Entity

Time filter

Source Type

South Africa

Maarouf A.,Hassan 1st University | Hamlaoui M.E.,Mohammed V University | Haqiq A.,E NGN Research Group
International Journal of Grid and High Performance Computing | Year: 2015

Establishing and monitoring SLA violations in real-Time has become a critical issue for Cloud Computing. In this paper the authors investigate this issue and propose a model to express the SLA contract requirements using Model Driven Engineering (MDE), as a mean for establishing service level agreements between a cloud provider and cloud customer in the context of a particular service provision. The participation of a Trusted Third Party (TTP) may be necessary in order to resolve conflicts between prospective signatories, likewise to monitor SLA violations in real-Time in the goal to ensure online monitoring cloud services and provide better than best-effort behavior for clouds. The main focus of this work is firstly to use MDE technology for the creation of the SLA contract and then to integrate TTP that should be able to apply an advanced penalty model that guarantees the performance and the reliability of the Cloud. Copyright © 2015, IGI Global. Source


Saadi Y.,Hassan 1st University | Nassereddine B.,Hassan 1st University | Jounaidi S.,Hassan 1st University | Haqiq A.,E NGN Research Group
Journal of Theoretical and Applied Information Technology | Year: 2016

Network wide broadcasting in IEEE 802.11s based wireless mesh network provides a considerable amount of broadcast traffic that may lead to the broadcast storm problem and consequently degrade the network performance. Contention, collisions and redundancy are features of the broadcast storm problem that may hinder the transmission of unicast data packet if not a carefully designed scheme for managing broadcast traffic is adopted. In this paper, we develop and enhance our approach, namely Control of Broadcast Forwarding (CBF), which is a self-pruning method using 2-hop neighborhood knowledge to make decision on forwarding or filtering the received broadcast messages. We perform a deeply investigation including a comparison between CBF and the most suitable broadcasting techniques for wireless mesh networks according to various simulation environments. Simulations results reveal that CBF achieves comparatively better performance in term of average end to end delay and reachability. The only cost brought by CBF is a slightly increase in overhead and consequently in the number of retransmitting nodes. © 2005 - 2015 JATIT & LLS. All rights reserved. Source


Talbi J.,Hassan 1st University | Haqiq A.,Hassan 1st University | Haqiq A.,E NGN Research Group
Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015 | Year: 2015

Cloud computing is the promising technology that provides computational, storage, network and database resources by employing the virtualization technology in the infrastructure layer. Nowadays, most of the applications are hosted in the multi-tenant based virtualized cloud environment. Scalability is the challenging task in this environment for effective utilization of the resources and to improve the profit of the cloud service providers. Recently, the companies and enterprises are tried to realize the scalability in terms of application, platform, database and infrastructure level. Thus, to solve the scalability issue, we propose an approach for improving the process of resource monitoring and management in large cloud datacenters by applying a quantitative methodology based on clustering techniques that measure the similarity between virtual machines (VMs) behaviors in terms of resource utilization. This model will help administrators to make decision about the management of resources in IaaS cloud systems. © 2015 IEEE. Source


Saadi Y.,Hassan 1st University | Nassereddine B.,Hassan 1st University | Haqiq A.,E NGN Research Group
International Conference on Next Generation Networks and Services, NGNS | Year: 2014

Blind Flooding is the simplest broadcasting operation used in a wireless mesh network (WMN) based IEEE 802.11s. However such mechanism can significantly degrade the network performance due to the considerable amount of broadcast traffic a WMN may face. Actually, routing relies heavily on layer two broadcasting and WMNs may bridge wired networks which deploy many broadcasting based application. In previous work we have designed an adaptive approach to control the forwarding of flooded messages into the mesh. The main focus of our previous simulations was to simulate the flooding process in wireless mesh network routing protocol, namely Hybrid Wireless Mesh Protocol (HWMP), which is using Blind Flooding. Generally, the results have shown a considerable amelioration of the network capacity specially with scaling. In this paper we evaluate our scheme, namely Control of Broadcast Forwarding (CBF), in comparison with Blind Flooding protocol. Our protocol is a self pruning algorithm where each node decides itself if or not to rebroadcast a flooded message based on packet type information element and 2-hop neighborhood knowledge. Simulations results show a significant reduction of broadcast cost while improving slightly the average end to end delay. © 2014 IEEE. Source


Elhissi Y.,Hassan 1st University | Haqiq A.,Hassan 1st University | Haqiq A.,E NGN Research Group
2016 International Conference on Information Technology for Organizations Development, IT4OD 2016 | Year: 2016

In a context of E-Governance and modernization of higher education, the Moroccan University is facing new challenges, such as: - Orientation, development and promotion of scientific research that meets the needs of the socio-economic environment and therefore affects the lives of citizens. - Developing the culture of communication and information by ending practices that limit the dissemination of information. Moroccan strategy for the development of higher education has focused all its projects on the use of new technologies for the management and structuring of research, and the promotion and enhancement of its activities. To this end, the establishment of an information system for the management and communication of research in the university can organize all the research activities, structure research units on an administrative and financial sides it can also communicate its work to enhance the sharing and open a window of partnership with its socio-economic environment. This work aims to develop an information system for management, information security and communication research in the Moroccan university. This system will allow collecting, classification, processing and disseminating information related to scientific research at the university in order to organize and structure all its activities. It will also enable all university's actors to use a digital workspace to access and share information, and therefore interact and get involved in the promotion of scientific research at the university. © 2016 IEEE. Source

Discover hidden collaborations