queuing, packets (bursts) are sent according to their priority order. RWG mechanism, where the number of wavelengths for each traffic class is arranged for adjusting the packet drop probability of different classes of client traffic under a specific threshold value, is used for providing priority levels. According to the simulation studies, RWG algorithm gives better results in OBS for high priority traffic performance.
    The Fifth Advanced International Conference on Telecommunications, AICT 2009, 24-28 May 2009, Venice/Mestre, Italy; 01/2009