Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Emad Abd-Elrahman is active.

Publication


Featured researches published by Emad Abd-Elrahman.


international symposium on networks computers and communications | 2015

Network issues in virtual machine migration

Hatem Ibn-Khedher; Emad Abd-Elrahman; Hossam Afifi; Jacky Forestier

Software Defined Networking (SDN) is based basically on three features: centralization of the control plane, programmability of network functions and traffic engineering. The network function migration poses interesting problems that we try to expose and solve in this paper. Content Distribution Network virtualization is presented as use case.


mobile adhoc and sensor systems | 2014

Cellular Vehicular Networks (CVN): ProSe-Based ITS in Advanced 4G Networks

Thouraya Toukabri; Adel Mounir Sareh Said; Emad Abd-Elrahman; Hossam Afifi

LTE-based Device-to-Device (D2D) communications have been envisioned as a new key feature for short range wireless communications in advanced and beyond 4G networks. We propose in this work to exploit this novel concept of D2D as a new alternative for Intelligent Transportation Systems (ITS) Vehicle-to-Vehicle/Infrastructure (V2X) communications in next generation cellular networks. A 3GPP standard architecture has been recently defined to support Proximity Services (ProSe) in the LTE core network. Taking into account the limitations of this latter and the requirements of ITS services and V2X communications, we propose the CVN solution as an enhancement to the ProSe architecture in order to support hyper-local ITS services. CVN provides a reliable and scalable LTE-assisted opportunistic model for V2X communications through a distributed ProSe architecture. Using a hybrid clustering approach, vehicles are organized into dynamic clusters that are formed and managed by ProSe Cluster Heads which are elected centrally by the CVN core network. ITS services are deemed as Proximity Services and benefit from the basic ProSe discovery, authorization and authentication mechanisms. The CVN solution enhances V2V communication delays and overhead by reducing the need for multi-hop geo-routing. Preliminary simulation results show that the CVN solution provides short setup times and improves ITS communication delays.


ifip wireless days | 2014

Assisting V2V failure recovery using Device-to-Device communications

Emad Abd-Elrahman; Adel Mounir Sareh Said; Thouraya Toukabri; Hossam Afifi; Michel Marot

This paper aims to propose a new solution for failure recovery (dead-ends) in Vehicle to Vehicle (V2V) communications through LTE-assisted Device-to-Device communications (D2D). Based on the enhanced networking capabilities offered by Intelligent Transportation Systems (ITS) architecture, our solution can efficiently assist V2V communications in failure recovery situations. We also derive an analytical model to evaluate generic V2V routing recovery failures. Moreover, the proposed hybrid model is simulated and compared to the generic model under different constrains of worst and best cases of D2D discovery and communication. According to our comparison and simulation results, the hybrid model decreases the delay for alarm message propagation to the destination (typically the Traffic Control Center TCC) through the Road Side Unit (RSU).


local computer networks | 2016

Scalable and Cost Efficient Algorithms for Virtual CDN Migration

Hatem Ibn-Khedher; Makhlouf Hadji; Emad Abd-Elrahman; Hossam Afifi; Ahmed E. Kamal

Virtual Content Delivery Network (vCDN) migration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV migration algorithms due to the evident huge amount of traffic to be delivered to end customers of the network. In this paper, two approaches for finding the optimal and near optimal path placement(s) and vCDN migration(s) are proposed (OPAC and HPAC). Moreover, several scenarios are considered to quantify the OPAC and HPAC behaviors and to compare their efficiency in terms of migration cost, migration time, vCDN replication number, and other cost factors. Then, they are implemented and evaluated under different network scales. Finally, the proposed algorithms are integrated in an SDN/NFV framework.


international conference on telecommunications | 2016

OMAC: Optimal migration algorithm for virtual CDN

Hatem Ibn-khedher; Emad Abd-Elrahman; Hossam Afifi

Content delivery network meets the modern virtualization techniques based on Software-Defined Networking (SDN) and/or Network Functions Virtualization (NFV). Therefore, virtual nodes can be easily migrated from one location to another. In this paper, an intelligent migration algorithm for deciding the optimal placement destinations for virtual content delivery functions is proposed (OMAC). Then, it is implemented and evaluated. Several scenarios are considered to study the algorithms behavior and to quantify the impact of both network and system parameters.


Computer Networks | 2017

OPAC: An optimal placement algorithm for virtual CDN

Hatem Ibn-Khedher; Emad Abd-Elrahman; Ahmed E. Kamal; Hossam Afifi

Cloud computing and Network Function Virtualization (NFV) use cases proposed by ETSI can improve network caching when an adequate optimization algorithm is used. A cache placement algorithm is proposed based on these virtualization tools. Moreover, a cache placement protocol is presented to support the cache migration. Optimal cache and Virtual Machine (VM) placement and migration, and optimal routing based on several new constraints such as system load, network infrastructure, user satisfaction and migration cost is designed. Extensive evaluations and comparison to state of the art techniques are carried out. The results show that our cache techniques outperform other solutions and give better satisfaction to the three constituents: users, network operators and content providers.


international conference on telecommunications | 2016

IoT-D2D task allocation: An award-driven game theory approach

Emad Abd-Elrahman; Hossam Afifi; Luigi Atzori; Makhlouf Hadji; Virginia Pilloni

An IoT-D2D cooperation framework for task allocation among objects in the IoT (Internet of Things) is presented. Proximity Services based on Device to Device (D2D) communication are used to enable direct interaction between IoT objects. The process is triggered by a node that decides to set up a cluster of nodes and then to coordinate the allocation strategy, where objects capable of performing the same tasks compete to get relevant remunerations. We then propose a game-theory based approach to find a solution maximizing objects utility functions. We prove that a Nash Equilibrium Point (NEP) can be found. Experimental results provide insights on the strategy performance.


local computer networks | 2017

Optimal and Cost Efficient Algorithm for Virtual CDN Orchestration

Hatem Khedher; Emad Abd-Elrahman; Hossam Afifi; Michel Marot

Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV orchestration algorithm due to the evident huge amount of traffic to be delivered to end customers of the network. In this paper, a global vCDN architecture and an exact approach for finding the optimal path orchestration(s) and vCDN component instantiation(s) (OCPA) are proposed. Moreover, several scenarios are considered to quantify the OCPA behavior and to compare its efficiency in terms of caching and streaming cost, orchestration time, vCDN replication number, and other cost factors. Then, it is implemented and evaluated under different deployment flavors. Several scenarios are considered to study the algorithm’s behavior and to quantify the impact of both network and system parameters.


ad hoc networks | 2017

IoT_ProSe: Exploiting 3GPP services for task allocation in the Internet of Things

Virginia Pilloni; Emad Abd-Elrahman; Makhlouf Hadji; Luigi Atzori; Hossam Afifi

Abstract This work focuses on the problem of task allocation among mobile objects that aim to collaborate in the execution of IoT (Internet of Things) applications. We consider 3GPP Proximity Services (ProSe) that enable Device to Device (D2D) communications for direct interaction among IoT objects. We first define the framework where devices willing to cooperate: (i) discover and join a cluster of objects to take part to the IoT_ProSe service; (ii) compete with the other objects in the cluster when a request for a service is sent to the cluster from the IoT application server. We then focus on two important problems. The first problem is the decision about which node should win the competition, for which we propose a game-theory based approach to find a solution maximizing objects’ utility functions. The second problem is the computation of the optimal size of devices’ clusters within a cell by maximizing the signal quality across the cell. Experimental results provide insights on the strategy performance. By appropriately setting working parameters, it is possible to improve system reliability up to 21%, and system lifetime up to 68%.


Procedia Computer Science | 2017

Performance Evaluation of Virtual Identity Approaches for Anonymous Communication in Distributed Environments

Ibrahim A. Gomaa; Adel Mounir Sareh Said; Emad Abd-Elrahman; Alaa Hamdy; E. M. Saad

Abstract: Todays enterprises core concept of security is the Identity (ID). When it comes to mapping identity in order to gain access to a specific service or digital account, cloud technology offers the most robust, cost-effective, easy-to-use solutions available. In this paper, the Virtual Identity (V ID ) concept is not only used to improve the user privacy and security on the network and service platforms but also, the V ID performance is evaluated by implementing a mathematical model based on Baskett Chandy Muntz-Palacios (BCMP) model. Moreover, a simulation-based evaluation using OPNET Modeler is conducted to compare the simulation results against the analytical model based BCMP queuing analysis. Finally, the comparative study of our proposed models and the related work proves that our proposed models are suitable for anonymous communication in distributed virtual environments.

Collaboration


Dive into the Emad Abd-Elrahman's collaboration.

Top Co-Authors

Avatar

Hossam Afifi

Institut Mines-Télécom

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge