Tuesday, April 05, 2022, 14:00
- 16:00
Contact Person
In this thesis, we investigate how learning-based approaches are implemented to solve the communication network problems and how communication network dependencies impact the training of learning-based approaches.
Maha Al-Aslani, PhD Student, Computer Science, KAUST
Wednesday, March 31, 2021, 16:00
- 17:00
Contact Person
In this thesis defense, I will explore the unique characteristics of IoT traffic and examine IoT systems. The work is motivated by the new capabilities offered by modern Software Defined Networks (SDN) and blockchain technology. We evaluate IoT Quality of Service (QoS) in traditional networking. We obtain mathematical expressions to calculate end-to-end delay, and dropping. Then, we analyze IoT traffic load and propose an intelligent edge that can identify volumetric traffic and address them in real-time using an instantaneous detection method for IoT applications (IDIoT). This approach can easily detect a large surge and potential variation in traffic patterns for an IoT application, which may contribute to safer and more efficient operation of the overall system. Our results provide insight into the advantages of an intelligent edge serving as a detection mechanism.
Ahmed E. Kamal, Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA.
Sunday, November 24, 2019, 11:00
- 12:00
B1, L3, Conference Room 3119
Contact Person
The European Telecom Standards Institute (ETSI) introduced the concept of Network Function Virtualization (NFV) with the aim of efficient network architecture and network system operation. In traditional networks, network functions are implemented in dedicated physical machines which are designed for single functionalities. Network services have been provided by connecting these physical machines, so the network architecture has been highly rigid and hard to change. NFV environment provides a more flexible and scalable network configuration and implementation through the softwarization of physical network functions. Network functions are transformed to Virtual Machines (VMs) so that Virtualized Network Functions (VNFs) can be implemented in commodity servers built for common uses, including public clouds.
Sunday, April 21, 2019, 13:00
- 14:00
B1 L4 Room 4214
Contact Person
As big data, articial intelligence, cloud services, cellular infrastructure, content delivery; all of which entail interconnected and  sophisticated computing and storage resources. Recent studies on traditional data center networks (DCNs) revealed two key challenges: a biased distribution of inter-rack trac, and unidentied ow multi-classes best known as delay sensitive mice ow (MF) and throughput-hungry elephant ow (EF).