Learn More
Contention is inherent to optical burst switching; this may lead to some burst loss, which could be fatal for some kind of applications. In This work we propose a combination of contention reduction through congestion control and bursts retransmission to eliminate completely bursts loss. The simulation results indicate that this scheme can transform an(More)
With the pervasive use of mobile devices and the need for ubiquitous computing, the issue of " context " now becomes a hot topic in human computer interaction research and development. Further, the interface of the interaction beyond the desktop is moving from humans vs. computers to humans vs. context-aware environments. This leads the context to(More)
With the growing demand of bandwidth and the development being made in the optical components technology, the IP over DWDM using optical burst switching seems to be the best solution to take advantage of the huge capacity of the fiber and accommodate high traffic of information. In this architecture the optical network is seen as an optical cloud with(More)
Burst loss is the major problem that faces the development of optical burst switching (OBS) networks. The burst loss is caused by the contention which affects badly OBS performance, especially under a high load. In this paper we propose two schemes: anticipated retransmission (called AR) and admission control (called QAC). AR aims at reducing the burst(More)
Burst cloning reduces burst loss at core nodes by sending multiple copies of the same burst through optical burst switched (OBS) network simultaneously in order to enhance probability that at least one copy will reach destination. In this paper, we adopt burst cloning with star topology and we show that burst cloning at high load leads to a significant(More)
Cloud computing is, nowadays, one of the most interesting topics in computer science. Also, in research, a lot of effort is concentrated on cloud computing security issues. In this paper, we classify different security issues into the different levels that exist in cloud environments. We also present different solutions to the security issues in the cloud(More)