Loading...
Search for: network-layers
0.01 seconds
Total 62 records

    A Comparison between Virtual Private LAN Service (VPLS)and P2MP IP-only LAN Service (IPLS)

    , M.Sc. Thesis Sharif University of Technology Yousefi, Dariush (Author) ; Ajorloo, Hossein (Supervisor)
    Abstract
    Today Ethernet is the predominant technology for implementing Local Area Networks. Its privileges encourage service providers to extend Ethernet from Local Area Networks to Metropolitan Area Networks or even Wide Area Networks. Ethernet benefits such as low operational costs, well interoperability, plug-n-paly characteristic and rapid provisioning on demand make Ethernet ideal for Metropolitan Area Networks.But Ethernet by itself has some weakness like flat structure that makes it unfit for use in Metropolitan Area Networks. A suitable solution for taking advantages of Ethernet benefits in service provider network is using Ethernet in access network and applying multi-point to multi-point... 

    Improving Quality of Service in Multimedia Wireless Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Malool, Iman (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Due to their specific characteristics such as huge data loads, heavy processes, various quality of service requirements (delay, jitter and reliability), multimedia streams have different necessities in comparison with normal data streams. The challenges of wireless sensor networks (process power, storage capacity and power limitations) add up to the challenges faced in WMSNs. In order to improve the quality of service in wireless multimedia sensor networks, attention must be paid to all the network layers. In this study improvement of quality of service is sought through the design of a protocol for the network layer of the wireless multimedia sensor network.
    This protocol tries to... 

    Long Lifetime Multipath Routing in Unreliable Wireless Multimedia Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Nikseresht, Ilnaz (Author) ; Movaghar Rahimabadi, Ali (Supervisor) ; Mehri, Bahman (Co-Advisor)
    Abstract
    Most of the current routing protocols in the WMSNs only consider the inter-path interference and not necessarily intra-path interference factor which is considered as one of the main causes of energy consumption in these networks. Among those protocols that consider this factor, none of them has ever come up with an algorithm capable of performing the routing without the need to use either the special hardware in the nodes (referred to as the GPS or directional antennas) or with the unrealistic assumption that the interference range is equal to the transmission range. The previously mentioned factors are critical in the sense that the former assumption results in more expensive sensor nodes... 

    XPS study of size effects of Fe3O4 nanoparticles on crosslinking degree of magnetic TFN membrane

    , Article Polymer Testing ; Volume 73 , 2019 , Pages 232-241 ; 01429418 (ISSN) Tayefeh, A ; Poursalehi, R ; Wiesner, M ; Mousavi, S. A ; Sharif University of Technology
    Elsevier Ltd  2019
    Abstract
    The control of thin film nanocomposite (TFN) membranes cross-linking degree is an important factor to design new membranes and optimizing permeation characteristics. The Fe3O4 nanoparticle's based TFN membranes due to potentially added magnetic responsive properties to the membrane has a great importance in developing membrane architectures. Fe3O4/polyamide (PA) TFN membranes filled with nanoparticles in different sizes and concentrations have been synthesized. Cross-linking degree of PA layer characterized with Fourier transform spectroscopy (FTIR) and x-ray photoelectron spectroscopy (XPS) methods to evaluate size dependency of the cross-linking degree of PA layer network. Obvious... 

    Towards performance evaluation of mobile ad hoc network protocols

    , Article Proceedings - International Conference on Application of Concurrency to System Design, ACSD, 21 June 2010 through 25 June 2010, Braga ; 2010 , Pages 85-92 ; 15504808 (ISSN) ; 9780769540665 (ISBN) Ghassemi, F ; Movaghar, A ; Fokkink, W ; Sharif University of Technology
    Abstract
    We present a formal framework to evaluate stochastic properties of MANET protocols. It captures the interplay between stochastic behavior of protocols deployed at different network layers, and the underlying dynamic topology. The link connectivity model, which implicitly models node mobility, specifies link up and down lifetimes. We use so-called constrained labeled multi-transition systems (CLMSs) to specify MANETs; transitions are annotated by network restrictions, capturing the topologies in which a transition is possible. A continuous Markov chain can be generated from a CLMS, to evaluate the performance of the corresponding MANET  

    Throughput analysis of IEEE 802.11 multi-hop wireless networks with routing consideration: A general framework

    , Article IEEE Transactions on Communications ; Volume 66, Issue 11 , 2018 , Pages 5430-5443 ; 00906778 (ISSN) Rezaei, S ; Gharib, M ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    The end-to-end throughput of multi-hop communication in wireless ad hoc networks is affected by the conflict between forwarding nodes. It has been shown that sending more packets than maximum achievable end-to-end throughput not only fails to increase throughput but also decreases throughput owing to high contention and collision. Accordingly, it is of crucial importance for a source node to know the maximum end-to-end throughput. The end-to-end throughput depends on multiple factors, such as physical layer limitations, medium access control (MAC) protocol properties, routing policy, and nodes' distribution. There have been many studies on analytical modeling of end-to-end throughput but... 

    The simulation of microbial enhanced oil recovery by using a two-layer perceptron neural network

    , Article Petroleum Science and Technology ; Vol. 32, Issue. 22 , 2014 , pp. 2700-2707 ; ISSN: 10916466 Morshedi, S ; Torkaman, M ; Sedaghat, M. H ; Ghazanfari M.H ; Sharif University of Technology
    Abstract
    The authors simulated a reservoir by using two-layer perceptron. Indeed a model was developed to simulate the increase in oil recovery caused by bacteria injection into an oil reservoir. This model was affected by reservoir temperature and amount of water injected into the reservoir for enhancing oil recovery. Comparing experimental and simulation results and also the erratic trend of data show that the neural networks have modeled this system properly. Considering the effects of nonlinear factors and their erratic and unknown impacts on recovered oil, the perceptron neural network can develop a proper model for oil recovery factor in various conditions. The neural networks have not been... 

    Stochastic restricted broadcast process theory

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 6977 LNCS , 2011 , Pages 72-86 ; 03029743 (ISSN) ; 9783642247484 (ISBN) Ghassemi, F ; Talebi, M ; Movaghar, A ; Fokkink, W ; Sharif University of Technology
    Abstract
    We provide a framework for modeling and analyzing both qualitative and quantitative aspects of mobile ad hoc network (MANET) protocols above the data-link layer. We extend Restricted Broadcast Process Theory [11,9]: delay functions are assigned to actions, while the semantics captures the interplay of a MANET protocol with stochastic behavior of the data-link and physical layer, and the dynamic topology. A continuous-time Markov chain is derived from our semantic model by resolving non-determinism, using the notion of weak Markovian network bisimilarity. The framework is applied to a leader election algorithm  

    Spectrally encoded code division multiple access-based cognitive relay networks

    , Article IET Communications ; Volume 9, Issue 12 , August , 2015 , Pages 1510-1521 ; 17518628 (ISSN) Najafi, S ; Shayesteh, M. G ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    Cognitive radio and cooperative networks are increasingly regarded as revolutionary technologies that utilise the radio spectrum efficiently. In this study, spectrally encoded (spread-time) code division multiple access (SE-CDMA) scheme is proposed as a flexible and adaptable technique for physical layer of cognitive relay networks. All primary and secondary users transmit their signals to a common base station (BS) and then the BS selects one of the cognitive secondary users based on feedback information to relay the primary user's (PU's) data. To study the efficiency of the system, two scenarios are considered. In the first scenario, the secondary users transmit their information using the... 

    SLoPCloud: an efficient solution for locality problem in peer-to-peer cloud systems

    , Article Algorithms ; Volume 11, Issue 10 , 2018 ; 19994893 (ISSN) Gharib, M ; Malekimajd, M ; Movaghar, A ; Sharif University of Technology
    Abstract
    Peer-to-Peer (P2P) cloud systems are becoming more popular due to the high computational capability, scalability, reliability, and efficient data sharing. However, sending and receiving a massive amount of data causes huge network traffic leading to significant communication delays. In P2P systems, a considerable amount of the mentioned traffic and delay is owing to the mismatch between the physical layer and the overlay layer, which is referred to as locality problem. To achieve higher performance and consequently resilience to failures, each peer has to make connections to geographically closer peers. To the best of our knowledge, locality problem is not considered in any well known P2P... 

    Simulation and optimization of pulsating heat pipe flat-plate solar collectors using neural networks and genetic algorithm: a semi-experimental investigation

    , Article Clean Technologies and Environmental Policy ; Volume 18, Issue 7 , 2016 , Pages 2251-2264 ; 1618954X (ISSN) Jalilian, M ; Kargarsharifabad, H ; Abbasi Godarzi, A ; Ghofrani, A ; Shafii, M. B ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    This research study presents an investigation on the behavior of a Pulsating Heat Pipe Flat-Plate Solar Collector (PHPFPSC) by artificial neural network method and an optimization of the parameters of the collector by genetic algorithm. In this study, several experiments were performed to study the effects of various evaporator lengths, filling ratios, inclination angles, solar radiation, and input chilled water temperature between 9:00 A.M. to 5:00 P.M., and the output temperature of the water tank, which was the output of the system, was also measured. According to the input and output information, multilayer perceptron neural network was trained and used to predict the behavior of the... 

    Secure transmission with covert requirement in untrusted relaying networks

    , Article 9th International Symposium on Telecommunication, IST 2018, 17 December 2018 through 19 December 2018 ; 2019 , Pages 670-675 ; 9781538682746 (ISBN) Forouzesh, M ; Azmi, P ; Kuhestani, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we investigate the problem of secure communication with covert requirement in untrusted relaying networks. Our considered system model contains one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current time slot. To overcome these two attacks, it is assumed that the destination and the source inject jamming signal to the network in phase I and phase II, respectively. Accordingly, the communication in our proposed system model is accomplished in two phases. In the first phase, when the source... 

    Secure overlay routing using key pre-distribution: A linear distance optimization approach

    , Article IEEE Transactions on Mobile Computing ; Volume 15, Issue 9 , 2016 , Pages 2333-2344 ; 15361233 (ISSN) Gharib, M ; Yousefi'zadeh, H ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Key pre-distribution algorithms have recently emerged as efficient alternatives of key management in today's secure communications landscape. Secure routing techniques using key pre-distribution algorithms require special algorithms capable of finding optimal secure overlay paths. To the best of our knowledge, the literature of key pre-distribution systems is still facing a major void in proposing optimal overlay routing algorithms. In the literature work, traditional routing algorithms are typically used twice to find a NETWORK layer path from the source node to the destination and then to find required cryptographic paths. In this paper, we model the problem of secure routing using... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    Resource allocation and multicast routing in elastic optical networks

    , Article IEEE Transactions on Communications ; Volume 65, Issue 5 , 2017 , Pages 2101-2113 ; 00906778 (ISSN) Moharrami, M ; Fallahpour, A ; Beyranvand, H ; Salehi, J. A ; Sharif University of Technology
    Abstract
    In this paper, we formulate an integer linear programming (ILP) to perform multicast routing and spectrum assignment (MRSA) in elastic optical networks, which serves jointly a set of multicast requests. In this formulation, all physical layer restrictions including modulation level assignment, maximum number of multicast capable nodes (MCNs), and maximum splitting degree (MSD) of MCNs, are considered. In addition, we modify the proposed joint ILP to serve multicast requests one-by-one, which is referred to as a separate ILP. Furthermore, we present three heuristic algorithms for MRSA, namely distance-based MRSA (DMRSA), congestion-based MRSA (CMRSA), and mixed CMRSA/DMRSA, which are... 

    Recent Trends, Challenges, and future aspects of p2p energy trading platforms in electrical-based networks considering blockchain technology: a roadmap toward environmental sustainability

    , Article Frontiers in Energy Research ; Volume 10 , 2022 ; 2296598X (ISSN) Javed, H ; Irfan, M ; Shehzad, M ; Abdul Muqeet, H ; Akhter, J ; Dagar, V ; Guerrero, J. M ; Sharif University of Technology
    Frontiers Media S.A  2022
    Abstract
    Peer-to-peer (P2P) energy trading platform is an upcoming energy generation and effective energy managing strategy that rewards proactive customers (acting as prosumers) in which individuals trade energy for products and services. On the other hand, P2P trading is expected to give multiple benefits to the grid in minimizing the peak load demand, energy consumption costs, and eliminating network losses. However, installing P2P energy trading on a broader level in electrical-based networks presents a number of modeling problems in physical and virtual network layers. As a result, this article presents a thorough examination of P2P studies of energy trade literature. An overview is given with... 

    Quality of service provisioning in optical CDMA packet networks

    , Article Journal of Optical Communications and Networking ; Volume 2, Issue 5 , 2010 , Pages 283-292 ; 19430620 (ISSN) Khaleghi, S ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    An enhanced media access control (MAC) layer protocol that uses the signaling method benefits of the physical layer in order to provide different levels of quality to different users in optical code-division multiple-access (OCDMA) packet networks is presented. In the proposed network architecture the users are categorized into two classes of service, one having a higher quality level and the other having a lower quality level. Users of each class transmit at the same power level and different from the other classes users. Also, the MAC of each user estimates the amount of interference on the channel and adjusts the packet transmissions time to improve network performance. Through simulation... 

    Quality of service in the network layer of vehicular Ad hoc networks

    , Article 2016 World Congress on Engineering and Computer Science, WCECS 2016, 19 October 2016 through 21 October 2016 ; Volume 2225 , 2016 , Pages 114-118 ; 20780958 (ISSN); 9789881404718 (ISBN) Tabar, S ; Najjar, L ; Gholamalitabar, M ; Sharif University of Technology
    Newswood Limited  2016
    Abstract
    Vehicular Ad-hoc Networks (VANET) has attracted a great deal of attention during the last decade. This type of wireless network is predicted to play a key role in future automotive innovation. VANET as a foundation for Intelligent Transportation System (ITS) promises many improvements in terms of safety, resource efficiency and passenger assistance services. Among these three main categories, safety applications are the most important ones because they deal with the lives of large numbers of people who drive every day. Safety applications are classified as real-time applications; they must act within a certain period of time, otherwise their implementation will be worthless. As a result,... 

    Proposing a hybrid protocol for secure wireless networks based on signcryption scheme

    , Article 2013 World Congress on Computer and Information Technology, WCCIT 2013 ; June , 2013 , Page(s): 1 - 6 ; 9781479904600 (ISBN) Darmian, N. R ; Oskoei, H. R. D ; Vazirnezhad, B ; Sharif University of Technology
    2013
    Abstract
    Considering the weaknesses of cryptography algorithms and the attacks performed against them, cryptography alone cannot guarantee the security of communication in a wireless network. With regard to the developments in wireless communication networks brought about by smart array antennas, security can be sought in the physical layer as well, aiming to restrict the access of the data in a wireless network and limit it to authorized users only in order to further restrain malicious data accesses. In this paper, we analysis a strategy for restricting data access using smart array antennas and present the results in security by a parameter called exposure region. For this strategy afterwards we... 

    Physics-informed neural network simulation of multiphase poroelasticity using stress-split sequential training

    , Article Computer Methods in Applied Mechanics and Engineering ; Volume 397 , 2022 ; 00457825 (ISSN) Haghighat, E ; Amini, D ; Juanes, R ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    Physics-informed neural networks (PINNs) have received significant attention as a unified framework for forward, inverse, and surrogate modeling of problems governed by partial differential equations (PDEs). Training PINNs for forward problems, however, pose significant challenges, mainly because of the complex non-convex and multi-objective loss function. In this work, we present a PINN approach to solving the equations of coupled flow and deformation in porous media for both single-phase and multiphase flow. To this end, we construct the solution space using multi-layer neural networks. Due to the dynamics of the problem, we find that incorporating multiple differential relations into the...