Learn More
In this paper, we investigate the effect of grooming segment-based traffic on statistical multiplexing gain using simplified edge-node models of Optical Burst Switching (OBS) networks. The objective is to multiplex different bursts on the same output wavelength in order to optimize the bandwidth utilization on the optical fiber. We introduce a particular(More)
Machine to Machine (M2M) communication is an emerging technology that allows dynamic configuration of networks connecting many heterogeneous devices. Machines are used to assess and monitor the environment conditions and exchange information in an autonomous fashion. In many critical applications, machines are located in hazardous and even hostile(More)
In this paper, we address the problem of routing and wavelength assignment (RWA) and optical grooming of data bursts in segment-based traffic of Optical Burst Switching (OBS) networks. This problem has been extensively treated in circuit based WDM networks, but not in the context of OBS networks. We propose a novel formulation of this problem and we develop(More)
In this paper, we address the problem of optical grooming of data bursts in segment-based traffic of Optical Burst Switching (OBS) networks. The objective is to aggregate in one burst, different overlapping sub-bursts that are transmitted to the same destination. This process is executed at the core node and is based on the availability of Virtual Optical(More)
This paper presents the design of a wireless sensor network architecture suitable for structural health monitoring of air-crafts. The main objective is to improve airplane safety by detecting flutter phenomenon along the wings and communicating this information to the cockpit computer to react before vibration reaches resonance. Therefore, study of network(More)
This paper discusses the use of lattice cryptography and chaotic maps to encrypt OCDMA-coded optical flows. Unlike existing approaches, which have mainly focused on optical components such as phase masks and delay lines, our cryptosystem encompasses a secure code construction process. In fact, assuming that a pair of bases (a public basis and a private(More)
Cloud applications have witnessed significant increase in their development and deployment. This has been driven by the low cost and high performances that can offer cloud paradigm for enterprises to implement innovative services. However, cloud services are constrained by the available transmission rate and the amount of data volume transfers provided by(More)