Loading...
Search for: throughput
0.008 seconds
Total 163 records

    A network coding-based packet forwarding scheme for unicast random access networks with exponential backoff

    , Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) Farhadi, F ; Ashtiani, F ; Sharif University of Technology
    2013
    Abstract
    Exponential backoff is an intrinsic feature of MAC-layer standards of most types of ad hoc networks. It leads to random access channels with memory. In this paper we propose a new network coding-based packet forwarding scheme suitable for multiple unicast scenarios in downlink direction of a wireless network. The wireless nodes as well as the access point attempt to access the channel, based on slotted Aloha with exponential backoff. In the proposed scheme we convert multiple unicast scenario to a combination of several anycast and a multicast scenarios. By proposing an open multiclass queueing network, we are able to derive the maximum stable download throughput of the network. The... 

    Stable throughput analysis for a cooperative WLAN with primary and secondary users

    , Article 2012 6th International Symposium on Telecommunications, IST 2012 ; 2012 , Pages 535-540 ; 9781467320733 (ISBN) Nazari, M. A ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we propose a new scenario in order to increase the total throughput of a WLAN. In this scenario, some secondary users (SUs) are considered in a primary WLAN such that SUs cooperate with primary users (PUs) in transmitting the primary packets. Each SU sends its packets as well as the primary packets collided at the access point, but overheard successfully at the SU, by random access the primary WLAN. We show that SUs cooperation is able to compensate their adverse effect in the WLAN, so total throughput in the WLAN increases without a significant degrading effect for the stability region of PUs. To this end, we use an analytical model based on open queueing networks. By solving... 

    An upper bound on the throughput for myopic policy in multi-channel opportunistic access

    , Article 2010 5th International Symposium on Telecommunications, IST 2010, 4 December 2010 through 6 December 2010 ; 2010 , Pages 29-32 ; 9781424481835 (ISBN) Salehkaleybar, S ; Majd, S. A ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    We study myopic sensing policy for an opportunistic communication system in which the states of channels evolve as independent Markov chains. A Secondary User (SU) takes one channel to sense and access in each time slot by myopic sensing policy. In the myopic policy, SU ignores the impact of the current action on the future decisions and tries to maximize the expected immediate reward. We propose an upper bound on the throughput achieved by the myopic sensing policy for general case in which channels have different Markov models. In particular, the proposed bound is compared with the Zhao et. al's upper bound (UZhao) for the channels with identical models. We prove that there are conditions... 

    Throughput analysis of multiple-access-relay channel based on rateless coding

    , Article 2010 5th International Symposium on Telecommunications, IST 2010, 4 December 2010 through 6 December 2010 ; 2010 , Pages 292-296 ; 9781424481835 (ISBN) Mansourifard, P ; Nasiri Kenari, M ; Sharif University of Technology
    Abstract
    In this paper, we consider a new scheme based on jointly network and rateless coding for a multiple-access relay channel. In the scheme, whenever the relay can decode multiple messages of the users, it jointly encodes them using a larger rateless code. This scheme is compared with direct transmission and the conventional relaying scheme in which the relay helps each user independently at orthogonal channels. The comparison is made by evaluating the throughput of different schemes. The analytical and the simulation results show that the proposed scheme outperforms the other ones at the cases considered  

    VLSI implementation of a WiMAX/LTE compliant low-complexity high-throughput soft-output K-best MIMO detector

    , Article ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems, 30 May 2010 through 2 June 2010, Paris ; 2010 , Pages 593-596 ; 9781424453085 (ISBN) Patel, D ; Smolyakov, V ; Shabany, M ; Gulak, P. G ; Sharif University of Technology
    2010
    Abstract
    This paper presents a VLSI architecture of a novel softoutput K-Best MIMO detector. The proposed detector attains low computational complexity using three improvement ideas: relevant discarded paths selection, last stage on-demand expansion, and relaxed LLR computation. A deeply pipelined architecture for a soft-output MIMO detector is implemented for a 4x4 64-QAM MIMO system realizing a peak throughput of 655Mbps, while consuming 174K gates and 195mW in 0.13um CMOS. Synthesis results in 65nm CMOS show the potential to support a sustained throughput up to 2Gbps achieving the data rates envisioned by emerging IEEE 802.16m and LTE-Advanced wireless standards  

    Effect of power randomization on saturation throughput of IEEE 802.11 WLAN

    , Article IEEE International Conference on Communications, 23 May 2010 through 27 May 2010, Cape Town ; 2010 ; 05361486 (ISSN) ; 9781424464043 (ISBN) Sahraei, S ; Ashtiani, F ; Sharif University of Technology
    2010
    Abstract
    In this paper, we evaluate the saturation throughput for an IEEE 802.11 based wireless network considering capture effect at the receiver, while nodes transmit with random powers. In this respect, we consider a scenario consisting of a specific number of wireless nodes. Then, we derive the transmission as well as collision probabilities with respect to the perfect capture effect. In order to maximize the saturation throughput we set up an optimization problem and obtain how to compute optimum values for the probabilities corresponding to different power levels. By providing the numerical results, we deduce that power randomization may lead to a significant improvement in saturation... 

    Stability, rate, and delay analysis of single bottleneck caching networks

    , Article IEEE Transactions on Communications ; Volume 64, Issue 1 , 2016 , Pages 300-313 ; 00906778 (ISSN) Rezaei, F ; Hossein Khalaj, B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Caching has been widely considered an efficient way of reducing and balancing the growing traffic in communications networks in recent years. The cache network of interest consists of one content server connected via a shared link to a number of caching nodes, also known as a single bottleneck caching network. In this paper, for the first time, the stochastic requests traffic model in such networks is considered and a performance analysis is provided based on such a realistic assumption. In addition, we introduce new comprehensive performance metrics, which simultaneously take into account, the cache hit probability, load on the bottleneck link, and requests arrival rates. The main... 

    An online transmission policy for energy harvesting systems with data traffic arrival

    , Article IWCIT 2016 - Iran Workshop on Communication and Information Theory, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) Rezaee, M ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In communications, the nodes with the ability of harvesting energy potentially can prolong the overall network lifetime. In this paper, we consider a single-user energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. Our goal is to find an online algorithm for the throughput maximization problem, which only needs the causal information of the arrival processes. We propose a heuristic online algorithm which is efficient for both discrete and continuous models, even when the distributions of harvested energy and arrival data are unknown  

    Modeling and Analysis of Two Wireless Networks with Opportunistic and Primary Spectrum Access

    , M.Sc. Thesis Sharif University of Technology Moradian, Masoumeh (Author) ; Ashtiani, Farid (Supervisor) ; Nasiri Kenari, Masoumeh (Supervisor)
    Abstract
    In this thesis, we propose an analytical model to evaluate the maximum stable throughput of a cognitive IEEE 802.11-based WLAN overlaid on a cellular network. In the considered scenario, the secondary nodes operate in uplink frequency band of primary network and transmit on their own idle detected primary channels using OFDM technique. The activity of primary nodes is modeled independently by ON-OFF alternating states with negative exponential distributed durations. The main feature of the proposed analytical model is to include different status of the secondary users, i.e., different spectrum opportunities for different cognitive users, as the result of dynamic nature of primary users as... 

    Dynamic Spectrum Sharing in Wireless Mesh Networks for Throughput Enhancement

    , M.Sc. Thesis Sharif University of Technology Darchini Maragheh, Kamaloddin (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    Having special advantages over existing networks, mesh networks have attracted much attention. Proposing new MAC protocols which are in compliance with these networks is an interesting field in which many works have been done. Also, Task Group S of the IEEE802.11 is going to release a standard for the mesh networks. Analysis of a simplified version of IEEE802.11s is the first goal of this thesis. The standard is a spectrum sharing algorithm based on scheduling and contention. Although IEEE802.11e manages the contention for accessing the wireless medium in the standard, but for the sake of simplicity, in this thesis we used SlottedALOHA instead. Also, one gateway and six other nodes are... 

    Throughput Analysis of a Cognitive Multi-hop Wireless Network Overlaid on a Cellular Network

    , M.Sc. Thesis Sharif University of Technology Soleimani, Hosein (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    In this thesis, we evaluate the maximum stable throughput of a cognitive multi-hop IEEE 802.11-based WLAN overlaid on a cellular network. In the considered scenario, the secondary users operate in the downlink or uplink frequency band of primary network and transmit their data in free primary channels using OFDM technique. The activity of primary nodes is modeled independently by ON-OFF alternating states. To model the scenario, each secondary user is modeled with an open queueing network. The queueing network can model the transmission of data as well as the effect of primary users. By writing the traffic equations of the queueing network and applying the stability conditions, we are able... 

    Network Coding-based Packet Relaying in Wireless Networks

    , M.Sc. Thesis Sharif University of Technology Farhadi, Farzaneh (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    In this thesis, we propose two new network coding-based packet relaying schemes suitable for multiple unicast scenarios in a random access network. In such networks the channels may have memory dependent upon the random access scheme. Thus, the optimal scheme for memoryless channels reported recently in the literature is not necessarily optimal in random access networks. In our proposed schemes, we convert a multiple unicast scenario to a combination of multiple anycast and a few multicast scenarios. By such an approach, we exploit the channels between relay node and the other nodes, instead of using only one channel at each packet transmission, for as many as possible. By simple analytical... 

    An Alert Correlation System with the Throughput of Multi-Thousands Events per Second

    , M.Sc. Thesis Sharif University of Technology Mirheidari, Ali (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    With the growing deployment of host and network intrusion detection systems, analyzing generated alerts from these systems becomes critically important and challenging due to its complexity and high amount of data. Alert Correlation systems are a possible solution for deep analysis of incoming alerts in response to potential attacks against enterprise networks. Although several known alert correlation systems have been proposed for this purpose so far, most of them do not support high amount of input due to their centralized architecture. In this thesis, we propose a system architecture and approach for alert correlation to be extensible, flexible, and modular. The architecture encompasses... 

    Analytical and learning-based spectrum sensing time optimisation in cognitive radio systems

    , Article IET Communications ; Volume 7, Issue 5 , 2013 , Pages 480-489 ; 17518628 (ISSN) Shokri Ghadikolaei, H ; Abdi, Y ; Nasiri Kenari, M ; Sharif University of Technology
    2013
    Abstract
    In this study, the average throughput maximisation of a secondary user (SU) by optimising its spectrum sensing time is formulated, assuming that a priori knowledge of the presence and absence probabilities of the primary users (PUs) is available. The energy consumed to find a transmission opportunity is evaluated, and a discussion on the impacts of the number of PUs on SU throughput and consumed energy are presented. To avoid the challenges associated with the analytical method, as a second solution, a systematic adaptive neural network-based sensing time optimisation approach is also proposed. The proposed scheme is able to find the optimum value of the channel sensing time without any... 

    Estimation of the logit model for the online contraflow problem

    , Article Transport ; Volume 25, Issue 4 , 2010 , Pages 433-441 ; 16484142 (ISSN) Nassiri, H ; Edrissi, A ; Alibabai, H ; Sharif University of Technology
    Abstract
    Contraflow or lane reversal is an efficient way for increasing the outbound capacity of a network by reversing the direction of in-bound roads during evacuations. Hence, it can be considered as a potential remedy for solving congestion problems during evacuation in the context of homeland security, natural disasters and urban evacuations, especially in response to an expected disaster. Most of the contraflow studies are performed offline, thus strategies are generated beforehand for future implementation. Online contraflow models, however, would be often computationally demanding and time-consuming. This study contributes to the state of the art of contraflow modelling in two regards. First,... 

    Quantifying the difference in resource demand among classic and modern NoC workloads

    , Article Proceedings of the 34th IEEE International Conference on Computer Design, ICCD 2016, 2 October 2016 through 5 October 2016 ; 2016 , Pages 404-407 ; 9781509051427 (ISBN) Mirhosseini, A ; Sadrosadati, M ; Zare, M ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    This paper quantifies the difference in resource demand between modern and classic NoC workloads. In the paper, we show that modern workloads are able to better utilize higher numbers of VCs and smaller C factors in order to attain performance and energy efficiency. This is because of the high throughput and possible local congestions in their traffic pattern. As a result, such workloads are more suitable for concurrency and redundancy energy reduction techniques where the voltage and frequency are reduced simultaneously and the increased power budget is used for introducing additional resources to the network in order to improve the performance  

    High throughput solution exchange of microparticles using magnetophoresis in curved microchannels

    , Article 21st International Conference on Miniaturized Systems for Chemistry and Life Sciences, MicroTAS 2017, 22 October 2017 through 26 October 2017 ; 2020 , Pages 1324-1325 Bayat, P ; Zareian, S ; Rezai, P ; The Chemical and Biological Microsystems Society (CBMS) ; Sharif University of Technology
    Chemical and Biological Microsystems Society  2020
    Abstract
    A novel method involving focusing of magnetic particles at the inner wall of a curved microchannel and secondary Dean flow-based exchange of their fluid was investigated. Solution exchange occurred in a hybrid microchip at very high throughput and with unprecedented solution exchange and particle isolation efficiencies of 99.2% and 90%, respectively. © 17CBMS-0001  

    A new pipeline implementation of an adaptive IIR filter for noise reduction application

    , Article IEEE International Symposium on Communications and Information Technologies: Smart Info-Media Systems, ISCIT 2004, Sapporo, 26 October 2004 through 29 October 2004 ; Volume 1 , 2004 , Pages 577-581 ; 0780385934 (ISBN) Golmohammadi, A ; Manzuri, M. T ; Ayat, S ; Sharif University of Technology
    2004
    Abstract
    the parallel form in adaptive HR filtering is an efficient realization that provides robust stability monitoring with less complexity than that of the direct form. This paper presents an implementation of two line parallel structure employing a real orthogonal transform and real coefficients second-order section as sub filters on FPGA. Architecture that is implemented is in pipeline fashion and it is independent from its building blocks and they may have its own implementation or in other system numbering. In the last section, we compared throughput of our architecture with a Ti DSP (TMS320C3x/4x), the results show that this architecture works better than the DSP  

    TCP retransmission timer adjustment mechanism using model-based RTT predictor

    , Article 2004 5th Asian Control Conference, Melbourne, 20 July 2004 through 23 July 2004 ; Volume 1 , 2004 , Pages 686-693 ; 0780388739 (ISBN) Haeri, M ; Mohsenian Rad, A. H ; Sharif University of Technology
    2004
    Abstract
    Transmission Control Protocol (TCP) uses multiple timers to do its work. The most important of these is the retransmission timer. In this paper, the TCP retransmission timer adjustment mechanism is approached from a system point of view and a new mechanism is proposed. A simple recursive system identification algorithm is used to capture both time variant and time invariant Internet behavior. Also a dynamic model-based Round-Trip Time (RTT) predictor was provided. Based on network simulation and real Internet data collection, it was observed that when the retransmission timer is adjusted by the proposed predictor instead of the traditional RTT estimator, performance increased significantly  

    Saturation throughput analysis of a cognitive IEEE 802.11-based WLAN overlaid on an IEEE 802.16e WiMAX

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 9 September 2012 through 12 September 2012 ; September , 2012 , Pages 1515-1520 ; 9781467325691 (ISBN) Rahimzadeh, P ; Moradian, M ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we focus on a cognitive network scenario, comprised of a WLAN overlaid on a network with time-scheduled primary users. WiMAX is an example of such primary networks. For time-scheduled primary users simple On-Off traffic model with exponential durations is not valid anymore. In this scenario, the cognitive nodes (CNs) hear downlink map (DL-MAP) and thus, know the frequency and time locations of all allocated slots at each frame. Then, cognitive nodes contend with each other in order to transmit their fixed size packets based on IEEE 802.11 MAC protocol. Since the number of empty slots at each frame is variable each packet transmission in cognitive network prolongs a random...