Current Search: Mahgoub, Imad (x)
View All Items
Pages
- Title
- Delta service extensions to a mobile file system cache.
- Creator
- Blake, Wil., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
In this thesis, a delta service extends a mobile file system cache in order to minimize the amount of data transferred over wireless communications links. Network bandwidth stands as one of the resource limitations impacting the design of mobile computer applications. At the mobile file system service level, caching and compression provide resource conservation in distributed applications. This thesis proposes a delta service to enhance caching services characteristic of mobile computer file...
Show moreIn this thesis, a delta service extends a mobile file system cache in order to minimize the amount of data transferred over wireless communications links. Network bandwidth stands as one of the resource limitations impacting the design of mobile computer applications. At the mobile file system service level, caching and compression provide resource conservation in distributed applications. This thesis proposes a delta service to enhance caching services characteristic of mobile computer file systems. Well established a mechanisms for sequence comparison and software configuration management, file deltas have applicability to mobile computer and distributed file system caching environments. Study of the delta service uses trace-driven simulation methodology incorporating traces obtained in a real world distributed environment. A mobile computer client cache model will corroborate existing studies regarding suitable cache size for disconnected client operation. A delta service model will extend the mobile computer client cache model of various cache sizes in order to gauge the bandwidth savings on the link obtained by the delta service.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15233
- Subject Headings
- File organization (Computer science), Computer terminals--Remote terminals, Cache memory, Mobile computing
- Format
- Document (PDF)
- Title
- Data protection and management solutions to desktop clients: Integration with enterprise tools.
- Creator
- Jayavarapu, VenkataChalam S., Florida Atlantic University, Mahgoub, Imad, Goldflam, Mike
- Abstract/Description
-
Today's Personal Computers (PC) do more work and hence hold more important and meaningful data than before. This demands the necessity of better PC data protection services. In this concern we surveyed three major PC data protection tools, namely, Seagate Corporation's Client-Exec, Computer Associates Cheyenne Backup, Xpoint Technologies Uptime and analyzed them in terms of Restore Time and Total Cost of Ownership. Though these standalone tools are good in terms of PC data protection, IT...
Show moreToday's Personal Computers (PC) do more work and hence hold more important and meaningful data than before. This demands the necessity of better PC data protection services. In this concern we surveyed three major PC data protection tools, namely, Seagate Corporation's Client-Exec, Computer Associates Cheyenne Backup, Xpoint Technologies Uptime and analyzed them in terms of Restore Time and Total Cost of Ownership. Though these standalone tools are good in terms of PC data protection, IT managers still prefer Enterprise tools because they offer better services in terms of usability, manageability and platform independency. Combining the two tools will benefit each other. Hence we developed a solution to this problem by integrating these two types of tools. Integration of third party products with System Management Server (SMS) extended its services. But in order to make this integration generic, independent of the Enterprise tool, Web Based Enterprise Management integration strategy is adopted. Integration with Adstar Distributed Storage Manager (ADSM) extended services of the third party product. Integration of third party products with SMS and ADSM combined the benefits of the two and WBEM integration showed that this is the future direction.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15692
- Subject Headings
- Data protection, Microcomputers--Access control
- Format
- Document (PDF)
- Title
- Mutual interference in a Bluetooth Scatternet under different environmental conditions.
- Creator
- Godani, Amee Mahendrabhai., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
Wireless Personal Area Networks (WPANs) are becoming popular with mobile professionals. Bluetooth is a Wireless Protocol proposed by the Bluetooth SIG (Special Interest Group). Bluetooth allows a user to create a WPAN just by inserting a chip into a mobile device. Such devices are called Bluetooth enabled devices. The market for Bluetooth enabled devices is going to boom in the coming few years. For this reason, it is important to analyze the performance of a Bluetooth network in proximity to...
Show moreWireless Personal Area Networks (WPANs) are becoming popular with mobile professionals. Bluetooth is a Wireless Protocol proposed by the Bluetooth SIG (Special Interest Group). Bluetooth allows a user to create a WPAN just by inserting a chip into a mobile device. Such devices are called Bluetooth enabled devices. The market for Bluetooth enabled devices is going to boom in the coming few years. For this reason, it is important to analyze the performance of a Bluetooth network in proximity to other Bluetooth networks. Important issues addressed by such analysis include data security and interference caused by other Bluetooth devices and non-Bluetooth devices. The objective of this research is to evaluate the performance of a Bluetooth network in the presence of interference caused by neighboring Bluetooth networks. This is called mutual interference. The simulation is done with consideration of different packet lengths, where packet lengths are distributed geometrically. The research also considers the near-far effect on the throughput of a Bluetooth unit. The effect of environmental conditions on the performance of Bluetooth Scatternet is also examined.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12744
- Subject Headings
- Bluetooth technology, Wireless Application Protocol (Computer network protocol)
- Format
- Document (PDF)
- Title
- A memory-efficient directory-based cache coherence scheme for large-scale multiprocessors.
- Creator
- Heragu, Sampath C., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
Caches are used in shared memory multiprocessors to reduce the effective memory latency, and network and memory bandwidth requirements. But the data spreading across the caches leads to the cache coherence problem. In this thesis, a new directory based cache coherence scheme, called the cache-vector protocol, is proposed and evaluated. The said scheme entails a low memory overhead but delivers a performance that is very close to that of the scheme proposed by Censier and Feautrier (3), which...
Show moreCaches are used in shared memory multiprocessors to reduce the effective memory latency, and network and memory bandwidth requirements. But the data spreading across the caches leads to the cache coherence problem. In this thesis, a new directory based cache coherence scheme, called the cache-vector protocol, is proposed and evaluated. The said scheme entails a low memory overhead but delivers a performance that is very close to that of the scheme proposed by Censier and Feautrier (3), which offers the best performance of all the directory based schemes. The performance of the cache-vector protocol is evaluated using trace-driven simulation. A figure of merit which takes into account the average memory latency, network traffic and the hardware overhead is introduced and used as the basis of comparison between the two schemes. The simulation results indicate that the cache-vector protocol is a viable solution to the cache coherence problem in large scale multiprocessors.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15163
- Subject Headings
- Cache memory, Multiprocessors, Memory hierarchy (Computer science)
- Format
- Document (PDF)
- Title
- Location management in mobile networks.
- Creator
- Colucci, Raymond A., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
Location management in a mobile network provides functions to locate, identify, and validate a terminal or user. The purpose of this thesis is to describe a scheme that would be useful in a wireless network for managing the location of mobile users. This thesis presents a new, distributed location management strategy for mobile systems. Its features are fast location update and query, load balancing among location servers, and scalability. The strategy employs dynamic hashing techniques and...
Show moreLocation management in a mobile network provides functions to locate, identify, and validate a terminal or user. The purpose of this thesis is to describe a scheme that would be useful in a wireless network for managing the location of mobile users. This thesis presents a new, distributed location management strategy for mobile systems. Its features are fast location update and query, load balancing among location servers, and scalability. The strategy employs dynamic hashing techniques and quorums to manage location update and query operations. Location information of a mobile host is replicated at a subset of location servers.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/12712
- Subject Headings
- Mobile communication systems, Mobile computing
- Format
- Document (PDF)
- Title
- Memory latency evaluation in cluster-based cache-coherent multiprocessor systems with different interconnection topologies.
- Creator
- Asaduzzaman, Abu Sadath Mohammad, Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
This research investigates memory latency of cluster-based cache-coherent multiprocessor systems with different interconnection topologies. We focus on a cluster-based architecture which is a variation of Stanford DASH architecture. The architecture, also, has some similarities with the STiNG architecture from Sequent Computer System Inc. In this architecture, a small number of processors and a portion of shared-memory are connected through a bus inside each cluster. As the number of...
Show moreThis research investigates memory latency of cluster-based cache-coherent multiprocessor systems with different interconnection topologies. We focus on a cluster-based architecture which is a variation of Stanford DASH architecture. The architecture, also, has some similarities with the STiNG architecture from Sequent Computer System Inc. In this architecture, a small number of processors and a portion of shared-memory are connected through a bus inside each cluster. As the number of processors per cluster is small, snoopy protocol is used inside each cluster. Each processor has two levels of caches and for each cluster a separate directory is maintained. Clusters are connected using directory-based scheme through an interconnection network to make the system scaleable. Trace-driven simulation has been developed to evaluate the overall memory latency of this architecture using three different network topologies, namely ring, mesh, and hypercube. For each network topology, the overall memory latency has been evaluated running a representative set of SPLASH-2 applications. Simulation results show that, the cluster-based multiprocessor system with hypercube topology outperforms those with mesh and ring topologies.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15447
- Subject Headings
- Computer network architectures, Multiprocessors
- Format
- Document (PDF)
- Title
- Intelligent cache management techniques.
- Creator
- Jaouhar, Charif., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
This thesis introduced two allocation schemes for cache memory in multiprogramming environments. The proposed schemes, called static and dynamic cache partitioning, are slight variations of the schemes proposed by Thiebaut and Stone. We developed a trace driven simulation program to study and compare the performance of the proposed schemes to that of the cache sharing and cache flushing schemes. Furthermore, we proposed a new replacement technique that uses some heuristic to detect loop...
Show moreThis thesis introduced two allocation schemes for cache memory in multiprogramming environments. The proposed schemes, called static and dynamic cache partitioning, are slight variations of the schemes proposed by Thiebaut and Stone. We developed a trace driven simulation program to study and compare the performance of the proposed schemes to that of the cache sharing and cache flushing schemes. Furthermore, we proposed a new replacement technique that uses some heuristic to detect loop structures in the reference patterns. Initially, the proposed technique uses the Least Recently Used (LRU) strategy. Once a loop has been detected, all the instructions, which will harm performance if they were to be stored in the cache, will be dynamically excluded from being cached. The LRU strategy will resume as soon as the end of the loop has been detected. We have also developed a simulation program to compare the performance of this scheme to that of other related ones, so as to demonstrate its effectiveness. The results show our scheme outperforms the others, especially when the system references are loop dominated.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/14973
- Subject Headings
- Cache memory, Memory hierarchy (Computer science), Integrated circuits--Very large scale integration
- Format
- Document (PDF)
- Title
- Energy Efficient Cluster-Based Target Tracking Strategy.
- Creator
- AL-Ghanem, Waleed Khalid, Mahgoub, Imad, Florida Atlantic University
- Abstract/Description
-
This research proposes a cluster-based target tracking strategy for one moving object using wireless sensor networks. The sensor field is organized in 3 hierarchal levels. 1-bit message is sent when a node detects the target. Otherwise the node stays silent. Since in wireless sensor network nodes have limited computational resources, limited storage resources, and limited battery, the code for predicting the target position should be simple, and fast to execute. The algorithm proposed in this...
Show moreThis research proposes a cluster-based target tracking strategy for one moving object using wireless sensor networks. The sensor field is organized in 3 hierarchal levels. 1-bit message is sent when a node detects the target. Otherwise the node stays silent. Since in wireless sensor network nodes have limited computational resources, limited storage resources, and limited battery, the code for predicting the target position should be simple, and fast to execute. The algorithm proposed in this research is simple, fast, and utilizes all available detection data for estimating the location of the target while conserving energy. lbis has the potential of increasing the network life time. A simulation program is developed to study the impact of the field size and density on the overall performance of the strategy. Simulation results show that the strategy saves energy while estimating the location of the target with an acceptable error margin.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012501
- Subject Headings
- Wireless communication systems--Technological innovations, Sensor networks--Security measures, High performance computing, Adaptive signal processing, Target acquisition, Expert systems (Computer science)
- Format
- Document (PDF)
- Title
- Correctness analysis of cache conherence protocols using Petri nets.
- Creator
- Hassan, Ahmed Kamal., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
The use of cache memories in multiprocessor systems increases the overall systems performance. Caches reduce the amount of network traffic and provide a solution to the memory contention problem. However, caches introduce memory consistency problems. The existence of multiple cache copies of a memory block will result in an inconsistent view of memory if one processor changes a value in its associated cache. Cache coherence protocols are algorithms designed in software or hardware to maintain...
Show moreThe use of cache memories in multiprocessor systems increases the overall systems performance. Caches reduce the amount of network traffic and provide a solution to the memory contention problem. However, caches introduce memory consistency problems. The existence of multiple cache copies of a memory block will result in an inconsistent view of memory if one processor changes a value in its associated cache. Cache coherence protocols are algorithms designed in software or hardware to maintain memory consistency. With the increased complexity of some of the more recent protocols, testing for the correctness of these protocols becomes an issue that requires more elaborate work. In this thesis, correctness analysis of a selected group of representative cache coherence protocols was performed using Petri nets as a modeling and analysis tool. First, the Petri net graphs for these protocols were designed. These graphs were built by following the logical and coherence actions performed by the protocols in response to the different processors' requests that threatens memory consistency. Correctness analysis was then performed on these graphs.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15366
- Subject Headings
- Cache memory, Multiprocessors, Computer network protocols, Petri nets
- Format
- Document (PDF)
- Title
- Storage subsystem workload characterization and synthesis.
- Creator
- Ali, Ahmad A. J., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
In this study, a tool has been developed which traces the storage subsystem workload at the subsystem level. Due to hardware assistance, this tool has very little overhead. This is achieved by incorporating the tracing routine in the microcode of the IBM SCSI adapter. The I/O traces are collected, in realtime, on a PS/2 connected to the modified SCSI adapter via an asynchronous link. These traces are then processed and studied. We have developed a scheme to characterize the workload by...
Show moreIn this study, a tool has been developed which traces the storage subsystem workload at the subsystem level. Due to hardware assistance, this tool has very little overhead. This is achieved by incorporating the tracing routine in the microcode of the IBM SCSI adapter. The I/O traces are collected, in realtime, on a PS/2 connected to the modified SCSI adapter via an asynchronous link. These traces are then processed and studied. We have developed a scheme to characterize the workload by studying the parameters of the traced workload. These parameters include LBA distributions, interarrival time distribution, size distributions, ratios between read requests and write requests, adapter's cache performance, etc. In this study, workload characterization of storage subsystems in OS/2, AIX and NetWare environments was performed. An algorithm for synthesizing of the workload was also developed and implemented as part of this study.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15227
- Subject Headings
- Computer networks--Workload, System design, Computer storage devices
- Format
- Document (PDF)
- Title
- Simulation analysis of cluster-based multiprocessor systems.
- Creator
- De Armas, Mario Ernesto., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
Multiprocessor systems have demonstrated great potential for meeting the ever increasing demand for higher performance. In this thesis, we develop simulation models with fewer and more realistic assumptions to evaluate the performance of the circuit-switched cluster-based multiprocessor system. We then introduce a packet-switched variation of the cluster-based architecture and develop simulation models to evaluate its performance. The analysis of the cluster-based systems is performed for...
Show moreMultiprocessor systems have demonstrated great potential for meeting the ever increasing demand for higher performance. In this thesis, we develop simulation models with fewer and more realistic assumptions to evaluate the performance of the circuit-switched cluster-based multiprocessor system. We then introduce a packet-switched variation of the cluster-based architecture and develop simulation models to evaluate its performance. The analysis of the cluster-based systems is performed for both uniform and non-uniform memory reference models. We conducted similar analysis for the crossbar and multiple-bus systems. Finally, the results of the cluster-based systems are compared to those obtained for the crossbar and the multiple-bus systems.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/14969
- Subject Headings
- Multiprocessors, Cluster analysis, Packet switching (Data transmission), Computer architecture, Computer simulation
- Format
- Document (PDF)
- Title
- An implementation of the IEEE 1609.4 wave standard for use in a vehicular networking testbed.
- Creator
- Kuffermann, Kyle, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We present an implementation of the IEEE WAVE (Wireless Access in Vehicular Environments) 1609.4 standard, Multichannel Operation. This implementation provides concurrent access to a control channel and one or more service channels, enabling vehicles to communicate among each other on multiple service channels while still being able to receive urgent and control information on the control channel. Also included is functionality that provides over-the-air timing synchronization, allowing...
Show moreWe present an implementation of the IEEE WAVE (Wireless Access in Vehicular Environments) 1609.4 standard, Multichannel Operation. This implementation provides concurrent access to a control channel and one or more service channels, enabling vehicles to communicate among each other on multiple service channels while still being able to receive urgent and control information on the control channel. Also included is functionality that provides over-the-air timing synchronization, allowing participation in alternating channel access in the absence of a reliable time source. Our implementation runs on embedded Linux and is built on top of IEEE 802.11p, as well as a customized device driver. This implementation will serve as a key compo- nent in our IEEE 1609-compliant Vehicular Multi-technology Communication Device (VMCD) that is being developed for a VANET testbed under the Smart Drive initiative, supported by the National Science Foundation.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004299, http://purl.flvc.org/fau/fd/FA00004299
- Subject Headings
- Vehicular ad hoc networks (Computer networks)., Wireless sensor networks., Wireless communication systems., Wireless LANs., Linux., Expert systems (Computer science), Operating systems (Computers)
- Format
- Document (PDF)
- Title
- An Ant Inspired Dynamic Traffic Assignment for VANETs: Early Notification of Traffic Congestion and Traffic Incidents.
- Creator
- Arellano, Wilmer, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Vehicular Ad hoc NETworks (VANETs) are a subclass of Mobile Ad hoc NETworks and represent a relatively new and very active field of research. VANETs will enable in the near future applications that will dramatically improve roadway safety and traffic efficiency. There is a need to increase traffic efficiency as the gap between the traveled and the physical lane miles keeps increasing. The Dynamic Traffic Assignment problem tries to dynamically distribute vehicles efficiently on the road...
Show moreVehicular Ad hoc NETworks (VANETs) are a subclass of Mobile Ad hoc NETworks and represent a relatively new and very active field of research. VANETs will enable in the near future applications that will dramatically improve roadway safety and traffic efficiency. There is a need to increase traffic efficiency as the gap between the traveled and the physical lane miles keeps increasing. The Dynamic Traffic Assignment problem tries to dynamically distribute vehicles efficiently on the road network and in accordance with their origins and destinations. We present a novel dynamic decentralized and infrastructure-less algorithm to alleviate traffic congestions on road networks and to fill the void left by current algorithms which are either static, centralized, or require infrastructure. The algorithm follows an online approach that seeks stochastic user equilibrium and assigns traffic as it evolves in real time, without prior knowledge of the traffic demand or the schedule of the cars that will enter the road network in the future. The Reverse Online Algorithm for the Dynamic Traffic Assignment inspired by Ant Colony Optimization for VANETs follows a metaheuristic approach that uses reports from other vehicles to update the vehicle’s perceived view of the road network and change route if necessary. To alleviate the broadcast storm spontaneous clusters are created around traffic incidents and a threshold system based on the level of congestion is used to limit the number of incidents to be reported. Simulation results for the algorithm show a great improvement on travel time over routing based on shortest distance. As the VANET transceivers have a limited range, that would limit messages to reach at most 1,000 meters, we present a modified version of this algorithm that uses a rebroadcasting scheme. This rebroadcasting scheme has been successfully tested on roadways with segments of up to 4,000 meters. This is accomplished for the case of traffic flowing in a single direction on the roads. It is anticipated that future simulations will show further improvement when traffic in the other direction is introduced and vehicles travelling in that direction are allowed to use a store carry and forward mechanism.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004566, http://purl.flvc.org/fau/fd/FA00004566
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Technological innovations., Routing protocols (Computer network protocols), Artificial intelligence., Intelligent transportation systems., Intelligent control systems., Mobile computing., Computer algorithms., Combinatorial optimization.
- Format
- Document (PDF)
- Title
- Certificate authentication security and the preservation of privacy in wireless access in vehicular environment (wave).
- Creator
- Kemp, Clifford Allen, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Future vehicles will exchange safety-critical information messages wirelessly with other vehicles on the road. We must provide secure mechanisms to validate the authenticity and integrity of these messages. The IEEE Standard 1609.2 defines the format of secure messages and identifies security algorithms and mechanism for use in Wireless Access in Vehicular Environment (WAVE). We propose an organizational structure for Central Management Entities (CMEs) to address these goals and functional...
Show moreFuture vehicles will exchange safety-critical information messages wirelessly with other vehicles on the road. We must provide secure mechanisms to validate the authenticity and integrity of these messages. The IEEE Standard 1609.2 defines the format of secure messages and identifies security algorithms and mechanism for use in Wireless Access in Vehicular Environment (WAVE). We propose an organizational structure for Central Management Entities (CMEs) to address these goals and functional requirements, and to balance the security of communications with protection of user privacy. A concern in vehicular communications is the privacy of vehicle owners. Privacy must be preserved and the user related information has to be protected from unauthorized access, while the authorities can trace the sender when there is a dispute. This thesis also presents a field operational test using IEEE 802.11a hardware. Vehicular test infrastructures can then be established in a cost effective manner to help support VANET research.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA00004253
- Format
- Document (PDF)
- Title
- Context-aware hybrid data dissemination in vehicular networks.
- Creator
- Rathod, Monika M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not...
Show moreThis work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not limited to traffic and routing, weather, construction and road hazard alerts, as well as advertisement and entertainment. The core of V2V communication relies on the efficient dispersion of relevant data through wireless broadcast protocols for these varied applications. The challenges of vehicular networks demand an adaptive broadcast protocol capable of handling diverse applications. This research work illustrates the design of a wireless broadcast protocol that is context-aware and adaptive to vehicular environments taking into consideration vehicle density, road topology, and type of data to be disseminated. The context-aware hybrid data dissemination scheme combines store-and-forward and multi-hop broadcasts, capitalizing on the strengths of both these categories and mitigates the weaknesses to deliver data with maximum efficiency to a widest possible reach. This protocol is designed to work in both urban and highway mobility models. The behavior and performance of the hybrid data dissemination scheme is studied by varying the broadcast zone radius, aggregation ratio, data message size and frequency of the broadcast messages. Optimal parameters are determined and the protocol is then formulated to become adaptive to node density by keeping the field size constant and increasing the number of nodes. Adding message priority levels to propagate safety messages faster and farther than non-safety related messages is the next context we add to our adaptive protocol. We dynamically set the broadcast region to use multi-hop which has lower latency to propagate safety-related messages. Extensive simulation results have been obtained using realistic vehicular network scenarios. Results show that Context-Aware Hybrid Data Dissemination Protocol benefits from the low latency characteristics of multi-hop broadcast and low bandwidth consumption of store-and-forward. The protocol is adaptive to both urban and highway mobility models.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004152, http://purl.flvc.org/fau/fd/FA00004152
- Subject Headings
- Context aware computing, Convergence (Telecommunication), Intelligent transportation systems, Internetworking (Telecommunication), Routing (Computer network management), Routing protocols (Computer network protocols), Vehicular ad hoc networks (Computer networks)
- Format
- Document (PDF)
- Title
- Adaptive Routing Protocols for VANET.
- Creator
- Skiles, Joanne, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Vehicular Ad-hoc Network (VANET) is a wireless ad-hoc network that provides communications among vehicles with on-board units and between vehicles and nearby roadside units. The success of a VANET relies on the ability of a routing protocol to ful ll the throughput and delivery requirements of any applications operating on the network. Currently, most of the proposed VANET routing protocols focus on urban or highway environments. This dissertation addresses the need for an adaptive routing...
Show moreA Vehicular Ad-hoc Network (VANET) is a wireless ad-hoc network that provides communications among vehicles with on-board units and between vehicles and nearby roadside units. The success of a VANET relies on the ability of a routing protocol to ful ll the throughput and delivery requirements of any applications operating on the network. Currently, most of the proposed VANET routing protocols focus on urban or highway environments. This dissertation addresses the need for an adaptive routing protocol in VANETs which is able to tolerate low and high-density network tra c with little throughput and delay variation. This dissertation proposes three Geographic Ad-hoc On-Demand Distance Vector (GEOADV) protocols. These three GEOADV routing protocols are designed to address the lack of exibility and adaptability in current VANET routing protocols. The rst protocol, GEOADV, is a hybrid geographic routing protocol. The second protocol, GEOADV-P, enhances GEOADV by introducing predictive features. The third protocol, GEOADV-PF improves optimal route selection by utilizing fuzzy logic in addition to GEOADV-P's predictive capabilities. To prove that GEOADV and GEOADV-P are adaptive their performance is demonstrated by both urban and highway simulations. When compared to existing routing protocols, GEOADV and GEOADV-P lead to less average delay and a higher average delivery ratio in various scenarios. These advantages allow GEOADV- P to outperform other routing protocols in low-density networks and prove itself to be an adaptive routing protocol in a VANET environment. GEOADV-PF is introduced to improve GEOADV and GEOADV-P performance in sparser networks. The introduction of fuzzy systems can help with the intrinsic demands for exibility and adaptability necessary for VANETs. An investigation into the impact adaptive beaconing has on the GEOADV protocol is conducted. GEOADV enhanced with an adaptive beacon method is compared against GEOADV with three xed beacon rates. Our simulation results show that the adaptive beaconing scheme is able to reduce routing overhead, increase the average delivery ratio, and decrease the average delay.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004926, http://purl.flvc.org/fau/fd/FA00004926
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Design and construction., Routing protocols (Computer network protocols), Wireless sensor networks., Computer algorithms., Mobile computing., Mobile communication systems--Technological innovations., Wireless communication systems--Technological innovations., Intelligent transportation systems--Mathematical models.
- Format
- Document (PDF)
- Title
- Geographic Routing Reliability Enhancement in Urban Vehicular Ad Hoc Networks.
- Creator
- Alzamzami, Ohoud, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Vehicular Ad hoc Networks (VANETs) have the potential to enable various kinds of applications aiming at improving road safety and transportation efficiency. These applications require uni-cast routing, which remains a significant challenge due to VANETs characteristics. Given VANET dynamic topology, geographic routing protocols are considered the most suitable for such network due to their scalability and low overhead. However, the optimal selection of next-hop nodes in geographic routing is...
Show moreVehicular Ad hoc Networks (VANETs) have the potential to enable various kinds of applications aiming at improving road safety and transportation efficiency. These applications require uni-cast routing, which remains a significant challenge due to VANETs characteristics. Given VANET dynamic topology, geographic routing protocols are considered the most suitable for such network due to their scalability and low overhead. However, the optimal selection of next-hop nodes in geographic routing is a challenging problem where the routing performance is highly affected by the variable link quality and bandwidth availability. In this dissertation, a number of enhancements to improve geographic routing reliability in VANETs are proposed. To minimize packet losses, the direction and link quality of next-hop nodes using the Expected Transmission Count (ETX) are considered to select links with low loss ratios. To consider the available bandwidth, a cross-layer enchantment of geographic routing, which can select more reliable links and quickly react to varying nodes load and channel conditions, is proposed. We present a novel model of the dynamic behavior of a wireless link. It considers the loss ratio on a link, in addition to transmission and queuing delays, and it takes into account the physical interference e ect on the link. Then, a novel geographic routing protocol based on fuzzy logic systems, which help in coordinating di erent contradicting metrics, is proposed. Multiple metrics related to vehicles' position, direction, link quality and achievable throughput are combined using fuzzy rules in order to select the more reliable next-hop nodes for packet forwarding. Finally, we propose a novel link utility aware geographic routing protocol, which extends the local view of the network topology using two-hop neighbor information. We present our model of link utility, which measures the usefulness of a two-hop neighbor link by considering its minimum residual bandwidth and packet loss rate. The proposed protocol can react appropriately to increased network tra c and to frequent topology dis-connectivity in VANETs. To evaluate the performance of the proposed protocols, extensive simulation experiments are performed using network and urban mobility simulation tools. Results confirm the advantages of the proposed schemes in increased traffic loads and network density.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013037
- Subject Headings
- Vehicular ad hoc networks (Computer networks), Traffic safety, Routing protocols (Computer network protocols), Fuzzy logic
- Format
- Document (PDF)
- Title
- Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks.
- Creator
- Glass, Stephen C., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra c Safety Administration (NHTSA), the goal of the widespread deployment of vehicular networking has taken a signi cant step towards becoming a reality. In order for consumers to accept the technology, it is expected that reasonable mechanisms will be in place to protect their privacy. Cooperative Caching has been proposed as an approach that can...
Show moreWith the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra c Safety Administration (NHTSA), the goal of the widespread deployment of vehicular networking has taken a signi cant step towards becoming a reality. In order for consumers to accept the technology, it is expected that reasonable mechanisms will be in place to protect their privacy. Cooperative Caching has been proposed as an approach that can be used to improve privacy by distributing data items throughout the mobile network as they are requested. With this approach, vehicles rst attempt to retrieve data items from the mobile network, alleviating the need to send all requests to a centralized location that may be vulnerable to an attack. However, with this approach, a requesting vehicle may expose itself to many unknown vehicles as part of the cache discovery process. In this work we present a Public Key Infrastructure (PKI) based Cooperative Caching system that utilizes a genetic algorithm to selectively choose members of the mobile network to query for data items with a focus on improving overall privacy. The privacy improvement is achieved by avoiding those members that present a greater risk of exposing information related to the request and choosing members that have a greater potential of having the needed data item. An Agent Based Model is utilized to baseline the privacy concerns when using a broadcast based approach to cache discovery. In addition, an epidemiology inspired mathematical model is presented to illustrate the impact of reducing the number of vehicles queried during cache discovery. Periodic reports from neighboring vehicles are used by the genetic algorithm to identify which neighbors should be queried during cache discovery. In order for the system to be realistic, vehicles must trust the information in these reports. A PKI based approach used to evaluate the trustworthiness of each vehicle in the system is also detailed. We have conducted an in-depth performance study of our system that demonstrates a signi cant reduction in the overall risk of exposure when compared to broadcasting the request to all neighbors.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004975, http://purl.flvc.org/fau/fd/FA00004965
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Public key infrastructure (Computer security), Privacy., Cache memory., Public key infrastructure (Computer security).
- Format
- Document (PDF)
- Title
- Implementations Of The DTM, DADCQ And SLAB VANET Broadcast Protocols For The Ns-3 Simulator.
- Creator
- Alwakeel, Ahmed M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean...
Show moreThis work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean to determine if a node should rebroadcast or not. We then implement the Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol, which uses node distribution, channel quality and distance to determine if a node should favor rebroadcasting. The third protocol, Statistical Location-Assisted Broadcast protocol (SLAB), is an improvement of DADCQ which automates the threshold function design using machine learning. Our NS-3 implementations of the three protocols have been validated against their JiST/SWANS implementations.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004565, http://purl.flvc.org/fau/fd/FA00004565
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Technological innovations., Wireless communication systems--Technological innovations., Mobile communication systems--Technological innovations., Mobile computing., Intelligent transportation systems--Mathematical models., Routing protocols (Computer network protocols)
- Format
- Document (PDF)
- Title
- Implementation of a VANET Geo-Fence Based Adaptive Traffic Light Control Scheme.
- Creator
- Edwards, Alain D., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis we extend the VANET-based approach to counting vehicles at a traffic light by implementing a Geo-fence Based Vehicle Counting Algorithm which supports the use of RFID technology. This implementation utilizes the concept of geo-fencing to create a Zone of Interest (ZOI) that sections off a roadway that is relevant to a traffic intersection. All vehicles in this ZOI are used to determine the required length of the green-cycle time. By utilizing vehicle-to-vehicle (V2V) and...
Show moreIn this thesis we extend the VANET-based approach to counting vehicles at a traffic light by implementing a Geo-fence Based Vehicle Counting Algorithm which supports the use of RFID technology. This implementation utilizes the concept of geo-fencing to create a Zone of Interest (ZOI) that sections off a roadway that is relevant to a traffic intersection. All vehicles in this ZOI are used to determine the required length of the green-cycle time. By utilizing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) technologies, we broadcast beacons that are propagated to all vehicles in the ZOI from the infrastructure which in this case is the traffic light controller. These beacons are used to determine the last vehicle location in the ZOI. A timing algorithm ensures that the last vehicle broadcasts first. The beacons are sent using the IEEE 1609.4 Wireless Access in Vehicular Environments Standard Vendor Specific Action (VSA) frames on the Smart Drive Initiative Vehiclular Ad Hoc Networks testbed. This work is implemented in conjunction with the Vehicular Multi-technology Communication Device (VMCD) supported by the National Science Foundation.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004720
- Subject Headings
- Traffic engineering., Radio frequency identification systems.
- Format
- Document (PDF)