Loading...
Search for:
jahangir--amir-hossein
0.163 seconds
Total 2231 records
Analysis and Evaluation of Routing Protocols Conformance Test
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, one of the problems of network designers and users is the correctness of network equipment functionality. Since routers play an important role in information transfer between various networks and communicate with each other through a routing protocol, any violation of such protocol can result in the network's failure or defective transfer of data. Thus, being assured of the conformance of the implemented protocol in a router with what has been defined in the protocol's standard is of great significance. To this end, before using or exposing a router, network equipment testers should run protocol conformance tests on it and insure its correct functionality. This brings up the...
Network Traffic Analyzer
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In order to increase the network performance, to discover network security threats, to guarantee the quality of services, to simulate networks and develop new network protocols, network designers and operators need software tools to analyze the network traffic. The first step to do this analysis is network monitoring. This can be done by using various software and hardware tools.
In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters....
In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters....
Analysis and Evaluation of Real Timeliness and Safety of VANET
,
M.Sc. Thesis
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
The increasing number of road accidents and fatalities have yielded the introduction of several solutions by related industries such as automobile manufacture. Proposed solutions can be classified into two categories: passive, such as airbags, and active such as ABS ad ITS-based technologies. Inter vehicles communication let the communication between vehicles(V2V) or between vehicles and road infrastructure (V2I) by relying on DSRC technology and standards. Intelligent Transportation System (ITS) has three main types of applications namely safety, traffic and commercial. Safety applications are the main goal of vehicular communication, and real time guarantee in safety applications is so...
An Efficient Approach for Improving the Performance of Real-time Flow Routing in SDN Controllers
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In real-time systems, jobs that miss their deadline are considered worthless or ineffective. Nowadays, real-time applications (such as multimedia) that communicate through software-defined networks (SDN) are widely used and will continue to expand in the future. SDN is an emerging network architecture in which control plane is separated from data plane to manage it directly. In this research, we make changes to the controller and the switch used in such network to deliver real time packets or real-time flows (such as video) on time, as much as possible. As missed deadline packets are worthless and they waste bandwidth, dropping them is a solution. Moreover, the controller can drop flows that...
Reconfigurable Architecture For Cryptanalysis Applications
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, the significance of securing data and information is undeniable. Cryptography is being used to provide data security. In addition, cryptanalysis is required to evaluate the effectiveness of cryptography methods, and hence, it is an essential concept for securing data. In general, the cryptography functions shall be designed in a way to impose a high load of time-intensive operations to prevent an adversary from accessing the main data from the encrypted data. As a result, cryptography and cryptanalysis algorithms need high performance computations. So far, a number of methods have been proposed to support the required performance. These methods include: distributed computing and...
Performance Ehancement of Congestion Control Algorithm Through Traffic Flow Istinction
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Congestion is an important issue in the network environment. To keep stable the perfor-mance of the network, congestion control algorithms have been extensively studied. Queue management method employed by the routers is one of the important issues in the congestion control study. Active Queue Management (AQM) has been proposed for early detection of congestion inside the network. AQM mechanisms control the queue length in a router by dropping arriving packets. The Random Early Detection (RED) is the most popular AQM mechanism used in routers on the Intenet to allow network users to simultaneously achieve high throughput and low average delay. The RED algorithm may cause heavy oscillation of...
Modeling and Analysis of Real-time Behaviour of Wireless Sensor Networks
,
Ph.D. Dissertation
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
Nowadays, information gathering based on wireless sensor network (WSN) has formed various applications and it also seems to be spreading more in future. Wireless sensor network, is a network composed of multiple nodes, without any infrastructure, each having one or more sensors, wireless communications unit, processing unit, memory, and power supply. Memory capacity, computation power, and power supply are usually considered as valuable resources and limited in nodes. Most of sensor nodes are located in a dense mode and they are susceptible to failure. Therefore network topology may vary dynamically. A sensor network can support real-time communications independent of its type of structure...
Suitable Architecture Selection for Protocol Identification
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Protocol identification and reverse engineering have recently received much attention due to their importance in many communication and security applications. In this field, the main challenges are: protocol identification, clustering unknown protocols, extracting protocol fields, and finding the protocol format based on these fields and their relations. Most of the proposed methods for the first two parts (protocol identification and clustering) use machine learning and AI techniques. For the last part, some bioinformatics techniques like sequence alignment algorithms are used. In this thesis, after reviewing different methods for protocol identification and reverse engineering, some...
Design of Realistic Network Traffic Generator and Traffic Anomalies
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Generating realistic network traffic serves capacity planning, traffic engineering, understanding internet service performance and anomaly detection. A useful traffic generator must generate characteristics in flows and packets, and add known internet anomalies to legitimate traffic. In this dissertation, we develop a tool for generating realistic and anomalous traffic. This generator can generate traffic in a scalable, reproducible and stochastic manner. Two methods are proposed for this purpose. In the first method, the traffic is generated according to statistical distribution of packets and flow charactristics. In the second method, traffic is generated by modeling the behavior of...
Estimation of Network Parameters for use in Congestion Control Algorithm
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Many congestion control protocols proposed so far to alleviate the problems encountered by TCP protocol in high-speed networks and wireless links have to estimate the parameters of the network. For example, the TCP WESTWOOD congestion window is adjusted based on available bandwidth estimation, or TCP Vegas detects the congestion status based on RTT (Round Trip Time) estimation, and XCP protocol operates according to network traffic load. In this paper, we proposed a novel estimation algorithm that is based on burst identification techniques in router. we show through analysis and simulation that during burst periods this method can estimate the congestion window size of the specific flow...
A New Algorithm for Partitioning Problem in Hardware/Software Codesign
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
We use an abstract model to perform hardware/software partitioning for embedded systems. The complexity of partitioning problem in the model is studied and we use a scheme to overcome its NP-Hardness. Partitioning problem can be considered as the main phase of high level synthesis. As it suffers from complexity, heuristic search methods are generally used to overcome its complexity. In this thesis we present a heuristic method (named Tendency algorithm) to increase the performance of heuristic searches, and use it in parallel with other tuning methods. We defind suitable initial point(s) for heuristic searches instead of tuning heuristic parameters. The thesis justifies the logic behind...
Distinguishing DDoS Attacks from Flash Crowds
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Distributed Denial of Service attacks are threats that target availability of network resources. One feature of this type of attacks is high volume of traffic or service request from huge number of illegitimate attackers that organize botnets together, which cause performance decrease of network. Nowadays, distinguishing huge number of legitimate users during Flash Crowd is one of the most challenging issues for network security experts. Most of proposed methods so far, did not have enough performance or were only applicable in short term, due to increasing attackers’ knowledge in mimicking legitimate users behavior. Methods based on extracting statistic features usually, have better...
Enhancing Scalability in Software-defined Networks
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Software Defined Networking (SDN) is an emerging paradigm which makes the network programmable by separating the control plane from data plane and makes both planes to work independently. There is a centralized controller and a programmable data plane in these networks architecture and forwarding data packets is realized by programming the data plane via an open interface called OpenFlow. OpenFlow is a communication protocol between control and data planes. The centralized architecture of these networks provides a global view of the underlying network to upper applications and brings numerous advantages such as routing, traffic engineering and QoS control. Despite these advantages there are...
Analysis and Evaluation of Intrusion Detection Systems Test Methods
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Intrusion detection systems’ test and evaluation is an active research area on which many researchers have been working for years. A complete and comprehensive test methodology that can be applied in reasonable time and cost is important and useful both to evaluate a newly designed system and to compare two or more existing systems to select an appropriate system for a particular network. In this research, we first determine the critical features of an IDS and then inspect methods and effective parameters that may influence the test process and propose a method for testing intrusion detection systems. In the proposed test methodology we only examine critical features which lake of them cause...
Design of a High Speed Processor for Network Equipment Test
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
The visible growth in usage of computer networks in daily human life has significantly increased the importance of their correct and flawless operation. Various solutions have been offered to evaluate the operation correctness of network equipment. One of the most important issues in this context is evaluating the performance of such equipment. Due to the increase in speed of network ports, design and implementation of performance evaluation tools have become a challenging issue in terms of parameters such as speed, time accuracy, power consumption and cost. In this thesis, a hardware-based system for testing network equipment with 10 Gbps ports has been designed and implemented. This system...
Design and Implementation of Hardware Accelerator for Domain Name Service
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In this project we have designed & implemented a hardware accelerator for domain name service. This hardware accelerator is compatible with existing designs and it could be used standalone as an authoritative DNS server or a hardware accelerator in series of an existing DNS server facility. Two goals, are achieved in this thesis: increasing total DNS throughput and decreasing its response time.In this project, we have surveyed about domain name service, its scientific measurements, theory of caching and its effectiveness, name lookup methods and finally some of the similar designs. Domain name lookup in memory is one of the most challenging operations in every DNS server. We have researched...
Design and Implementation of Customized Architecture for Algebraic Integer-based FFT Computation
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
By using an encoding scheme based on Algebraic Integers (AIs), we study in this thesis how to map the real numbers needed in the computation of the FFT to integer numbers, in order to prevent error production and propagation throughout the intermediate stages of the FFT computation. To reconstruct encoded data, a decoding stage is to be used at the end of the FFT computation. AI-encoding poses two challenges; how to determine suitable AI bases and an unwanted growth in the number of data passes. This research work, firstly, determines an appropriate FFT architecture, and then, proposes a dedicated architecture based on AI-encoding. The basic and also the proposed dedicated architecture are...
Modeling and Analysis of Real-time Safety Systems in Smart Building
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, using smart buildings to improve performance and welfare of residents is of interest. Usually, these systems consist of safety systems that provide safety and security for residents. For example, fire detection system, sound the alarm and activating sprinkler in the building. For different types of critical events that can occur, variety of safety systems has been designed. Response time of these systems should be less than the deadline and the correct operation must be compeleted. As a result, analyzing and checking out the real-time and logical features of safety systems are the issues that we treat and investigate in this thesis.
In general, these systems are either...
In general, these systems are either...
Performance and Real Time Analysis of Vehicular Ad hoc Network (VANET)
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Today road accidents take the lives of millions of people on a yearly basis through the world. Also, numerous attempts have been proposed to increase safety on the roads. Vehicular Ad hoc Network (VANET) is a subclass of mobile ad hoc networks (MANET); the main goal of which is to increase the safety and efficiency of road traffics and trips. However, like other networks, routing protocols are one of the most important parts of VANET. But, due to the unique characteristics of VANET (high mobility, short radio coverage area, etc.), the process of data dissemination is a more challenging task than other networks. Therefore, the need for efficient, reliable and safe routing protocols which can...
Network Traffic Analysis & Anomaly Detection based on Benford’s Law
, Ph.D. Dissertation Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
The attempt of this project is to propose a simple model for traffic analysis which eventually leads to the presentation of an online classifier for network traffic anomaly detection. In this research, e show empirically that despite the variety of data networks in size, number of users, applications, and load, the inter-arrival times of normal TCP flows comply with the Weibull distribution whereas specific irregularities (anomalies) causes deviations from the distribution. Consequently, any type of anomalies affecting TCP flows, including intentional intrusions or unintended faults and network failures in general, can be detected by analyzing the discrepancy of TCP flow inter-arrival times...