Ahmad Al Hanbali
University of Twente
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ahmad Al Hanbali.
IEEE Communications Surveys and Tutorials | 2005
Ahmad Al Hanbali; Eitan Altman; Philippe Nain
The Transmission Control Protocol (TCP) was designed to provide reliable end-to-end delivery of data over unreliable networks. In practice, most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless ad hoc networks can lead to TCP implementations with poor performance. In order to adapt TCP to the ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different types of losses. Indeed, in mobile or static ad hoc networks losses are not always due to network congestion, as it is mostly the case in wired networks. In this report, we present an overview of this issue and a detailed discussion of the major factors involved. In particular, we show how TCP can be affected by mobility and lower-layer protocols. In addition, we survey the main proposals that are intended to adapting TCP to mobile and static ad hoc environments.
European Journal of Operational Research | 2015
S. Behfard; M.C. van der Heijden; Ahmad Al Hanbali; W.H.M. Zijm
Original Equipment Manufacturers (OEMs) of advanced capital goods often offer service contracts for system support to their customers, for which spare parts are needed. Due to technological changes, suppliers of spare parts may stop production at some point in time. As a reaction to that decision, an OEM may place a so-called Last Time Buy (LTB) order to cover demand for spare parts during the remaining service period, which may last for many years. The fact that there might be other alternative sources of supply in the next periods complicates the decision on the LTB. In this paper, we develop a heuristic method to find the near-optimal LTB quantity in presence of an imperfect repair option of the failed parts that can be returned from the field. Comparison of our method to simulation shows high approximation accuracy. Numerical experiments reveal that repair is an excellent option as alternative sourcing, even if it is more expensive than buying a new part, because of the option to postpone the repair until the parts are needed. In addition, we show the impact of other key parameters on costs and LTB quantity.
next generation internet | 2007
Ahmad Al Hanbali; Arzad Alam Kherani; Philippe Nain
We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may generate multiple copies of a packet and use relay nodes to deliver the packet (or a copy) to its destination, and on the two-hop relay protocol with erasure coding. Performance metrics of interest are the time to deliver a single packet to its destination, the number of copies of the packet at delivery instant, and the total number of copies that the source generates. The packet copies at relay nodes have limited lifetime (time-to-live TTL). Via a Markovian analysis, the three performance metrics of the MTR protocol are obtained in closed-from in the case where the number of the copies in the network is limited. Also, we develop an approximation analysis in the case where the inter-meeting times between nodes are arbitrarily distributed and the TTLs of the copies are constant and all equal. In particular, we show that exponential intermeeting times yield stochastically smaller delivery delays than hyper-exponential inter-meeting times, and that exponential TTLs yield stochastically larger delivery delays than constant TTLs. Finally, we characterize the delivery delay and the number of transmissions in the two-hop relay protocol with erasure coding and compare this scheme with the multicopy scheme.
OR Spectrum | 2015
Ahmad Al Hanbali; Em Elisa Alvarez; M.C. van der Heijden
We investigate the use of priority mechanisms when assigning service engineers to customers as a tool for service differentiation. To this end, we analyze a non-preemptive
Performance Evaluation | 2007
Mouhamad Ibrahim; Ahmad Al Hanbali; Philippe Nain
Performance Evaluation | 2008
Ahmad Al Hanbali; Philippe Nain; Eitan Altman
M/PH/c
performance evaluation methodolgies and tools | 2008
Ahmad Al Hanbali; Mouhamad Ibrahim; Vilmos Simon; Endre Varga; Iacopo Carreras
analytical and stochastic modeling techniques and applications | 2008
Ahmad Al Hanbali; Roland de Haan; Richard J. Boucherie; Jan-Kees C. W. van Ommeren
M/PH/c priority queue with various customer classes. For this queue, we present various accurate and fast methods to estimate the first two moments of the waiting time per class given that all servers are occupied. These waiting time moments allow us to approximate the overall waiting time distribution per class. We subsequently apply these methods to real-life data in a case study.
Computer Networks | 2007
Ahmad Al Hanbali; Arzad Alam Kherani; Robin Groenevelt; Philippe Nain; Eitan Altman
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act as relays, and that are deployed to increase the connectivity between mobile nodes. Our objective is to quantify the impact of adding throwboxes on the performance of two routing protocols, namely the Multicopy Two-hop Routing protocol and the Epidemic Routing protocol, in the cases where the throwboxes are fully disconnected or mesh connected. To this end, we use a Markovian model where the successive meeting times between any pair of mobile nodes (resp. any mobile node and any throwbox) are represented by a Poisson process with intensity @l (resp. @m). We derive closed-form expressions for the distribution of the delivery delay of a packet and for the distribution of the total number of copies of a packet that are generated, the latter metric reflecting the overhead induced by the routing protocol. These results are then compared to simulation results. Through a mean-field approach we also provide asymptotic results when the number of nodes (mobile nodes and/or throwboxes) is large.
international workshop on quality of service | 2006
Ahmad Al Hanbali; Philippe Nain; Eitan Altman
We consider a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing. This type of routing takes advantage of the mobility and the storage capacity of the nodes, called the relay nodes, in order to route packets between a source and a destination. Packets at relay nodes are assumed to have a limited lifetime in the network. Nodes are moving inside a bounded region according to some random mobility model. Closed-form expressions and asymptotic results when the number of nodes is large are provided for the packet delivery delay and for the energy needed to transmit a packet from the source to its destination. We also introduce and evaluate a variant of the two-hop relay protocol that limits the number of generated copies in the network. Our model is validated through simulations for two mobility models (random waypoint and random direction mobility models), and the performance of the two-hop routing and of the epidemic routing protocols are compared.