Sonia Fahmy

ORCID: 0000-0003-2870-7166
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Advanced Optical Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Energy Efficient Wireless Sensor Networks
  • Advanced Wireless Network Optimization
  • Mobile Ad Hoc Networks
  • Wireless Communication Networks Research
  • Interconnection Networks and Systems
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Networks and Protocols
  • Software System Performance and Reliability
  • Network Time Synchronization Technologies
  • Image and Video Quality Assessment
  • Mobile Agent-Based Network Management
  • Opportunistic and Delay-Tolerant Networks
  • Network Packet Processing and Optimization
  • Advanced Queuing Theory Analysis
  • Security in Wireless Sensor Networks
  • Cooperative Communication and Network Coding
  • Cloud Computing and Resource Management
  • Wireless Body Area Networks

Purdue University West Lafayette
2016-2025

University of California, Riverside
2018

University of California, Santa Barbara
2018

University of Kentucky
2018

Osaka University
2018

Chinese University of Hong Kong
2018

Bell (Canada)
2018

Laboratoire d'Informatique de Paris-Nord
2007

Rensselaer Polytechnic Institute
2006

The Ohio State University
1998-2003

Topology control in a sensor network balances load on nodes and increases scalability lifetime. Clustering is an effective topology approach. We propose novel distributed clustering approach for long-lived ad hoc networks. Our proposed does not make any assumptions about the presence of infrastructure or node capabilities, other than availability multiple power levels nodes. present protocol, HEED (Hybrid Energy-Efficient Distributed clustering), that periodically selects cluster heads...

10.1109/tmc.2004.41 article EN IEEE Transactions on Mobile Computing 2004-10-01

Prolonged network lifetime, scalability, and load balancing are important requirements for many ad-hoc sensor applications. Clustering nodes is an effective technique achieving these goals. In this work, we propose a new energy-efficient approach clustering in networks. Based on approach, present protocol, HEED (hybrid distributed clustering), that periodically selects cluster heads according to hybrid of their residual energy secondary parameter, such as node proximity its neighbors or...

10.1109/infcom.2004.1354534 article EN 2004-12-23

This paper describes the "explicit rate indication for congestion avoidance" (ERICA) scheme rate-based feedback from asynchronous transfer mode (ATM) switches. In ERICA, switches monitor their load on each link and determine a factor, available capacity, number of currently active virtual channels. information is used to advise sources about rates at which they should transmit. The algorithm designed achieve high utilization with low delays fast transient response. It also fair robust...

10.1109/90.836480 article EN IEEE/ACM Transactions on Networking 2000-01-01

We propose an application level multicast approach, Topology Aware Grouping (TAG), which exploits underlying network topology information to build efficient overlay networks among group members. TAG uses about path overlap members construct a tree that reduces the relative delay penalty, and number of duplicate copies packet on same link. study properties TAG, model experiment with its economies scale factor quantify benefits compared unicast IP multicast. also compare approach ESM in...

10.1145/507670.507688 article EN 2002-05-12

Energy efficiency is critical for wireless sensor networks. The data gathering process must be carefully designed to conserve energy and extend the network lifetime. For applications where each continuously monitors environment periodically reports a base station, tree-based topology often used collect from nodes. In this work, we study construction of tree maximize lifetime, which defined as time until first node depletes its energy. problem shown NP-complete. We design an algorithm starts...

10.1109/infocom.2008.80 article EN 2008-04-01

Energy efficiency is critical for wireless sensor networks. The data-gathering process must be carefully designed to conserve energy and extend network lifetime. For applications where each continuously monitors the environment periodically reports a base station, tree-based topology often used collect data from nodes. In this work, we first study construction of tree when there single station in network. objective maximize lifetime, which defined as time until node depletes its energy....

10.1109/tnet.2010.2045896 article EN IEEE/ACM Transactions on Networking 2010-04-28

Network Function Virtualization (NFV) brings a cloud service automation paradigm to demand-driven elastic flexing of infrastructure resources. Thus, it is essential characterize the impact hardware and virtualization options on virtual network function (VNF) performance, load underlying infrastructure. In this paper, we present VNF characterization case studies with three sample open-source platforms, Clearwater IMS two intrusion detection system VNFs (Snort Suricata). We demonstrate that...

10.1109/nfv-sdn.2015.7387412 article EN 2015-11-01

Novel routing paradigms based on policies, quality of service (QoS) requirements, and packet content have been proposed for the Internet over last decade. Constraint-based algorithms select a path satisfying constraints that are either administrative-oriented (policy routing) or service-oriented (QoS routing). The routes, in addition to constraints, selected reduce costs, balance network load, increase security. In this article, we discuss several constraint-based approaches explain their...

10.1109/comst.2003.5342226 article EN IEEE Communications Surveys & Tutorials 2003-01-01

Serving multimedia content over the Internet with negligible delay remains a challenge. With advent of Web 2.0, numerous video sharing sites using different storage and delivery models have become popular. Yet, little is known about these from global perspective. Such an understanding important for designing systems which can efficiently serve to users all world. In this paper, we analyze compare underlying distribution frameworks three services - YouTube, Dailymotion Metacafe based on...

10.1145/1496046.1496056 article EN 2008-05-28

Wi-Fi is an integral part of today's Internet infrastructure, enabling a diverse range applications and services. Prior approaches to resource allocation optimized Quality Service (QoS) metrics, which often do not accurately reflect the user's Experience (QoE). To address gap between QoS QoE, we introduce Maestro, adaptive method that formulates problem as partially observable Markov decision process (PO-MDP) maximize overall system QoE fairness. Maestro estimates without using any...

10.1145/3709371 article EN Proceedings of the ACM on Networking 2025-03-05

The Available Bit Rate (ABR) service has been developed to support data applications over Asynchronous Transfer Mode (ATM) networks. network continuously monitors its traffic and provides feedback the source end systems. This paper explains rules that sources have follow achieve a fair efficient allocation of resources.

10.1109/35.544194 article EN IEEE Communications Magazine 1996-01-01

Several sensor network applications, such as environmental monitoring, require data aggregation to an observer. For this purpose, a tree, rooted at the observer, is constructed in network. Node clustering can be employed further balance load among nodes and prolong lifetime. In paper, we design implement system, iHEED, which node integrated with multi-hop routing for TinyOS. We consider simple operators, AVG or MAX. use energy consumption model keep track of battery cluster heads regular...

10.1109/mahss.2005.1542773 article EN 2005-12-13

We study sleep/wake scheduling for low duty cycle sensor networks. Our work is different from prior in that we explicitly consider the effect of synchronization error design algorithm. In our previous work, have studied single hop communications, e.g., intra-cluster communications between a cluster head and members. showed there an inherent trade-off energy consumption message delivery performance (defined as capture probability). proposed optimal algorithm, which satisfies probability...

10.1109/infcom.2007.184 article EN 2007-05-01

Researchers in the denial-of-service (DoS) field lack accurate, quantitative, and versatile metrics to measure service denial simulation testbed experiments. Without such metrics, it is impossible severity of various attacks, quantify success proposed defenses, compare their performance. Existing DoS equate with slow communication, low throughput, high resource utilization, loss rate. These are not because they fail monitor all traffic parameters that signal degradation. They quantitative...

10.1109/tdsc.2008.73 article EN IEEE Transactions on Dependable and Secure Computing 2008-12-04

Overlay networks among cooperating hosts have recently emerged as a viable solution to several challenging problems, including multicasting, routing, content distribution, and peer-to-peer services. Application-level overlays, however, incur performance penalty over router-level solutions. This paper quantifies explains this for overlay multicast trees via: 1) Internet experimental data; 2) simulations; 3) theoretical models. We compare number of protocols with respect tree structure,...

10.1109/tnet.2007.892847 article EN IEEE/ACM Transactions on Networking 2007-04-01

In this paper, we present RoCC, a robust congestion control approach for datacenter networks based on RDMA. RoCC leverages switch queue size as an input to PI controller, which computes the fair data rate of flows in queue, signaling it flow sources. The parameters are self-tuning guarantee stability, rapid convergence, and near-optimal throughput wide range scenarios. Our simulation DPDK implementation results show that can achieve up 7× reduction PFC frames generated under high average...

10.1145/3386367.3431316 article EN 2020-11-23

Distance prediction algorithms use O(N) round trip time (RTT) measurements to predict the N <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> RTTs among nodes. can be applied improve performance of a wide variety Internet applications: for instance, guide selection download server from multiple replicas, or construction overlay networks multicast trees. Although accuracy existing has been extensively compared using relative error metric,...

10.1109/infocom.2006.306 article EN 2006-01-01

ATM-UBR service responds to congestion by dropping cells when switch buffers become full. TCP connections running over UBR experience low throughput and high unfairness. For 100% throughput, each needs equal the sum of window sizes all connections. Intelligent drop policies can improve performance with limited buffers. The UBR+ proposes enhancements for intelligent drop. early packet discard scheme improves but does not attempt fairness. selective based on per-connection buffer occupancy...

10.1109/icc.1997.610038 article EN 2002-11-22
Coming Soon ...