Ahmed Meddahi

Ahmed Meddahi
  • IMT Nord Europe

About

56
Publications
7,110
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
502
Citations

Publications

Publications (56)
Chapter
The rapid evolution of beyond fifth-generation (B5G) and sixth-generation (6G) networks has significantly driven the growth of Internet of Things (IoT) applications. These applications are characterised by: a massive connectivity, high security level, trust, wireless coverage, also ultra-low latency, high throughput, and ultra-reliability, especial...
Article
Network Function Virtualization (NFV) is a new technology that deploys network services and functions as software components in data centers and cloud environments. One of its key applications is Service Function Chain (SFC), which chains a set of Virtual Network Functions (VNFs) in a specific order to deliver a desired service. However, deploying...
Article
Service Function Chaining (SFC) has recently received considerable attentions from both industry and academia, due to its potential for improving the flexibility of provisioning and composition of Virtualized Network Functions (VNFs) to suit application-specific needs. From a security perspective, there is a gap between high-level SFC policy specif...
Conference Paper
Full-text available
By using virtualization technology, Network Function Virtualization (NFV) decouples the traditional Network Functions (NFs) from dedicated hardware, which allows the software to progress separately from the hardware. One of the major challenges for NFV deployment is to map Service Function Chains (SFCs), which are chains of sequenced Virtual Networ...
Chapter
Network Function Virtualization (NFV) and Software Defined Networking (SDN) empower Service Function Chaining (SFC), which integrates an ordered list of Virtualized Network Functions (VNFs) together for implementing a particular service. However, the high-level SFC policy specification cannot guarantee that the VNFs are always chained in an expecte...
Article
Network Functions Virtualization (NFV) has been increasingly recognized as an effective way to consolidate hardware-based network functions and implement them using software-based approach, ultimately leading to significant reduction of CAPEX and OPEX. In particular, NFV orchestrators (e.g., Tacker, Cloudify, ONAP) play a vital role in dynamically...
Article
Lookup services is still a key challenge in all distributed systems and particularly for P2P based services (e.g. distributed SDN node controllers, social networking. . . ). In these networks, node searching for a specific service or resource has to discover the "best" path to the node offering the requested resource or service. Since P2P networkin...
Book
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malwar...
Book
The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficien...
Conference Paper
Full-text available
Network Functions Virtualization (NFV) has recently emerged as one of the new networking paradigms to significantly change the way that the networks and services are deployed, managed, and operated. One of the major advantages of NFV is to reduce hardware cost, meanwhile increasing service agility and scalability. Recently, there are many platforms...
Conference Paper
Full-text available
Network Functions Virtualization (NFV) has recently emerged as one of the major technological driving forces that significantly accelerate the evolution of today's computer and communication networks. Despite the advantages of NFV, e.g., saving investment cost, optimizing resource consumption, improving operational efficiency, simplifying network s...
Conference Paper
Regarding the shortcoming of fundamental existing solutions for VoIP (eg. SIP and H.323) such as centralization. Recently, both academia and industry have initiated research projects directed on integration of P2P-SIP paradigm into communication systems. P2P-SIP utilizes the advantages of an overlay network to provide SIP based services with high o...
Article
Full-text available
There is no doubt that P2P traffic mainly video traffic (e.g. P2P streaming, P2P file sharing, P2P IPTV) increases and will represent a significant percent of the total IP video traffic (80 percent by 2018 of the global IP traffic according forecasts). Peer-to-peer (P2P) is based on some main concepts such as mutualization of resources (e.g. data,...
Conference Paper
In this paper, we address the quality aware routing issue in MANET: Mobile Ad hoc networks. The MANET network is based on dynamic radio links. Our contribution improves the multipath routing in Mobile Ad hoc networks based on the path quality, path stability and QoS awareness. Prediction methods are used in order to estimate the path quality. The p...
Conference Paper
We propose a cross layer approach to achieve greater routing performance for applications with real time constraints in Mobile Ad Hoc Networks. Interactions between MAC, Network and Application layers are fully exploited to get accurate information about the end-to-end path quality, and the applications’ characteristics. The improvements provided b...
Conference Paper
Nowadays, the LTE and WiFi networks are set to dominate the outdoor and indoor spaces. To enlarge the coverage of WiFi hotspots, a WMN: Wireless Mesh Network called IEEE 802.11s was defined. In this paper, we aim to enhance the interworking performance between LTE and 802.11s network by handling the QoS in IEEE 802.11s network. In this context, we...
Conference Paper
In wireless networks, prediction methods are considered as efficient techniques to get information about the network capacity and availability. Delay and packet loss are two key QoS parameters for real time applications. Conventional MAC layer functions can only predict the link characteristics. In our paper, a cross layer design is deployed to get...
Chapter
Full-text available
Peer-to-Peer (P2P) systems are increasingly popular as an alternative to the traditional client-server model for many applications, particularly file sharing. Free-riding is one of the most serious problems encountered in Peer-to-peer (P2P) systems like BitTorrent. Free riding is a serious problem in P2P networks for both Internet service providers...
Article
It is well known that Peer-to-Peer systems are generally featured with high flexibility and scalability, enabling dynamic resources localization and mutualization, and allowing the nodes to freely join and leave. But in some special environments such as mobile P2P networks, routing optimization, resources reliability and availability are critical c...
Book
Le protocole SIP (Session Initiation Protocol) est la technologie-clé pour le transport et la fourniture de services télécoms, en particulier pour les services en plein essor de téléphonie sur IP. Cet ouvrage présente les concepts du protocole et de l'architecture SIP mais aussi ses limites et les contraintes associées à leurs déploiements. Les mét...
Conference Paper
Nowadays, a new paradigm is emerging: the challenging integration of Peer-to-Peer into mobile Ad hoc networks (MANETs). In this context, this paper proposes to combine two Chord extensions for MANETs. Its main objective is to reduce the lookup failures. Simulation results indicate that the proposed scheme has an improved performance in comparison w...
Article
Group communications (real-time and non-real-time) refer to one-to-many or many-to-many communications. On the one hand, multicast is considered as an appropriate solution for supporting group communication-oriented applications (we distinguish IP network multicast from application layer multicast). On the other hand, peer-to-peer model tends to be...
Article
Full-text available
Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constit...
Conference Paper
Nowadays, a new paradigm is emerging: the challenging integration of Peer-to-Peer into mobile Ad hoc networks (MANETs). In this context, this paper proposes a new distributed lookup protocol for mobile P2P networks. Its main objective is to reduce the overhead traffic and the lookup delay. Simulation results indicate that the proposed scheme has an...
Conference Paper
The critical issue of P2P models for supporting Internet telephony are: users localization and their ldquoasynchronousrdquo nature. In this paper, we propose a new P2P-SIP architecture for Internet telephony; aims to support the asynchronous model that generally characterized P2P systems. The purpose is to optimize the global end-to-end delay, whic...
Conference Paper
Resource retrieval is a key element for P2P networks. In this paper we focus on unstructured peer-to-peer networks and present an approach for resources retrieval called DV-Flood. This approach aims to minimize lookup and get delay. The architecture of our proposed model is organized as a several clusters connected through gateways (leader node). E...
Conference Paper
Application layer multicast (ALM) is considered as an attractive approach for implementing wide area multicast services. In ALM, multicast functionality is implemented at the edge instead of the core network (routers). As opposed to network-layer multicast, application layer multicast requires no infrastructure support and can be easily deployed in...
Conference Paper
IETF Xcon working group and ITU-T SG 16 specify a generic framework for centralized multipoint conferencing applications. The centralized architecture adopted by these specifications are not well adapted to today open and dynamic networks and have well-know drawbacks. In this paper, we present a P2P approach for supporting conference type services...
Conference Paper
Multicast avoids sending repeated packets over the same network links and thus offers the promise of supporting multimedia streaming over wide-area networks. Previously, two opposite multicast schemes forward-path forwarding and reverse-path forwarding have been proposed on top of structured peer-to-peer (p2p) overlay networks. In this paper, we pr...
Chapter
IP multiparty conferencing services such as: audio/video conferencing constitute a cost effective and flexible solution compare to TDM based multiparty conferencing. On one hand most of the existing multiparty or N-way conferencing solutions are based on a centralized server (Conference Bridge). On the other hand Peer-to-Peer model is inherently ch...
Article
Quality of service (QoS) for Voice over IP has to be measured by a perceptual QoS metric that corresponds to the intelligibility and clarity of the speech, as perceived by the listener. This subjective measure must be “captured”, mainly by models that rely on objective measurements, based on transmission delays and packet losses monitoring. These p...
Conference Paper
Peer-to-Peer systems are based on the concept of resources localization and mutualization in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constit...
Conference Paper
Supporting QoS for VoIP is a topic that clearly remain of importance. Existing QoS mechanisms for voice over IP need to be adapted. This is essentially due to the high dynamicity and variability of subjective voice quality perception, particularly in some critical conditions (ex. mobile networks). In this paper, we present an architecture, called "...
Article
Full-text available
Routing protocols for ad hoc networks typically include mechanisms for route discovery and route maintenance. The performance of these protocols depends on the route maintenance mechanism they use. The movement of network nodes can cause routes to become unusable. A node on a route from a source to a destination may become unreachable from its pred...
Conference Paper
Full-text available
In this paper we implement and evaluate a new solution for the multimedia session setup with resource allocation in policy-enabled networks that we developed in [1]. Our proposal is based on the use of Session Initiation Protocol (SIP) in the framework of Policy-Based Management (PBM). We specifically evaluate the feasibility and the scalability of...
Conference Paper
SIP (Session Initiation Protocol) is a text-based protocol engineered for high data rate links. As a result, SIP messages size have not been optimised. This is problematic, particularly with the planned usage of this protocol in wireless handsets as part of 2.5G and 3G cellular networks. With low bit rate IP connectivity or signalling channel, the...
Conference Paper
Quality of service for Voice over IP on wireless links (WiFi) has to be measured by the perceptual speech quality. How can this subjective measures be "captured" by models that rely on objective measures based on transmission delays and packet losses monitoring. These parameters which are common on such links can affect dramatically speech quality....
Conference Paper
Since 1993, we have been involved in the development and deployment of network architecture and protocols for distance learning. The first platform was based on ISDN and H.320 protocols. Now, we implement, test and validate a new Internet based architecture. We present an Internet based platform for e-learning and discuss some of issues concerning...
Conference Paper
Today, SIP is a potential candidate for the evolution of traditional PSTN (Public Switched Telephone Network) signaling protocols in both the terminal and the core network. It is envisioned to work in the PSTN as well as in the 3G Release 5 infrastructures. Few studies try to evaluate the performance of the protocol and its scalability. In this pap...

Network

Cited By