Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bechir Hamdaoui is active.

Publication


Featured researches published by Bechir Hamdaoui.


IEEE Communications Surveys and Tutorials | 2012

A Survey on Energy-Efficient Routing Techniques with QoS Assurances for Wireless Multimedia Sensor Networks

Samina Ehsan; Bechir Hamdaoui

The recent technological advances in micro electro-mechanical systems have promoted the development of a powerful class of sensor-based distributed intelligent systems capable of ubiquitously retrieving multimedia information, namely Wireless Multimedia Sensor Networks (WMSNs). WMSNs are gaining more popularity day by day as they are envisioned to support a large number of both non-real time and real-time multimedia applications. However, satisfying the stringent quality of service (QoS) requirements of multimedia transmission in a resource-constrained sensor network environment places new challenges to routing. As an outcome, optimal energy and application-specific QoS aware routing for WMSNs has gained considerable research attention recently. In this paper, current state-of-the-art in energy-efficient routing techniques for WMSNs is surveyed together with the highlights of the performance issues of each strategy. We outline the design challenges of routing protocols for WMSNs followed by the limitations of current techniques designed for non-multimedia data transmission. Further, a classification of recent routing protocols for WMSNs and a discussion of possible future research trends are presented.


IEEE Transactions on Mobile Computing | 2008

OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks

Bechir Hamdaoui; Kang G. Shin

Wireless networks and devices have been rapidly gaining popularity over their wired counterparts. This popularity, in turn, has been generating an explosive and ever-increasing demand for, and hence creating a shortage of, the radio spectrum. Existing studies indicate that this foreseen spectrum shortage is not so much due to the scarcity of the radio spectrum, but due to the inefficiency of current spectrum access methods, thus leaving spectrum opportunities along both the time and the frequency dimensions that wireless devices can exploit. Fortunately, recent technological advances have made it possible to build software-defined radios (SDRs) which, unlike traditional radios, can switch from one frequency band to another at little or no cost. We propose a MAC protocol, called Opportunistic Spectrum MAC (OS-MAC), for wireless networks equipped with cognitive radios like SDRs. OS-MAC (1) adaptively and dynamically seeks and exploits opportunities in both licensed and unlicensed spectra and along both the time and the frequency dimensions; (2) accesses and shares spectrum among different unlicensed and licensed users; and (3) coordinates with other unlicensed users for better spectrum utilization. Using extensive simulation, OS-MAC is shown to be far more effective than current access protocols from both the networks and the users perspectives. By comparing its performance with an Ideal-MAC protocol, OS-MAC is also shown to not only outperform current access protocols, but also achieve performance very close to that obtainable under the Ideal-MAC protocol.


IEEE Internet of Things Journal | 2014

Enabling Smart Cloud Services Through Remote Sensing: An Internet of Everything Enabler

Sherif Abdelwahab; Bechir Hamdaoui; Mohsen Guizani; Ammar Rayes

The recent emergence and success of cloud-based services has empowered remote sensing and made it very possible. Cloud-assisted remote sensing (CARS) enables distributed sensory data collection, global resource and data sharing, remote and real-time data access, elastic resource provisioning and scaling, and pay-as-you-go pricing models. CARS has great potentials for enabling the so-called Internet of Everything (IoE), thereby promoting smart cloud services. In this paper, we survey CARS. First, we describe its benefits and capabilities through real-world applications. Second, we present a multilayer architecture of CARS by describing each layers functionalities and responsibilities, as well as its interactions and interfaces with its upper and lower layers. Third, we discuss the sensing services models offered by CARS. Fourth, we discuss some popular commercial cloud platforms that have already been developed and deployed in recent years. Finally, we present and discuss major design requirements and challenges of CARS.


IEEE Transactions on Wireless Communications | 2009

Adaptive spectrum assessment for opportunistic access in cognitive radio networks

Bechir Hamdaoui

Studies showed that the static nature of the traditional spectrum allocation methods, currently being used to share the radio spectrum, resulted in a plenty of unused spectrum opportunities that wireless devices can still potentially exploit. Fortunately, recent technological advances enabled software-defined radios (SDRs) that can switch from one spectrum band (SB) to another at minimum cost, thereby promoting dynamic and adaptive spectrum access and sharing. In this paper, we derive and study an adaptive spectrum assessment approach that allows devices to decide how to seek spectrum opportunities effectively. In the event when a decision is made in favor of discovering new opportunities, the proposed approach allows devices to determine the optimal number of SBs to be explored so that the device benefits from such an opportunistic spectrum access. This approach is optimal in that it strikes a balance between two conflicting needs: keeping spectrum assessment overhead low while increasing the likelihood of discovering spectrum opportunities. We study the effect of several network parameters, such as the primary traffic load, the secondary traffic load, and the collaboration level of the sensing method, on the optimal number of SBs that devices need to explore.


IEEE Transactions on Network and Service Management | 2015

Energy-Efficient Resource Allocation and Provisioning Framework for Cloud Data Centers

Mehiar Dabbagh; Bechir Hamdaoui; Mohsen Guizani; Ammar Rayes

Energy efficiency has recently become a major issue in large data centers due to financial and environmental concerns. This paper proposes an integrated energy-aware resource provisioning framework for cloud data centers. The proposed framework: i) predicts the number of virtual machine (VM) requests, to be arriving at cloud data centers in the near future, along with the amount of CPU and memory resources associated with each of these requests, ii) provides accurate estimations of the number of physical machines (PMs) that cloud data centers need in order to serve their clients, and iii) reduces energy consumption of cloud data centers by putting to sleep unneeded PMs. Our framework is evaluated using real Google traces collected over a 29-day period from a Google cluster containing over 12,500 PMs. These evaluations show that our proposed energy-aware resource provisioning framework makes substantial energy savings.


IEEE Transactions on Wireless Communications | 2012

Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals

Samina Ehsan; Kyle Bradford; Max Brugger; Bechir Hamdaoui; Yevgeniy Kovchegov; Douglas E. Johnson; Mounir Louhaichi

This paper is concerned with the design and analysis of delay-tolerant networks (DTNs) deployed for free-roaming animal monitoring, wherein information is either transmitted or carried to static access-points by the animals whose movement is assumed to be random. Specifically, in such mobility-aided applications where routing is performed in a store-carry-and-drop manner, limited buffer capacity of a carrier node plays a critical role, and data loss due to buffer overflow heavily depends on access-point density. Driven by this fact, our focus in this paper is on providing sufficient conditions on access-point density that limit the likelihood of buffer overflow. We first derive sufficient access-point density conditions that ensure that the data loss rates are statistically guaranteed to be below a given threshold. Then, we evaluate and validate the derived theoretical results through comparison with both synthetic and real-world data.


IEEE Network | 2015

Toward energy-efficient cloud computing: Prediction, consolidation, and overcommitment

Mehiar Dabbagh; Bechir Hamdaoui; Mohsen Guizani; Ammar Rayes

Energy consumption has become a significant concern for cloud service providers due to financial as well as environmental factors. As a result, cloud service providers are seeking innovative ways that allow them to reduce the amount of energy that their data centers consume. They are calling for the development of new energy-efficient techniques that are suitable for their data centers. The services offered by the cloud computing paradigm have unique characteristics that distinguish them from traditional services, giving rise to new design challenges as well as opportunities when it comes to developing energy-aware resource allocation techniques for cloud computing data centers. In this article we highlight key resource allocation challenges, and present some potential solutions to reduce cloud data center energy consumption. Special focus is given to power management techniques that exploit the virtualization technology to save energy. Several experiments, based on real traces from a Google cluster, are also presented to support some of the claims we make in this article.


IEEE Communications Magazine | 2015

Software-defined networking security: pros and cons

Mehiar Dabbagh; Bechir Hamdaoui; Mohsen Guizani; Ammar Rayes

Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase network agility and programability. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be paid to security at this early design stage too, rather than waiting until the technology becomes mature, thereby potentially avoiding previous pitfalls made when designing the Internet in the 1980s. This article focuses on the security aspects of SDN networks. We begin by discussing the new security advantages that SDN brings and by showing how some of the long-lasting issues in network security can be addressed by exploiting SDN capabilities. Then we describe the new security threats that SDN is faced with and discuss possible techniques that can be used to prevent and mitigate such threats.


IEEE Journal on Selected Areas in Communications | 2007

Cross-Layer Optimized Conditions for QoS Support in Multi-Hop Wireless Networks with MIMO Links

Bechir Hamdaoui; Parameswaran Ramanathan

Recent advances in antenna technology made it possible to build wireless devices with more than one antenna at affordable costs. Because multiple antennas offer wireless networks a potential capacity increase, they are expected to be a key part of next-generation wireless networks to support the rapidly emerging multimedia applications characterized by their high and diverse QoS requirements. This paper developed methods that exploit the benefits of multiple antennas to enable multi-hop wireless networks with flow-level QoS capabilities. The authors first propose a cross-layer table-driven statistical approach that allows each node to determine the amount of spatial reuse and/or multiplexing, offered by the multiple antennas that are available to it. The authors then use the developed statistical approach to derive sufficient conditions under which flow rates are guaranteed to be feasible. The derived conditions are multi-layer aware in the sense that they account for cross-layer effects between the PHY and the MAC layers to support QoS at higher layers. The authors evaluate and compare the derived sufficient conditions via extensive simulations. The authors show that the conditions result in high flow acceptance rates when used in multi-hop wireless networking problems such as QoS routing and multicommodity flow problems. The authors also demonstrate the importance and the effect of considering cross-layer couplings into the development of flow acceptance methods.


IEEE Journal on Selected Areas in Communications | 2004

A network-layer soft handoff approach for mobile wireless IP-based systems

Bechir Hamdaoui; Parameswaran Ramanathan

Handoff is the process during which a mobile node (MN) needs to change its connectivity point to the wireless internetwork from one access node (AN) to another during an ongoing communication. If MNs are allowed to have two or more simultaneous connections to the internetwork through different ANs, then the handoff is said to be soft; otherwise, it is said to be hard. Traditionally, during forward-link soft handoff, multiple identical copies of each packet are simultaneously transmitted to the MN through the associated ANs. At the MNs physical-layer, the received signals are combined on a bit-by-bit basis resulting in improving the bit-error rate. However, this approach requires tight synchronization of the ANs involved in the soft handoff. In addition, as shown in the literature, the capacity often decreases due to the increase of the number of channels used by MNs during soft handoff. In this paper, we propose, analyze, simulate, and implement a soft handoff scheme called soft handoff over IP (SHIP) for forward-link that 1) overcomes the need for synchronization and 2) increases the capacity of the network. Through both analytic and simulation studies, we show that SHIP achieves significant performance improvements. We derive analytic expressions of the power-capacity relationship for two-dimensional (2-D) and one-dimensional (1-D) cell models. By comparing our scheme with the hard handoff, we empirically show that the capacity increases by about 30% and 20%, respectively, for the 2-D and 1-D cell models. Further, the simulation results show that SHIP saves up to 30% of the total power consumed by the ANs.

Collaboration


Dive into the Bechir Hamdaoui's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Samina Ehsan

Oregon State University

View shared research outputs
Top Co-Authors

Avatar

Taieb Znati

University of Pittsburgh

View shared research outputs
Top Co-Authors

Avatar

Parameswaran Ramanathan

University of Wisconsin-Madison

View shared research outputs
Researchain Logo
Decentralizing Knowledge