Nadia Boukhatem

Nadia Boukhatem
  • Institut Mines-Télécom

About

49
Publications
3,851
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
278
Citations
Current institution
Institut Mines-Télécom

Publications

Publications (49)
Article
Full-text available
In most storage systems, the storage nodes store data on a local filesystem. Thus, unless they have a dedicated caching layer, they benefit from the usual filesystem cache in the host’s free memory. However, in erasure-coded storage systems, caching is effective only if all the systematic fragments corresponding to an object are in the cache. In th...
Chapter
Erratum to: D. Gaïti and N. Boukhatem (Eds.) Network Control and Engineering for QoS, Security and Mobility DOI: 10.1007/978-0-387-35620-4
Conference Paper
In this paper, we introduce a new network coding scheme with adaptive redundancy for scalable video streams in multi-hop wireless networks. Since scalable video coding produces a high quality bitstream with various levels of quality, we propose to offer better protection for important video layers when the link experiences a poor quality. Our schem...
Article
Wireless access networks constitute an important part of mobile doud computing. Using mesh networks is a promising solution to quickly provide connectivity infrastructure for cloud service access. While mesh networks can be easily set up, the wireless nature of the links interconnecting mesh routers compromises the network performances. Network cod...
Article
In lossy environment like wireless networks, random losses are treated by TCP as signals of congestion and TCP cuts down the sending rate, leading to the performance degradation. The practical network coding system TCP/NC can address this problem. TCP/NC masks the random losses by allowing the destination to acknowledge every degree of freedom even...
Conference Paper
Intra-flow network coding was proposed in recent years as a way of enhancing TCP performance over wireless networks. Transmission reliability is improved by sending redundant coded packets instead of retransmitting data packets. In this paper, we discuss the complex issue of TCP interaction with network coding and identify how network coding hides...
Article
Next generation mobile networks will provide seamless mobility between existing cellular systems and other wireless access technologies. To realize a seamless vertical handover (inter-radio access technology handover) among these different access technologies, a multi-interfaced mobile station (i.e., multihomed) is a good approach to provide better...
Conference Paper
Recent research shows that random linear network coding is adapted into current network systems to provide transmission reliability. In lossy environments, like wireless networks, a redundancy control is also needed to mitigate losses. Some implementations suggest adding a fixed amount of redundant packets per batch. This solution poses the risk of...
Conference Paper
With widespread deployment of often overlapping mobile and wireless coverage today, modern-day smartphones may have the capability to transmit data using multiple parallel paths to improve overall communication throughput. However, multipath data transfers have serious compatibility issues with reliable transport layer protocols which dictate the d...
Conference Paper
Recent technological developments in mobile networks arena have led manufacturers to incorporate multiple radio network interfaces in modern day mobile terminals. On the other hand, the availability of a diverse range of access networks makes it possible for mobile terminals to connect to several types of networks simultaneously. In such a scenario...
Conference Paper
We consider a system of multi-homed mobile terminals with the ability to associate each of its running application flows to a specific network cell via terminal's network radio inter faces. These terminals compete for common network resources in order to optimise its proper utility value. We describe the system as a potential evolutionary game and...
Conference Paper
One of main feature of next generation of mobile networks is an integration of existing cellular systems with other wireless access technologies. In order to realize a seamless vertical handover (inter-RAT handover) among these different access technologies, a multi-interfaced mobile station is expected to communicate simultaneously on various netw...
Conference Paper
New-age mobile devices are often equipped with multiple network interfaces, which can be exploited simultaneously by sharing a single traffic load over more than one available path. However, parallel data transfers introduce a serious risk to in-order data delivery for transport layer primitives. This is principally due to the difference in charact...
Chapter
Full-text available
In this chapter, we proposed an IP-based RFID architecture that allows low cost and large scale deployment, as well as easy integration with IP-based services. Particularly, a location management support is provided. The RCOM interface is introduced to handle location registration messages and entering/leaving tags detection.
Conference Paper
Full-text available
A critical issue in wireless sensor networks isrepresented by the limited availability of energy withinsensor nodes. An effective approach for energy conservationis scheduling sleep intervals for extraneous nodes, while theremaining nodes stay active to provide continuous service.Most previous solutions assumed a perfect radio conditionwith a stati...
Conference Paper
Full-text available
The main design challenge for wireless sensor network solutions is energy efficiency to prolong the network operable lifetime. Since most energy is spent for radio communications, an effective approach for energy conservation is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. Ass...
Conference Paper
Full-text available
Current mobile terminals are equipped with several network interfaces, which may be of different access technologies, both wireless and cellular. With multi-homed terminals, it becomes possible to use simultaneously the various interfaces - and not only to handoff from one to another. Furthermore, it becomes possible to associate the suitable inter...
Article
Full-text available
Designing an IP-based RFID system allows low costdeployment and easy integration with IP-based services. In this paper, we propose an IP-based RFID architecture and focus on location management which allows determining “where” the object is after moving. The IP-based RFID architecture includes several components that allow collecting information fr...
Article
We designed the GISP (generic signaling service protocol) protocol to contribute to the effort of the NSIS (next steps in signaling) IETF working group in defining a generic IP signaling protocol. In this paper, we summarize the GISP characteristics and focus on its performance results. In particular, a comparison with the GIST (general Internet si...
Article
Once a mobile node is equipped with multiple interfaces, it is possible to select dynamically the best interface according to different attributes such as the interface characteristics, user preferences, application preferences, ... In this paper, we propose the shortest distance to positive ideal attribute (SiPiA) algorithm to help terminal to dyn...
Conference Paper
Full-text available
Current mobile terminals are often equipped with several network interfaces, which may be of different access technologies, both wireless and cellular. It is possible to select dynamically the best interface according to different attributes such as the interface characteristics, user preferences and/or application preferences... MADM is an algorit...
Article
Designing IP-based RFID system allows low cost deployment and easy integration with IP-based services. In this paper, we propose IP-based RFID architecture and focus on location management which allows determining ldquowhererdquo the object is after moving. The IP-based RFID architecture includes several components that allow collecting information...
Conference Paper
After having used multimedia services from his desktop computer, the mobile user wishes today to access these services whatever the terminal or network used. In this paper, we propose an autonomic service provisioning solution to mobile users and suggest the use of a smart card as an autonomy enabler. Service portability, adaptation and session m...
Article
The Next Steps In Signaling (NSIS) working group has been recently created to design a generic IP signaling protocol supporting various signaling applications. This paper presents the Generic In Signaling Service Protocol (GISP) we designed considering the current outputs of the NSIS working group. In particular, we focus on the state management an...
Conference Paper
Full-text available
Dynamic service level negotiation is necessary to flexibly allocate resources according to QoS demands of a host or a domain. We have designed COPS-SLS as a service level negotiation protocol for IP-based networks. In this paper, we analyse a COPS-SLS-based negotiation system from the protocol design and system's scalability perspectives. This anal...
Conference Paper
Full-text available
The signaling becomes an important research in the IP network. The signaling is used to exchange t he information between entities which can be in the sa me domain or in different domains. The exchanged information can be a request of service (e.g. a quality of service (QoS) , middlebox configuration), negotiation of a service (negotiati on of serv...
Conference Paper
The deregulated telecommunication market tends to force network operators to open their infrastructure to third party service providers to offer a large variety of services. This trend is already appearing, particularly in the mobile environment, and it is widely admitted that this situation will not take a long time to be applied to the informatio...
Article
The Internet is a set of interconnected domains in which different QoS technologies can be deployed. The dynamic provision of end-to-end QoS over heterogeneousip networks assumes the negotiation of mutually acceptablesla. This paper presents the concept of intra-, inter- and multiple-domain service level negotiation using thecops-sls protocol. The...
Conference Paper
The combination of virtual networks and active networking technology results in a new concept called virtual active network (VAN). Different interpretations are associated with the notion of VAN. We consider a VAN as a service abstraction offered by a provider to its customers. For the provider, the VAN represents the means to partition the network...
Conference Paper
Full-text available
This paper wishes to introduce new concepts to be applied for future Internet generations. These concepts are based on the introduction of some intelligence in a policy-based networking environment. We first describe a policy -based networking environment and some new protocols allowing an easy control of the QoS and the mobility. Then, we describe...
Conference Paper
Full-text available
Data streams in end-to-end communications can cross multiple network domains in which different QoS solutions are deployed. The provision of end- to-end quality of service over heterogeneous environment assumes the negotiation of mutually acceptable SLA. The negotiation process gives the user the ability to specify the desired level of service, alo...
Conference Paper
Full-text available
This paper aims to investigate the use of mobile agents for service provision in mobile computing environments. A quantitative model and experimental measurements are performed to compare Java RMI and mobile agents in the special context of software downloading. The results show that significant performance improvements can be obtained using mobile...
Article
Full-text available
Supplying mobile users with downloadable value-added services represents a great challenge for mobile telecommunication companies which, in an effort to enhance their service offerings, seek new forms of revenue other than voice telephony.
Article
This paper introduces a new Internet generation named I3 that uses concepts coming from policy-based management and multi-agent systems. We first describe the environment that uses the concept of policy-based management, then, we introduce a new generation of protocols, compatible with COPS, able to control the quality of service, the security and...

Network

Cited By