Mohammad Forghani - IEEE Xplore Author Profile

Scheduled Maintenance: On Tuesday, May 20, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (6:00-10:00 PM UTC). During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Showing 1-24 of 24 results

Filter Results

Show

Results

The three-tier sense-edge-cloud (SEC) framework developed as a consequence of the advances in IoT communication represents an inverted multicast paradigm, allowing the sensors to deliver the data to the cloud via edge devices. Due to the increasing volume of data generation and transmission, the SEC framework is often challenged by resource bottlenecks. To remedy this problem, an IoT network must ...Show More
Unmanned Aerial Vehicles (UAVs) are becoming more popular than ever in outdoor commercial services. Many third-party UAV companies offer their UAVs as mobile data collectors to assist their clients in remote data collection missions. However, due to the lack of trust and transparency, the clients often have very little control on the behavior of these UAVs. This issue is even exacerbated if the se...Show More
The technology advancement has made Unmanned Aerial Vehicle (UAV) swarm a promising method to achieve complicated missions that a single UAV cannot support. Leader-followers formation is a widely used swarm management scenario where a leader drone frequently broadcasts controlling messages to all follower drones to achieve collaboratively a common mission. However, managing such a UAV swarm, espec...Show More
Consensus, or state machine replication, is critical for the deployment of distributed battlefield systems. Battlefield networks operate in environments with unpredictable wireless connectivity which lead to sparse networks and frequent partitioning, and this makes deploying centralized architectures where nodes require a connection to a remote server unsuitable. The Extended Virtual Synchrony (EV...Show More
Providing deterministic communication guarantees in dynamic and unreliable tactical networks is an ongoing challenge. Traditional routing protocols cannot adapt to the frequent topology changes inherent in battlefield scenarios, and robust flooding approaches are prohibitively expensive in terms of overhead. This paper presents a novel adaptive routing algorithm based on techniques from reinforcem...Show More
The dramatic success and scaling of the Internet was made possible by the core principle of keeping it simple in the middle and smart at the edge (or the end-to-end principle). However, new applications bring new demands, and for many emerging applications, the Internet paradigm presents limitations. For applications in this new generation of Internet services, structured overlay networks offer a ...Show More
This paper presents a field experimentation and demonstration addressing serverless information services that provide both group messaging with ordering guarantees and robust file/media object sharing in a tactical edge communication environment. These serverless information services constitute the main functional components of our real time image and ordered annotation sharing application, called...Show More
This paper presents a multicast routing mechanism supporting the classical IP multicast service model that can dynamically use redundant forwarding in the parts of the network affected by a high rate of topology changes, while converging to regular multicast distribution trees where or when the network becomes relatively stable. The rationale is that intermittent connectivity directly affects the ...Show More
We present a new approach to performing adaptive, loop-free, destination-based unicast forwarding in an IP-based network. The approach is an integration of several well-known techniques, including broadcast-based flooding, on-demand route discovery, and link state routing. In this approach, routers are not universally in one routing mode, such as a `link-state', for all destinations but instead ap...Show More
This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide-area sites. The architecture confines the effects of any malicious replica to its local site, reduces message complexity of wide-area communication, and allows read-only queries to be performed locally within a site for the price of additional standard hardware. ...Show More
This paper describes a field demonstration and presents the network performance of an 802.11 ground-UAV network composed of 11 ground stations, a mobile vehicle and two fixed wing UAVs, connected by two routing gateways to a legacy wired network. The network effects demonstrated include mobility, network partitions and merges, and gateway failovers. The paper presents experimental results for reco...Show More
We present CORE (common open research emulator), a real-time network emulator that allows rapid instantiation of hybrid topologies composed of both real hardware and virtual network nodes. CORE uses FreeBSD network stack virtualization to extend physical networks for planning, testing and development, without the need for expensive hardware deployments. We evaluate CORE in wired and wireless setti...Show More
A current challenge in interconnecting mobile ad hoc networks (MANETs) with backbone legacy networks is the lack of compatibility between different multicast routing protocols when using multiple gateways, due to differences in both forwarding semantics and implementations of the different protocols. We present designs and experimental results involving the interconnection of the simplified multic...Show More
Low-cost wireless routers are changing the way people connect to the Internet. They are also very cheap, albeit quite limited, Linux boxes. These attributes make them ideal candidates for wireless mesh routers. This paper presents a minimally invasive mechanism for redundant multipath routing in kernel-space to achieve high reliability with high throughput in a mesh network. This service is essent...Show More
Connecting mobile ad-hoc networks (MANETs) to the legacy layer networks poses numerous challenges that have not been much explored. The internal topology of a MANET and external connectivity to a backbone network will likely vary greatly over time, and MANET nodes need to be able to communicate with nodes in other attached networks as changes occur. Keeping a MANET's multicast routing domain conne...Show More
This paper presents an architecture and a hybrid routing protocol for multi-homed wireless mesh networks that provide uninterrupted connectivity and fast handoff. Our approach integrates wireless and wired connectivity, using multicast groups to coordinate decisions and seamlessly transfer connections between several Internet gateways as mobile clients move between access points. The protocol opti...Show More
The cost savings and novel features associated with voice over IP (VoIP) are driving its adoption by service providers. Unfortunately, the Internet's best effort service model provides no quality of service guarantees. Because low latency and jitter are the key requirements for supporting high-quality interactive conversations, VoIP applications use UDP to transfer data, thereby subjecting themsel...Show More
This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines the effects of any malicious replica to its local site, reduces message complexity of wide area communication, and allows read-only queries to be performed locally within a site for the price of additional hardware. A prototy...Show More
When many parties share network resources on an overlay network, mechanisms must exist to allocate the resources and protect the network from overload. Compared to large physical networks such as the Internet, in overlay networks the dimensions of the task are smaller, so new and possibly more effective techniques can be used. In this work we take a fresh look at the problem of flow control in mul...Show More
This paper presents a flow control protocol for multi-sender multi-group multicast and unicast in wide area overlay networks. The protocol is analytically grounded and achieves real world goals, such as simplicity, fairness and minimal resource usage. Flows are regulated based on the "opportunity" costs of network resources used and the benefit provided by the flow. In contrast to existing window-...Show More
Group communication systems are proven tools upon which to build fault-tolerant systems. As the demands for fault-tolerance increase and more applications require reliable distributed computing over wide area networks, wide area group communication systems are becoming very useful. However, building a wide area group communication system is a challenge. This paper presents the design of the transp...Show More
The paper presents an integrated system designed for the agglomeration factory and Cowper stove process optimization. The system is based on the RT-ARCH real time architecture, an architecture of software tools used in process control. The system is composed of classical algorithms running on a network of PLC-s and controlling algorithms implemented with a process computer. Some of them are typica...Show More
Real time transactions are implemented by client-server applications, which must have a very good response time and which are particularly difficult to realize. We have created three instruments used for developing multi user software products that manage geographically distributed data. Client users have a graphical display of the database placed on the server (actually they have the data display...Show More