Loading...
Search for: queue-networks
0.005 seconds
Total 85 records

    A network coding-based packet forwarding scheme for unicast random access networks with exponential backoff

    , Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) Farhadi, F ; Ashtiani, F ; Sharif University of Technology
    2013
    Abstract
    Exponential backoff is an intrinsic feature of MAC-layer standards of most types of ad hoc networks. It leads to random access channels with memory. In this paper we propose a new network coding-based packet forwarding scheme suitable for multiple unicast scenarios in downlink direction of a wireless network. The wireless nodes as well as the access point attempt to access the channel, based on slotted Aloha with exponential backoff. In the proposed scheme we convert multiple unicast scenario to a combination of several anycast and a multicast scenarios. By proposing an open multiclass queueing network, we are able to derive the maximum stable download throughput of the network. The... 

    Stable throughput analysis for a cooperative WLAN with primary and secondary users

    , Article 2012 6th International Symposium on Telecommunications, IST 2012 ; 2012 , Pages 535-540 ; 9781467320733 (ISBN) Nazari, M. A ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we propose a new scenario in order to increase the total throughput of a WLAN. In this scenario, some secondary users (SUs) are considered in a primary WLAN such that SUs cooperate with primary users (PUs) in transmitting the primary packets. Each SU sends its packets as well as the primary packets collided at the access point, but overheard successfully at the SU, by random access the primary WLAN. We show that SUs cooperation is able to compensate their adverse effect in the WLAN, so total throughput in the WLAN increases without a significant degrading effect for the stability region of PUs. To this end, we use an analytical model based on open queueing networks. By solving... 

    Maximum stable throughput of network-coded multiple broadcast sessions for wirelesstandem random access networks

    , Article IEEE Transactions on Mobile Computing ; Vol. 13, issue. 6 , 2014 , pp. 1256-1267 ; ISSN: 15361233 Amerimehr, M. H ; Ashtiani, F ; Valaee, S ; Sharif University of Technology
    Abstract
    This paper presents an analytical study of the stable throughput for multiple broadcast sessions in a multi-hop wireless tandem network with random access. Intermediate nodes leverage on the broadcast nature of wireless medium access to perform inter-session network coding among different flows. This problem is challenging due to the interaction among nodes, and has been addressed so far only in the saturated mode where all nodes always have packet to send, which results in infinite packet delay. In this paper, we provide a novel model based on multi-class queueing networks to investigate the problem in unsaturated mode. We devise a theoretical framework for computing maximum stable... 

    Modeling the behavior of contending opportunistic cognitive radios

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 720-723 ; 9781424412365 (ISBN) Feizi Khankandi, S ; Ashtiani, F ; Hassani, S. H ; Tootoonchi, P ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose a new model to evaluate the behavior of cognitive radios (CRs). In this model, we consider a specific number of primary users having independent probabilistic on-off behavior. In addition, a specific number of opportunistic cognitive radios in saturation mode is assumed. We consider contention for CRs in order to occupy an inactive primary channel independently according to a simple MAC scheme. Our model is based on a closed BCMP state-dependent queueing network. We map contention of the CRs and the behavior of primary users on suitable parameters of the queueing network. By solving the network, we obtain the steady state behavior of CRs, then we find the efficient... 

    Content Distribution Service Analysis in Vehicular Ad-Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Kananian, Borna (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    Car accident damages take about 7 percent of GPD of Iran every year. As a result of car accidents, the economy of the country is damaging irreparably. The amount of road casualties equals casualties in a complete war. Considering the aforementioned conditions, the researchers are thinking about new technologies to reduce the cost of the accidents. So the use of Vehicular ad-hoc Networks (VANET) is inevitable in the near future. Content distribution service is one of the emerging services of VANETs. This service is used in both safety and comfort related applications. Content distribution describes delivery of media content such as Video, Audio, Image, Text, Software, and Video Games over... 

    Throughput enhancement of a random access WLAN by combination of digital and analog network coding

    , Article IEEE International Conference on Communications, 5 June 2011 through 9 June 2011 ; June , 2011 ; 05361486 (ISSN) ; 9781612842332 (ISBN) Farhadi, F ; Ashtiani, F ; Sharif University of Technology
    2011
    Abstract
    In this paper, we propose a new packet routing scheme, i.e., a combined digital and analog network coding scheme (DNC-ANC) suitable for multiple unicast scenario. In this respect, we consider a random access WLAN comprised of single and multi-hop unicast sessions. Then we modify the MAC scheme in order to enable ANC. In order to evaluate the effect of the proposed DNC-ANC scheme analytically, we employ an open queueing network and map the details of MAC as well as routing schemes onto its suitable parameters. By writing the corresponding traffic equations and applying the stability condition, we are able to find the maximum stable throughput for the considered scenario. Finally, we will show... 

    Lower and upper bounds for throughput capacity of a cognitive ad hoc network overlaid on a cellular network

    , Article 2008 IEEE Wireless Communications and Networking Conference, WCNC 2008, Las Vegas, NV, 31 March 2008 through 3 April 2008 ; 2008 , Pages 2759-2764 ; 15253511 (ISSN) ; 9781424419968 (ISBN) Feizi Khankandi, S ; Ashtiani, F ; Sharif University of Technology
    2008
    Abstract
    In this paper, we compute lower and upper bounds for the throughput capacity of an ad hoc network overlaid on a cellular network. The ad hoc network is comprised of a specific number of wireless cognitive nodes that opportunistically exploit the inactive frequency channels in the cellular network. In this respect, we employ a model recently proposed for single-channel mobile ad-hoc network after some minor modifications. The proposed framework consists of two queueing networks, a closed BCMP queueing network comprised of M/G/∞nodes capable of mobility modeling, and an open BCMP queueing network comprised of symmetric M/G/1 nodes capable of modeling the packet transmission process. By... 

    Modeling and Analysis of Two Wireless Networks with Opportunistic and Primary Spectrum Access

    , M.Sc. Thesis Sharif University of Technology Moradian, Masoumeh (Author) ; Ashtiani, Farid (Supervisor) ; Nasiri Kenari, Masoumeh (Supervisor)
    Abstract
    In this thesis, we propose an analytical model to evaluate the maximum stable throughput of a cognitive IEEE 802.11-based WLAN overlaid on a cellular network. In the considered scenario, the secondary nodes operate in uplink frequency band of primary network and transmit on their own idle detected primary channels using OFDM technique. The activity of primary nodes is modeled independently by ON-OFF alternating states with negative exponential distributed durations. The main feature of the proposed analytical model is to include different status of the secondary users, i.e., different spectrum opportunities for different cognitive users, as the result of dynamic nature of primary users as... 

    Dynamic Spectrum Sharing in Wireless Mesh Networks for Throughput Enhancement

    , M.Sc. Thesis Sharif University of Technology Darchini Maragheh, Kamaloddin (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    Having special advantages over existing networks, mesh networks have attracted much attention. Proposing new MAC protocols which are in compliance with these networks is an interesting field in which many works have been done. Also, Task Group S of the IEEE802.11 is going to release a standard for the mesh networks. Analysis of a simplified version of IEEE802.11s is the first goal of this thesis. The standard is a spectrum sharing algorithm based on scheduling and contention. Although IEEE802.11e manages the contention for accessing the wireless medium in the standard, but for the sake of simplicity, in this thesis we used SlottedALOHA instead. Also, one gateway and six other nodes are... 

    Throughput Analysis of a Cognitive Multi-hop Wireless Network Overlaid on a Cellular Network

    , M.Sc. Thesis Sharif University of Technology Soleimani, Hosein (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    In this thesis, we evaluate the maximum stable throughput of a cognitive multi-hop IEEE 802.11-based WLAN overlaid on a cellular network. In the considered scenario, the secondary users operate in the downlink or uplink frequency band of primary network and transmit their data in free primary channels using OFDM technique. The activity of primary nodes is modeled independently by ON-OFF alternating states. To model the scenario, each secondary user is modeled with an open queueing network. The queueing network can model the transmission of data as well as the effect of primary users. By writing the traffic equations of the queueing network and applying the stability conditions, we are able... 

    Spectrum Handover in Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Shokri, Hossein (Author) ; Nasiri-Kenari, Masoumeh (Supervisor)
    Abstract
    Powerful spectrum sensing and access strategies enable cognitive radios to find transmission opportunity in spectral resources dedicated exclusively to the incumbent/primary users (PUs). One of the key effecting factors on cognitive radio network (CRN) throughput is the spectrum sensing sequence used by each secondary user (SU). In this thesis, modeling, performance evaluation, and throughput maximization of a CRN are investigated. More specifically, firstly we evaluate the performance of sequential method for handovers regarding a SU’s average throughput and consumed energy, and an optimization problem is formulated to maximize the throughput through selecting optimal channel sensing time.... 

    Non-saturation mode analysis of IEEE 802.11 MAC protocol

    , Article 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'07, Athens, 3 September 2007 through 7 September 2007 ; December , 2007 ; 1424411440 (ISBN); 9781424411443 (ISBN) Hassani, H ; Ashtiani, F ; Tehrani, P ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose a new modeling approach for analytical evaluation of normalized throughput and average backoff time for IEEE 802.11 MAC standard in non-saturation mode and with Poisson arrivals. To this end, we map different stages of distributed coordinated function (DCF) onto different components of a closed multi-class BCMP queueing network with arbitrary service time distribution. At the last part of the paper, we illustrate the applicability of the proposed approach by some numerical results in both saturation and non-saturation modes and obtain average backoff time for different arrival rates. © 2007 IEEE  

    NN-RED: An AQM mechanism based on neural networks

    , Article Electronics Letters ; Volume 43, Issue 19 , 2007 , Pages 1053-1055 ; 00135194 (ISSN) Hariri, B ; Sadati, N ; Sharif University of Technology
    2007
    Abstract
    A novel active queue management (AQM) method is proposed. This method, named NN-RED, is based on the use of a neural network for early congestion prediction. By simulations, it is demonstrated that the performance of the proposed approach is better than the random early detection (RED) method that is currently known as one of the best AQM methods in solving congestion problems. © The Institution of Engineering and Technology 2007  

    Characterization of complex behaviors of TCP/RED computer networks based on nonlinear time series analysis methods

    , Article Physica D: Nonlinear Phenomena ; Volume 233, Issue 2 , 2007 , Pages 138-150 ; 01672789 (ISSN) Bigdeli, N ; Haeri, M ; Choobkar, S ; Jannesari, F ; Sharif University of Technology
    Elsevier  2007
    Abstract
    Packet-level observations are representative of the high sensitivity of TCP/RED computer network behavior with respect to network/RED parameter variations. That is, while we do not have any control on network parameters, mis-choosing of the RED parameters results in complex non-periodic oscillations in the router queue length that may damage the Quality of Service requirements. Characterizing the nature of such behaviors, however, helps the network designers to modify the RED design method in order to achieve better overall performance. In this paper, we first investigate the effect of variations in different RED parameters on the network behavior and then seek for the origin of such complex... 

    A multi-objective lead time control problem in multistage assembly systems using an interactive method

    , Article Applied Mathematics and Computation ; Volume 176, Issue 2 , 2006 , Pages 609-620 ; 00963003 (ISSN) Azaron, A ; Kianfar, F ; Sharif University of Technology
    2006
    Abstract
    In this paper, we develop a multi-objective model to optimally control the lead time of a multistage assembly system, using an interactive method. The multistage assembly system is modelled as an open queueing network, whose service stations represent manufacturing or assembly operations. It is assumed that the product order arrives according to a Poisson process. In each service station, there is either one or infinite number of servers (machines) with exponentially distributed processing time, in which the service rate (capacity) is controllable. The transport times between the service stations are independent random variables with generalized Erlang distributions. The problem is... 

    On queueing with customer impatience until the end of service

    , Article Stochastic Models ; Volume 22, Issue 1 , 2006 , Pages 149-173 ; 15326349 (ISSN) Movaghar, A ; Sharif University of Technology
    2006
    Abstract
    We study queueing systems where customers have strict deadlines until the end of their service. An analytic method is given for the analysis of a class of such queues, namely, M(n)/M/1 + G models with ordered service. These are single-server queues with state-dependent Poisson arrival process, exponential service times, FCFS service discipline, and general customer impatience. We derive a closed-form solution for the conditional probability density function of the offered sojourn time, given the number of customers in the system. This is a novel result that has not been seen before. Using this result, we show how the probability measure induced by the offered sojourn time is computed, and... 

    Mobility modeling and analytical solution for spatial traffic distribution in wireless multimedia networks

    , Article IEEE Journal on Selected Areas in Communications ; Volume 21, Issue 10 , 2003 , Pages 1699-1709 ; 07338716 (ISSN) Ashtiani, F ; Salehi, J. A ; Sharif University of Technology
    2003
    Abstract
    In this paper, we propose a general mobility model suitable for wireless multimedia networks. Our model is based on splitting a region into subregions. Furthermore, we make an analogy between subregions as well as their inter-connections with a multi-class Jackson queueing network comprising of infinite-server nodes. The main attribute of such a network is due to its product-form stationary distribution. Using this model, we are able to obtain a closed analytical form for the spatial traffic distribution corresponding to a specific number of network-connected users with different classes of service and mobility in a typical region. Also, we show the flexibility obtained by the proposed... 

    Saturation throughput analysis of a cognitive IEEE 802.11-based WLAN overlaid on an IEEE 802.16e WiMAX

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 9 September 2012 through 12 September 2012 ; September , 2012 , Pages 1515-1520 ; 9781467325691 (ISBN) Rahimzadeh, P ; Moradian, M ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we focus on a cognitive network scenario, comprised of a WLAN overlaid on a network with time-scheduled primary users. WiMAX is an example of such primary networks. For time-scheduled primary users simple On-Off traffic model with exponential durations is not valid anymore. In this scenario, the cognitive nodes (CNs) hear downlink map (DL-MAP) and thus, know the frequency and time locations of all allocated slots at each frame. Then, cognitive nodes contend with each other in order to transmit their fixed size packets based on IEEE 802.11 MAC protocol. Since the number of empty slots at each frame is variable each packet transmission in cognitive network prolongs a random... 

    Throughput analysis of a slotted Aloha-based network with energy harvesting nodes

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2012 , Pages 351-356 ; 9781467325691 (ISBN) Moradian, M ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we evaluate the effect of energy constraints on the performance of a simple network comprised of wireless nodes with energy harvesting capability. In this scenario, wireless nodes contend with each other based on slotted Aloha protocol in order to transmit a packet. Packet transmission occurs provided that enough energy exists in the energy buffer. We propose an analytical model based on a closed queueing network (QN) to include details of data and energy buffers as well as random access MAC protocol. We show how energy limitation affects the MAC design parameters, e.g., contention window size, in order to optimize the performance of the network. Moreover, we evaluate the... 

    Analytical evaluation of saturation throughput of a cognitive wlan overlaid on a time-scheduled ofdma network

    , Article IEEE Transactions on Mobile Computing ; Volume 16, Issue 3 , 2017 , Pages 634-647 ; 15361233 (ISSN) Rahimzadeh, P ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we analyze the saturation throughput of a cognitive WLAN overlaid on a primary OFDMA TDD network (e.g., LTE or WiMAX). In this scenario, after the contention among the secondary nodes, the winner node transmits its data packet in the empty resource blocks (RBs) of downlink and uplink subframes of the primary network. Regarding the OFDMA structure as well as time-scheduled resources in the primary network, the time duration of opportunities for the secondary network does not follow simple exponential on-off pattern. To model the dynamic behavior of opportunities for secondary nodes as well as contentions to exploit the opportunities, we propose an analytical model comprised of...