Loading...
Search for: throughput
0.015 seconds
Total 155 records

    Achievable throughput of wireless networks with local traffic

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 10 November , 2014 , Pages 3076-3081 ; ISSN: 15253511 ; ISBN: 9781479930838 Shariatpanahi, S. P ; Khalaj, B. H ; Shah-Mansouri, H ; Sharif University of Technology
    Abstract
    Many applications in wireless networks impose locally distributed traffic on the network. We consider the effect of traffic localization on throughput of large wireless networks in the scaling sense. We show that by careful exploitation of traffic localization, one can enhance the throughput of various schemes in wireless networks. Also, the important case of Small World traffic distribution in wireless networks is addressed. In this type of traffic, in addition to the local traffic, a non-negligible amount of global traffic should be handled by the network. It is shown that a non-negligible amount of network-wide traffic can be tolerated by network without any performance degradation in the... 

    One-hop throughput of wireless networks with random connections

    , Article IEEE Wireless Communications Letters ; Volume 1, Issue 3 , 2012 , Pages 205-208 ; 21622337 (ISSN) Shariatpanahi, S. P ; Khalaj, B. H ; Alishahi, K ; Shah Mansouri, H ; Sharif University of Technology
    2012
    Abstract
    We consider one-hop communication in wireless networks with random connections. In the random connection model, the channel powers between different nodes are drawn from a common distribution in an i.i.d. manner. In a wireless network with n nodes, a simple one-hop scheme achieving the throughput scaling of order n 1/3-δ, for any arbitrarily small δ > 0, is proposed. This scheme is based on maximizing the number of successful concurrent transmissions. Such achievable throughput, along with the order n 1/3 upper bound derived by Cui et al., characterizes the throughput of one-hop schemes for the class of connection models with distribution having finite mean and variance  

    Maximum stable throughput of network-coded multiple broadcast sessions for wirelesstandem random access networks

    , Article IEEE Transactions on Mobile Computing ; Vol. 13, issue. 6 , 2014 , pp. 1256-1267 ; ISSN: 15361233 Amerimehr, M. H ; Ashtiani, F ; Valaee, S ; Sharif University of Technology
    Abstract
    This paper presents an analytical study of the stable throughput for multiple broadcast sessions in a multi-hop wireless tandem network with random access. Intermediate nodes leverage on the broadcast nature of wireless medium access to perform inter-session network coding among different flows. This problem is challenging due to the interaction among nodes, and has been addressed so far only in the saturated mode where all nodes always have packet to send, which results in infinite packet delay. In this paper, we provide a novel model based on multi-class queueing networks to investigate the problem in unsaturated mode. We devise a theoretical framework for computing maximum stable... 

    Optimal and suboptimal sensing sequences in multiuser cognitive radio networks

    , Article 2012 6th International Symposium on Telecommunications, IST 2012, 6 November 2012 through 8 November 2012 ; November , 2012 , Pages 243-248 ; 9781467320733 (ISBN) Shokri Ghadikolaei, H ; Nasiri Kenari, M ; Sharif University of Technology
    2012
    Abstract
    Designing proper spectrum decision schemes for cognitive radios (CRs) improves spectral usage efficiency as well as CR network throughput. One of the key effecting factors of the CR network throughput is the spectrum sensing sequences of the secondary users (SUs). In this paper, the SUs throughput maximization through appropriately selecting the sensing sequences of the SUs, called sensing matrix (SM), is investigated. More specifically, first the average throughput of the CR network is evaluated for a given SM in the case of error-free channel sensing. Then, an optimization problem is formulated with the aim to maximize the network throughput by finding the optimal SM. In order to avoid... 

    Throughput enhancement for repetitive internal cores in latency-insensitive systems

    , Article IET Computers and Digital Techniques ; Volume 6, Issue 5 , 2012 , Pages 342-352 ; 17518601 (ISSN) Zare, M ; Hessabi, S ; Goudarzi, M ; Sharif University of Technology
    IEEE  2012
    Abstract
    Latency-insensitive design (LID) is a correct by-construction methodology for system on chip design that prevents multiple iterations in synchronous system design. However, one problem in the LID is system throughput reduction. In this study, a protocol is proposed to increase the throughput of internal cores in the latency-insensitive systems when there are several repetitive structures. The validation of the protocol is checked for latency equivalency in various system graphs. A shell wrapper to implement the protocol is described and superimposed logic gates for the shell wrapper are formulated. Simulation is performed for 12 randomly generated systems and four actual systems. The... 

    Throughput enhancement of a random access WLAN by combination of digital and analog network coding

    , Article IEEE International Conference on Communications, 5 June 2011 through 9 June 2011 ; June , 2011 ; 05361486 (ISSN) ; 9781612842332 (ISBN) Farhadi, F ; Ashtiani, F ; Sharif University of Technology
    2011
    Abstract
    In this paper, we propose a new packet routing scheme, i.e., a combined digital and analog network coding scheme (DNC-ANC) suitable for multiple unicast scenario. In this respect, we consider a random access WLAN comprised of single and multi-hop unicast sessions. Then we modify the MAC scheme in order to enable ANC. In order to evaluate the effect of the proposed DNC-ANC scheme analytically, we employ an open queueing network and map the details of MAC as well as routing schemes onto its suitable parameters. By writing the corresponding traffic equations and applying the stability condition, we are able to find the maximum stable throughput for the considered scenario. Finally, we will show... 

    Evaluation of distributed stream processing frameworks for IoT applications in smart cities

    , Article Journal of Big Data ; Volume 6, Issue 1 , 2019 ; 21961115 (ISSN) Nasiri, H ; Nasehi, S ; Goudarzi, M ; Sharif University of Technology
    SpringerOpen  2019
    Abstract
    The widespread growth of Big Data and the evolution of Internet of Things (IoT) technologies enable cities to obtain valuable intelligence from a large amount of real-time produced data. In a Smart City, various IoT devices generate streams of data continuously which need to be analyzed within a short period of time; using some Big Data technique. Distributed stream processing frameworks (DSPFs) have the capacity to handle real-time data processing for Smart Cities. In this paper, we examine the applicability of employing distributed stream processing frameworks at the data processing layer of Smart City and appraising the current state of their adoption and maturity among the IoT... 

    Secrecy throughput maximization for full-duplex wireless powered communication networks

    , Article 2019 IEEE International Conference on Communications, ICC 2019, 20 May 2019 through 24 May 2019 ; Volume 2019-May , 2019 ; 15503607 (ISSN); 9781538680889 (ISBN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we investigate the secrecy throughput for a full-duplex wireless powered communication network. A multi-antenna base station (BS) transmits energy towards nodes all the time and each node harvests energy prior to its transmission time slot. Nodes sequentially transmit their confidential information to the BS in presence of other nodes which are considered as potential eavesdroppers. We derive the secrecy rate and formulate the sum secrecy throughput optimization of all nodes. The optimization variables are the time slot duration and the BS beamforming during different transmission phases. The problem is non-convex and non-trivial. We propose a suboptimal approach in which the... 

    Performance evaluation of a new backoff method for IEEE 802.11

    , Article Computer Communications ; Volume 30, Issue 18 , 2007 , Pages 3698-3704 ; 01403664 (ISSN) Minooei, H ; Nojumi, H ; Sharif University of Technology
    2007
    Abstract
    Since DCF is the main protocol of accessing other mobile stations in ad hoc networks such as IEEE 802.11 WLANs, a self-controlling method for each station is necessary, called the backoff algorithm. An exponential backoff method has been used in WLANs and significant efforts have been made to analyze its throughput and other important properties such as delay and jitter. In this article, we propose a new backoff algorithm and model it with a discrete-time Markov chain; measuring its saturation throughput under several conditions and several set of parameters which are to be adjusted according to the network condition, with the aim of approaching maximum throughput when stations are... 

    An analytical framework for computation of throughput capacity in multi-hop mobile ad hoc networks

    , Article 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'07, Athens, 3 September 2007 through 7 September 2007 ; December , 2007 ; 1424411440 (ISBN); 9781424411443 (ISBN) Ashtiani, F ; Hamdi, M ; Shafiee, K ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose an analytical framework in order to compute the throughput capacity of a multi-hop ad hoc network with a finite number of mobile wireless nodes. The proposed framework consists of two related queueing networks; a closed BCMP queueing network to represent the mobility model of the wireless nodes and an open BCMP queueing network comprising symmetric M/G/l nodes to represent the multi-hop packet routing process from sources to destinations. In this respect, we consider very simple MAC and routing schemes and then map the related parameters onto several components of the queueing network. By solving the linear traffic equations corresponding to concerned queueing... 

    Caching gain in wireless networks with fading: A multi-user diversity perspective

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 2014 , p. 930-935 Shariatpanahi, S. P ; Shah Mansouri, H ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    We consider the effect of caching in wireless networks where fading is the dominant channel effect. First, we propose a one-hop transmission strategy for cache-enabled wireless networks, which is based on exploiting multi-user diversity gain. Then, we derive a closed-form result for throughput scaling of the proposed scheme in large networks, which reveals the inherent trade-off between cache memory size and network throughput. Our results show that substantial throughput improvements are achievable in networks with sources equipped with large cache size. We also verify our analytical result through simulations  

    Ultra high-throughput architectures for hard-output MIMO detectors in the complex domain

    , Article Midwest Symposium on Circuits and Systems, 7 August 2011 through 10 August 2011l ; August , 2011 ; 15483746 (ISSN) ; 9781612848570 (ISBN) Mahdavi, M ; Shabany, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, a novel hard-output detection algorithm for the complex multiple-input multiple-output (MIMO) detectors is proposed, which results in a significant throughput enhancement, a near-ML performance, and an SNR-independent fixed-throughput. Moreover, a high-throughput VLSI implementation is proposed, which is based on a novel method of the node generation and sorting scheme. The proposed design achieves the throughput of 10Gbps in a 0.13 μ CMOS process, which is the highest throughput reported in the literature for both the real and the complex domains. Synthesis results in 90nm CMOS also show that the proposed scheme can achieve the throughput of up to 15Gbps. Moreover, the FPGA... 

    High-throughput low-complexity unified multipliers over GF(2m) in dual and triangular bases

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume PP, Issue 99 , 2016 ; 15498328 (ISSN) Salarifard, R ; Bayat Sarmadi, S ; Farmani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Multiplication is an essential operation in cryptographic computations. One of the important finite fields for such computations is the binary extension field. High-throughput low-complexity multiplication architectures lead to more efficient cryptosystems. In this paper, a high-throughput low-complexity unified multiplier for triangular and dual bases is presented, and is referred to as basic architecture. This multiplier enjoys slightly simpler and more regular structure due to use of the mentioned bases. Additionally, structurally improved architectures have been proposed, which have smaller time complexity than basic ones. This is achieved by the use of parallel processing method.... 

    Throughput enhancement of IEEE 802.11e WLAN by transmission power randomization

    , Article IEEE Vehicular Technology Conference, 15 May 2011 through 18 May 2011 ; May , 2011 , Page(s): 1 - 5 ; 15502252 (ISSN) ; 9781424483310 (ISBN) Kenarsari Anhari, A ; Ashtiani, F ; Sharif University of Technology
    2011
    Abstract
    In this paper, we evaluate the effect of power randomization on the saturation throughput of a WLAN comprised of four classes of users, corresponding to four access categories (ACs) of IEEE 802.11e EDCA. To this end, we consider a specific number of power levels for all users. By some simplifications, we find the probability distributions for the power levels at each class in order to optimize the saturation throughput of a specific class. We evaluate the effect of such optimization onto the saturation throughput of other ACs as well as the saturation throughput of the whole network. Finally, we present some numerical results to show the effect of our optimization in different conditions  

    High-throughput low-complexity systolic montgomery multiplication over GF(2m) Based on Trinomials

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 62, Issue 4 , January , 2015 , Pages 377-381 ; 15497747 (ISSN) Bayat Sarmadi, S ; Farmani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Cryptographic computation exploits finite field arithmetic and, in particular, multiplication. Lightweight and fast implementations of such arithmetic are necessary for many sensitive applications. This brief proposed a low-complexity systolic Montgomery multiplication over GF(2m). Our complexity analysis shows that the area complexity of the proposed architecture is reduced compared with the previous work. This has also been confirmed through our application-specific integrated circuit area and time equivalent estimations and implementations. Hence, the proposed architecture appears to be very well suited for high-throughput low-complexity cryptographic applications  

    Throughput analysis of a slotted Aloha-based network with energy harvesting nodes

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2012 , Pages 351-356 ; 9781467325691 (ISBN) Moradian, M ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we evaluate the effect of energy constraints on the performance of a simple network comprised of wireless nodes with energy harvesting capability. In this scenario, wireless nodes contend with each other based on slotted Aloha protocol in order to transmit a packet. Packet transmission occurs provided that enough energy exists in the energy buffer. We propose an analytical model based on a closed queueing network (QN) to include details of data and energy buffers as well as random access MAC protocol. We show how energy limitation affects the MAC design parameters, e.g., contention window size, in order to optimize the performance of the network. Moreover, we evaluate the... 

    On the throughput and outage probability of multi-relay networks with imperfect power amplifiers

    , Article IEEE Transactions on Wireless Communications ; Volume 14, Issue 9 , May , 2015 , Pages 4994-5008 ; 15361276 (ISSN) Makki, B ; Svensson, T ; Eriksson, T ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    This paper studies the energy-limited performance of multi-relay networks. Taking the properties of the power amplifiers (PAs) into account, we derive closed-form expressions for the optimal power allocation, the outage probability and the throughput in the cases with a sum consumed energy constraint. Moreover, we analyze the diversity and the multiplexing gains of the PA-aware systems. Finally, we investigate the performance of large-scale multi-relay networks and develop efficient multi-relay systems with low cooperation overhead. The numerical and the analytical results show that the inefficiency of the PAs affects the outage probability and the throughput of the multi-relay systems... 

    Improving efficiency in resource allocation of OFDMA femtocell networks

    , Article 2013 21st Iranian Conference on Electrical Engineering ; May , 2013 , Page(s):1 - 5 ; 9781467356343 (ISBN) Aghababaiyan, K ; Pakravan, M. R ; Sharif University of Technology
    2013
    Abstract
    Interference control is one of the fundamental challenges in resource allocation of femtocell networks that use orthogonal frequency-division multiple access (OFDMA). In this paper, a method is proposed that reduces the interference between femtocells. This method is implemented by the femtocells in a self organizing manner and increases frequency reuse factor. Thus, the network throughput will increase and the fairness between femtocells remains reasonable we also propose a mechanism that can be applied increase the frequency resources assigned to each femtocell. These new frequencies can be used when femtocells require more frequency resources to carry higher traffic loads. Results of... 

    A network coding-based packet forwarding scheme for unicast random access networks with exponential backoff

    , Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) Farhadi, F ; Ashtiani, F ; Sharif University of Technology
    2013
    Abstract
    Exponential backoff is an intrinsic feature of MAC-layer standards of most types of ad hoc networks. It leads to random access channels with memory. In this paper we propose a new network coding-based packet forwarding scheme suitable for multiple unicast scenarios in downlink direction of a wireless network. The wireless nodes as well as the access point attempt to access the channel, based on slotted Aloha with exponential backoff. In the proposed scheme we convert multiple unicast scenario to a combination of several anycast and a multicast scenarios. By proposing an open multiclass queueing network, we are able to derive the maximum stable download throughput of the network. The... 

    Stable throughput analysis for a cooperative WLAN with primary and secondary users

    , Article 2012 6th International Symposium on Telecommunications, IST 2012 ; 2012 , Pages 535-540 ; 9781467320733 (ISBN) Nazari, M. A ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we propose a new scenario in order to increase the total throughput of a WLAN. In this scenario, some secondary users (SUs) are considered in a primary WLAN such that SUs cooperate with primary users (PUs) in transmitting the primary packets. Each SU sends its packets as well as the primary packets collided at the access point, but overheard successfully at the SU, by random access the primary WLAN. We show that SUs cooperation is able to compensate their adverse effect in the WLAN, so total throughput in the WLAN increases without a significant degrading effect for the stability region of PUs. To this end, we use an analytical model based on open queueing networks. By solving...