Loading...
Search for: distributed-computer-systems
0.012 seconds
Total 133 records

    Modeling topological characteristics of BitTorrent-like peer-to-peer networks

    , Article IEEE Communications Letters ; Volume 15, Issue 8 , August , 2011 , Pages 896-898 ; 10897798 (ISSN) Farzad, A ; Rabiee, H. R ; Sharif University of Technology
    2011
    Abstract
    This letter presents a complex network model for the BitTorrent; the most popular peer-to-peer network. Three important topological characteristics; (i) degree distribution, (ii) clustering coefficient and (iii) average path length of this network are analytically modeled. The analytical computations are confirmed by simulations. Moreover, the accuracy of the proposed model was confirmed by exploiting a BitTorrent simulator  

    Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks

    , Article 2011 IEEE Consumer Communications and Networking Conference, CCNC'2011, 8 January 2011 through 11 January 2011, Las Vegas, NV ; 2011 , Pages 163-165 ; 9781424487905 (ISBN) Tootaghaj, D. Z ; Farhat, F ; Pakravan, M. R ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to... 

    Hybrid CDN-P2P architectures for live video streaming: Comparative study of connected and unconnected meshes

    , Article 2011 International Symposium on Computer Networks and Distributed Systems, CNDS 2011, 23 February 2011 through 24 February 2011, Tehran ; 2011 , Pages 175-180 ; 9781424491544 (ISBN) Seyyedi, S. M. Y ; Akbari, B ; Sharif University of Technology
    2011
    Abstract
    There are two main scalable methods for streaming live video over the Internet: Content Delivery Networks (CDNs) and Peer-to-Peer (P2P) networks. Though both have their own problems, P2P streaming systems challenge delivering video with constant quality and CDNs approaches require deployment of large number of servers throughout the Internet that is costly. Recently, using hybrid architectures based on both CDN and P2P networks has shown to be an efficient approach for large-scale video distribution over the Internet. This paper is compared the performance of two main hybrid CDN-P2P architectures includes: (i) CDN-P2P unconnected mesh in which independent P2P mesh networks are constructed... 

    An efficient distributed group key management using hierarchical approach with Diffie-Hellman and symmetric algorithm: DHSA

    , Article 2011 International Symposium on Computer Networks and Distributed Systems, CNDS 2011, 23 February 2011 through 24 February 2011, Tehran ; 2011 , Pages 49-54 ; 9781424491544 (ISBN) Mortazavi, S. A ; Pour, A. N ; Kato, T ; Sharif University of Technology
    2011
    Abstract
    This paper proposes an efficient many-to-many group key management protocol in distributed group communication. In this protocol, group members are managed in the hierarchical manner logically. Two kinds of keys are used, asymmetric and symmetric keys. The leaf nodes in the key tree are the asymmetric keys of the corresponding group members and all the intermediate node keys are symmetric keys assigned to each intermediate node. For asymmetric key, Diffie-Hellman key agreement is introduced. To calculate intermediate node keys, members use codes assigned to each intermediate node key tree. Group members calculate intermediate node keys rather than distributed by a sponsor member. The... 

    PAM: A packet manipulation mechanism for mitigating crosstalk faults in NoCs

    , Article Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, 26 October 2015 through 28 October 2015 ; October , 2015 , Pages 1895-1902 ; 9781509001545 (ISBN) Shirmohammadi, Z ; Ansari, M ; Abharian, S. K ; Safari, S ; Miremadi, S. G ; Atzori L ; Jin X ; Jarvis S ; Liu L ; Calvo R. A ; Hu J ; Min G ; Georgalas N ; Wu Y ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    This paper proposes an efficient mechanism that mitigates crosstalk faults in Network-on-Chips (NoCs). This is done by using a Packet Manipulating mechanism called PAM for reliable data transfer of NoCs. PAM investigates the transitions of a packet to minimize the forbidden transition patterns appearing during the flit traversal in NoCs. To do this, the content of a packet is manipulated using three different manipulating mechanisms. In other words, PAM manipulates the content of packet in three manipulating modes including: vertical, horizontal and diagonal modes. Then, comparing the transitions of these manipulating mechanisms, a packet with minimum numbers of transitions is selected to be... 

    Modeling and optimization of a network of energy hubs to improve economic and emission considerations

    , Article Energy ; Volume 93 , December , 2015 , Pages 2546-2558 ; 03605442 (ISSN) Maroufmashat, A ; Elkamel, A ; Fowler, M ; Sattari, S ; Roshandel, R ; Hajimiragha, A ; Walker, S ; Entchev, E ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Energy hubs that incorporate a variety of energy generation and energy transformation technologies can be used to provide the energy storage needed to enable the efficient operation of a ‘smart energy network’. When these hubs are combined as a network and allowed to exchange energy, they create efficiency advantages in both financial and environmental performance. Further, the interconnectedness of the energy network design provides an added layer of reliability. In this paper, a complex network of energy hubs is modeled and optimized under different scenarios to examine both the financial viability and potential reduction of greenhouse gas emissions. Two case studies consisting of two and... 

    Power- and performance-efficient cluster-based network-on-chip with reconfigurable topology

    , Article Microprocessors and Microsystems ; April , 2016 ; 01419331 (ISSN) Mehrvarzy, P ; Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    Elsevier  2016
    Abstract
    Topology is widely known as the most important characteristic of networks-on-chip (NoC), since it highly affects overall network performance, cost, and power consumption. In this paper, we propose a reconfigurable architecture and design flow for NoCs on which a customized topology for any target application can be implemented. In this structure, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a mesh to benefit from the interesting characteristics of the mesh topology, i.e. regular structure and efficient handling of local traffic. A reconfigurable inter-cluster topology then eliminates the... 

    Feature-based content dissemination process in opportunistic networks

    , Article 26th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015, 30 August 2015 through 2 September 2015 ; Volume 2015-December , 2015 , Pages 1464-1469 ; 9781467367820 (ISBN) Zehni, M ; Elhami, G ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    In order to respond to drastically increased traffic demands in mobile networks such as cellulars, opportunistic communication has been introduced as a data offloading strategy. Delivering the contents using peer-to-peer data dissemination is more preferable compared to epidemic diffusion schemes. To implement peer-to-peer dissemination, one needs to define the peer selection and content dissemination policies. Efficient content dissemination relies on the selection of suitable peers. Besides that, the peers require to choose what contents to be transmitted between them. In this paper, we propose multi-level master/slave peer selection algorithm (MMSA) and variance-based multi-metric chunk... 

    Energy-efficient manycast routing and spectrum assignment in elastic optical networks for cloud computing environment

    , Article Journal of Lightwave Technology ; Volume 33, Issue 19 , July , 2015 , Pages 4008-4018 ; 07338724 (ISSN) Fallahpour, A ; Beyranvand, H ; Salehi, J. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, we present an energy-efficient manycast routing and spectrum assignment (EEM-RSA) algorithm in elastic optical networks supporting cloud computing applications. The proposed EEM-RSA is adapted for both static and dynamic scenarios. First, an integer linear programing formulation is derived for energy-efficient manycasting and spectrum assignment; then, the corresponding heuristic methods are proposed. To reduce the energy consumption, inactive (idle) elements are turned off, and in the proposed energy-efficient manycasting heuristic, the number of activated elements are minimized. The power consumption of network elements is modeled by considering a constant overhead for the... 

    S2AP: An efficient numerical-based crosstalk avoidance code for reliable data transfer of NoCs

    , Article 10th International Symposium on Reconfigurable and Communication-centric Systems-on-Chip,, 29 June 2015 through 1 July 2015 ; June , 2015 , Page(s): 1 - 6 ; 9781467379427 (ISBN) Shirmohammadi, Z ; Miremadi, S. G ; Janssen K ; DFG ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Data traversal in Network-on-Chips (NoCs) is threated by crosstalk fault seriously. Crosstalk fault leads to mutual influence between adjacent wires of NoCs and as a result endangers the reliability of data in NoCs. Crosstalk fault is strongly dependent on the transition patterns appearing on the wires of NoCs. Among these transitions, Triplet Opposite Directions (TODs) impose the worse crosstalk effects to the wires of NoCs. This paper proposes an efficient numerical-based coding mechanism called Summation-based-Subtracted-Added-Penultimate (S2AP) which alleviates crosstalk faults. This is done by completely removing TODs which are the main source of crosstalk faults in the channels of... 

    OPAIC: An optimization technique to improve energy consumption and performance in application specific network on chips

    , Article Measurement: Journal of the International Measurement Confederation ; Volume 74 , 2015 , Pages 208-220 ; 02632241 (ISSN) Taassori, M ; Taassori, M ; Niroomand, S ; Vizvári, B ; Uysal, S ; Hadi Vencheh, A ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Abstract Network on Chip (NoC) is an appropriate and scalable solution for today's System on Chips (SoCs) with the high communication demands. Application specific NoCs is preferable since they can be customized to optimize all requirements of the specific applications. This paper presents an OPtimization technique for Application specifIC NoCs (OPAIC), which aims not only to decrease the energy consumption but also to improve the area of NoCs. OPAIC is composed of three stages to find the optimum NoC; in the first stage, it uses a linearized form of a Quadratic Assignment Problem (QAP) to map tasks on cores to minimize the energy. In the second stage, a Mixed Integer Linear Problem (MILP)... 

    Cloud-Based Global Supply Chain: A Conceptual Model and Multilayer Architecture

    , Article Journal of Manufacturing Science and Engineering, Transactions of the ASME ; Volume 137, Issue 4 , 2015 ; 10871357 (ISSN) Akbaripour, H ; Houshmand, M ; Valilai, O. F ; Sharif University of Technology
    American Society of Mechanical Engineers (ASME)  2015
    Abstract
    The cloud manufacturing (C-Manufacturing) paradigm, as an advanced form of networked manufacturing, has recently been proposed based on a combination of existing manufacturing systems and emerging technologies, such as cloud computing, virtual manufacturing, agile manufacturing, manufacturing grid, Internet-of-things (IOT), and service-oriented technologies. In this study, through investigating the main goals of C-Manufacturing and today's hyper-competitive global marketplace circumstances, a prospective conceptual model called cloud-based global supply chain (CBGSC) has been developed which can overcome or mitigate the issues and risks associated with supply chain processes on a global... 

    Fault injection into verilog models for dependability evaluation of digital systems

    , Article Proceedings - 2nd International Symposium on Parallel and Distributed Computing, ISPDC 2003, 13 October 2003 through 14 October 2003 ; October , 2015 , Pages 281-287 ; 0769520693 (ISBN) ; 9780769520698 (ISBN) Zarandi, H. R ; Miremadi, S. G ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    This paper presents transient and permanent fault injection into Verilog models of digital systems during the design phase by a developed simulation-based fault injection tool called INJECT. With this fault injection tool, it is possible to inject crucial fault models in all abstraction levels (such as swith-level) supported by Verilog HDL. Several fault models for injecting into Verilog models are specified and described. Analyzing the results obtained from the fault injections, using INJECT enables system designers to inform from dependable parameters, such as fault latency, propagation and coverage. As a case study, a 32-bit processor, namely DP32, has been evaluated and effects of faults... 

    Peer-to-Peer Compressive Sensing for Network Monitoring

    , Article IEEE Communications Letters ; Volume 19, Issue 1 , September , 2015 , Pages 38-41 ; 10897798 (ISSN) Fattaholmanan, A ; Rabiee, H. R ; Siyari, P ; Soltani Farani, A ; Khodadadi, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Monitoring large-scale networks is a critical yet challenging task. Enormous number of nodes and links, limited power, and lack of direct access to the entire network are the most important difficulties. In applications such as network routing, where all nodes need to monitor the status of the entire network, the situation is even worse. In this letter, a collaborative model in which nodes pick up information from measurements generated by other nodes is proposed. Using this model, for the first time, an upper bound is derived for the number of measurements that each node must generate, such that the expected number of measurements observed by each node is sufficient to provide a global view... 

    K-nearest neighbor search in peer-to-peer systems

    , Article AP2PS 2010 - 2nd International Conference on Advances in P2P Systems ; 2010 , Pages 100-105 ; 9781612081021 (ISBN) Mashayekhi, H ; Habibi, J ; Sharif University of Technology
    Abstract
    Data classification in large scale systems, such as peer-to-peer networks, can be very communication-expensive and impractical due to the huge amount of available data and lack of central control. Frequent data updates pose even more difficulties when applying existing classification techniques in peer-to-peer networks. We propose a distributed, scalable and robust classification algorithm based on k-nearest neighbor estimation. Our algorithm is asynchronous, considers data updates and imposes low communication overhead. The proposed method uses a content based overlay structure to organize data and moderate the number of query messages propagated in the network. Simulation results show that... 

    LiveCod: A mesh-pull P2P live streaming system with XOR-based network coding

    , Article 2010 IEEE Globecom Workshops, GC'10 ; 2010 , Pages 436-441 ; 9781424488650 (ISBN) Ayatollahi Tabatabaii, S. H ; Khansari, M ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    This paper presents a mesh-pull peer-to-peer (P2P) live video streaming system. The proposed XOR-based Network Coding (XOR-NC) system is based on GIA protocol and introduces new search and answer data formats for chunks which are used by the network coding algorithm for exchanging data among peers. The search message contains the XORed GOP (Group of Picture) keys and some meta-data such as search key. The answer message, however, has the XORed GOP data and a summary of video blocks of the encoded GOP. In order to reduce the encoding complexity at each peer, a new content-based cache (CCache) is also introduced. Comparison of LiveCod with traditional GIA and GIA with random network coding... 

    Passive worm and malware detection in peer-to-peer networks

    , Article Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010, 11 December 2010 through 13 December 2010 ; 2010 , Pages 561-565 ; 9780769543222 (ISBN) Fahimian, S ; Movahed, A ; Kharrazi, M ; Sharif University of Technology
    Abstract
    Today P2P networks are responsible for a large amount of traffic on the Internet, as many Internet users employ such networks for content distribution. At the same time, P2P networks are vulnerable to security threats such as Internet worms and facilitate their propagation. Internet worms and more generally malware are a major concern to the network security community. There are many different type of worms in the wild, mostly categorized based on how they find and infect their new victims (i.e. active, passive, etc.). In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network. As part of our... 

    On the effect of random network coding in GIA-based P2P live video streaming systems

    , Article 2010 5th International Symposium on Telecommunications, IST 2010, 4 December 2010 through 6 December 2010 ; 2010 , Pages 657-662 ; 9781424481835 (ISBN) Ayatollahi Tabatabaii, H. S ; Khansari, M ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    Recently it has been shown that network coding can highly improve the network throughput in the communication systems and specifically increase the downloading performance in P2P networks. This paper presents a new live streaming system for GIA-based P2P networks. In the proposed system the traditional GIA protocol is improved for an efficient use in multimedia applications. We introduce a new mesh-pull layered video streaming framework for GIA-based systems and employ random network coding to improve the network performance. Random network coding algorithm enables each peer to send a single encoded video chunk instead of multiple video blocks toward the destination node and save its... 

    A hybrid mesh-tree peer-to-peer overlay structure for layered video streaming

    , Article 2010 5th International Symposium on Telecommunications, IST 2010, 4 December 2010 through 6 December 2010, Tehran ; 2010 , Pages 706-709 ; 9781424481835 (ISBN) Tahghigh Jahromi, N ; Akbari, B ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Due to complicated implementation of IP multicast, application layer multicast has attracted the attention of researchers. Tree overlay has some challenges such as resiliency problems caused by peer churns and also network resources may not be efficiently used. Mesh overlay doesn't have such problems, but has a high delivery latency and overhead caused by pull mechanism. Using a hybrid mesh/tree overlay offers push pull approach and leads to use the advantages of both overlays simultaneously. Also in p2p networks a significant problem is heterogeneity of peers. In this paper we propose a hybrid mesh/tree overlay that by means of streaming layered coded video, addresses these challenges. This... 

    A distributed measurement system for internet delay estimation

    , Article 2010 IEEE International Instrumentation and Measurement Technology Conference, I2MTC 2010 - Proceedings, 3 May 2010 through 6 May 2010 ; May , 2010 , Pages 1556-1560 ; 9781424428335 (ISBN) Hariri, N ; Hariri, B ; Shirmohammadi, S ; Sharif University of Technology
    2010
    Abstract
    predicting the latency between hosts in the internet can play a significant rolein the improvement of the performance of many services that use latency distances among hosts as a decision making input. Although, the information regarding the point to point delay among internet peers is required in many applications, such information is not easily available to the peers. Latency data acquisition requires a considerableamount of measurements to be performed at each node in order for that node to keep a recordof its latency to all the other nodes. Moreover, the measurements need to be regularly repeated in order to be updatedagainst the network dynamics where the latency values are frequently...