Loading...
Search for: network-devices
0.011 seconds

    Interference management in D2D-enabled heterogeneous cellular networks using matching theory

    , Article IEEE Transactions on Mobile Computing ; 2018 ; 15361233 (ISSN) Shamaei, S ; Bayat, S ; Hemmatyar, A. M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    To support the increasing data traffic demand in wireless communications networks, a multi-tier architecture that consists of multiple small cells is adopted in traditional (macro) cellular networks. Nevertheless, due to the expansion of various wireless devices and services, there is still a need to increase the network capacity in new generation networks such as 5G. Hence, the integration of Device-to-Device (D2D) communication as a promising technology with heterogeneous networks has been proposed. This integration not only increases network capacity but also improves spectral efficiency and alleviates the traffic load of base stations. However, the co/cross-tier interferences between D2D... 

    Random data and key generation evaluation of some commercial tokens and smart cards

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 2014 , p. 49-54 Boorghany, A ; Sarmadi, S. B ; Yousefi, P ; Gorji, P ; Jalili, R ; Sharif University of Technology
    Abstract
    In this paper, we report our evaluation of the strength of random number generator and RSA key-pair generator of some commercially available constrained hardware modules, i.e., tokens and smart cards. That was motivated after recent related attacks to RSA public keys, which are generated by constrained network devices and smart cards, and turned out to be insecure due to low-quality randomness. Those attacks are mostly computing pair-wise GCD between the moduli in public keys, and resulted in breaking several thousands of these keys. Our results show that most of the tested hardware modules behave well. However, some have abnormal or weak random generators which seem to be unsuitable for... 

    Reliable and energy-efficient routing for green software defined networking

    , Article 9th International Symposium on Telecommunication, IST 2018, 17 December 2018 through 19 December 2018 ; 2019 , Pages 221-226 ; 9781538682746 (ISBN) Norouzi, A ; Majidi, B ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Improvement of energy efficiency in Software Defined Networking (SDN) is a challenging problem. In order to achieve higher energy efficiency, the routing and scheduling in software defined networks should be planned robustly based on the topological specifications of the SDN. The topological specifications of the SDN depends on the size of the network graph which changes rapidly as the virtualized network devices in the network turned on and off by the controller. Therefore, modelling the SDN graph is an important issue in designing a reliability aware energy efficient SDN. In this paper we propose a new algorithm for reliable energy efficient traffic engineering in SDN. In the proposed... 

    Voice quality measurement in a typical router-based network

    , Article 32nd IEEE Conference on Local Computer Networks, LCN 2007, Dublin, 15 October 2007 through 18 October 2007 ; 2007 , Pages 274-275 ; 0769530001 (ISBN); 9780769530000 (ISBN) Azarfar, A ; Jahangir, A. H ; Sharif University of Technology
    2007
    Abstract
    In this paper, we introduce novel mechanisms for measuring and evaluating the performance of a network and its devices, configured especially for Voice over IP (VoIP). We study the effects of different configurations on final voice quality by enabling or changing the related equipment features. In our study we quantify quality changes based on different router configurations and discuss precisely to what extent and how much this quality is improved versus features or special configurations of network devices. These results can be used for two purposes: compare and benchmark different routers in order to know which one is proper for a typical VoIP network, and select the best configurations....