Loading...
Search for:
jahangir--amir-hossein
0.138 seconds
Total 2094 records
Network Traffic Analyzer
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In order to increase the network performance, to discover network security threats, to guarantee the quality of services, to simulate networks and develop new network protocols, network designers and operators need software tools to analyze the network traffic. The first step to do this analysis is network monitoring. This can be done by using various software and hardware tools.
In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters....
In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters....
Analysis and Evaluation of Real Timeliness and Safety of VANET
,
M.Sc. Thesis
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
The increasing number of road accidents and fatalities have yielded the introduction of several solutions by related industries such as automobile manufacture. Proposed solutions can be classified into two categories: passive, such as airbags, and active such as ABS ad ITS-based technologies. Inter vehicles communication let the communication between vehicles(V2V) or between vehicles and road infrastructure (V2I) by relying on DSRC technology and standards. Intelligent Transportation System (ITS) has three main types of applications namely safety, traffic and commercial. Safety applications are the main goal of vehicular communication, and real time guarantee in safety applications is so...
Analysis and Evaluation of Routing Protocols Conformance Test
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, one of the problems of network designers and users is the correctness of network equipment functionality. Since routers play an important role in information transfer between various networks and communicate with each other through a routing protocol, any violation of such protocol can result in the network's failure or defective transfer of data. Thus, being assured of the conformance of the implemented protocol in a router with what has been defined in the protocol's standard is of great significance. To this end, before using or exposing a router, network equipment testers should run protocol conformance tests on it and insure its correct functionality. This brings up the...
An Efficient Approach for Improving the Performance of Real-time Flow Routing in SDN Controllers
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In real-time systems, jobs that miss their deadline are considered worthless or ineffective. Nowadays, real-time applications (such as multimedia) that communicate through software-defined networks (SDN) are widely used and will continue to expand in the future. SDN is an emerging network architecture in which control plane is separated from data plane to manage it directly. In this research, we make changes to the controller and the switch used in such network to deliver real time packets or real-time flows (such as video) on time, as much as possible. As missed deadline packets are worthless and they waste bandwidth, dropping them is a solution. Moreover, the controller can drop flows that...
Modeling and Evaluating Reliability in Wireless Sensor Networks
,
M.Sc. Thesis
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
Recent advancement in wireless communications, electronics, low power design and also tendency to use high performance low cost products have led to emergence of Wireless Sensor Networks (WSNs). As the main purpose of a WSN is information gathering and it’s transmission to the sink node, the main problem is to deliver information correctly with minimum energy consumption. Besides, whereas the majority of developed applications for WSNs are event-critical applications, achieving reliable data transfer as the main factor of dependability and quality of service seems vital. However, data transmission is unreliable over multi-hop WSN due to the unreliability of wireless links and node failures. ...
Design of Soft Real-time Scheduler for Wireless Sensor Networks
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Recent advances in miniaturization and low power design have led to a flurry of activity in wireless sensor networks (WSNs). Sensor networks have different constraints than traditional wired networks. A wireless sensor network is a special network with large numbers of nodes equipped with embedded processors, sensors, and radios. These nodes collaborate to accomplish a common task such as environment monitoring or asset tracking. Many of these applications interface with real world environments and delivery of data is subject to certain constraints. So It is often necessary for communication to meet real-time constraints. Most existing real-time protocols don’t use packet scheduling schemes...
Improving The Performance of Network Processors Based of the Advanced Processors Schemes
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Up to now two kinds of hardware have been used in routers: ASIC processors or general purpose processors. These two solutions have their own flaws. ASIC hardwares are fast but they are not flexible for implementation or development of new applications. And general purpose processors are not fast enough for fast data rate of network. On the other hand, there is an ever increasing gap between the memory access speed and network data rate. At this time the main bottleneck in packet processing systems is memory. For solving this problem, two groups of solution have been introduced. The first group tries to reduce the demand for memory by using cache or longer system words. The second group uses...
An Effective Data Aggregation Mechanism in Wireless Sensor Networks
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Wireless sensor networks (WSNs) are tiny devices with limited computation and power supply. For such devices, data transmission is a very energy-consuming operation. Data aggregation eliminates redundancy and minimizes the number of transmissions in order to save energy. This research explores the efficiency of data aggregation by focusing on different aspects of the problem such as energy efficiency, latency and accuracy. To achieve this goal, we first investigate data aggregation efficiency with constraint on delay, which can be compatible with other important system properties such as energy consumption and accuracy. By simulation, we will show that, depending on the application, we can...
Modeling and Analysis of Real-time Behaviour of Wireless Sensor Networks
,
Ph.D. Dissertation
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
Nowadays, information gathering based on wireless sensor network (WSN) has formed various applications and it also seems to be spreading more in future. Wireless sensor network, is a network composed of multiple nodes, without any infrastructure, each having one or more sensors, wireless communications unit, processing unit, memory, and power supply. Memory capacity, computation power, and power supply are usually considered as valuable resources and limited in nodes. Most of sensor nodes are located in a dense mode and they are susceptible to failure. Therefore network topology may vary dynamically. A sensor network can support real-time communications independent of its type of structure...
A New Algorithm for Partitioning Problem in Hardware/Software Codesign
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
We use an abstract model to perform hardware/software partitioning for embedded systems. The complexity of partitioning problem in the model is studied and we use a scheme to overcome its NP-Hardness. Partitioning problem can be considered as the main phase of high level synthesis. As it suffers from complexity, heuristic search methods are generally used to overcome its complexity. In this thesis we present a heuristic method (named Tendency algorithm) to increase the performance of heuristic searches, and use it in parallel with other tuning methods. We defind suitable initial point(s) for heuristic searches instead of tuning heuristic parameters. The thesis justifies the logic behind...
Reconfigurable Architecture For Cryptanalysis Applications
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, the significance of securing data and information is undeniable. Cryptography is being used to provide data security. In addition, cryptanalysis is required to evaluate the effectiveness of cryptography methods, and hence, it is an essential concept for securing data. In general, the cryptography functions shall be designed in a way to impose a high load of time-intensive operations to prevent an adversary from accessing the main data from the encrypted data. As a result, cryptography and cryptanalysis algorithms need high performance computations. So far, a number of methods have been proposed to support the required performance. These methods include: distributed computing and...
Performance Ehancement of Congestion Control Algorithm Through Traffic Flow Istinction
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Congestion is an important issue in the network environment. To keep stable the perfor-mance of the network, congestion control algorithms have been extensively studied. Queue management method employed by the routers is one of the important issues in the congestion control study. Active Queue Management (AQM) has been proposed for early detection of congestion inside the network. AQM mechanisms control the queue length in a router by dropping arriving packets. The Random Early Detection (RED) is the most popular AQM mechanism used in routers on the Intenet to allow network users to simultaneously achieve high throughput and low average delay. The RED algorithm may cause heavy oscillation of...
Suitable Architecture Selection for Protocol Identification
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Protocol identification and reverse engineering have recently received much attention due to their importance in many communication and security applications. In this field, the main challenges are: protocol identification, clustering unknown protocols, extracting protocol fields, and finding the protocol format based on these fields and their relations. Most of the proposed methods for the first two parts (protocol identification and clustering) use machine learning and AI techniques. For the last part, some bioinformatics techniques like sequence alignment algorithms are used. In this thesis, after reviewing different methods for protocol identification and reverse engineering, some...
Design of Realistic Network Traffic Generator and Traffic Anomalies
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Generating realistic network traffic serves capacity planning, traffic engineering, understanding internet service performance and anomaly detection. A useful traffic generator must generate characteristics in flows and packets, and add known internet anomalies to legitimate traffic. In this dissertation, we develop a tool for generating realistic and anomalous traffic. This generator can generate traffic in a scalable, reproducible and stochastic manner. Two methods are proposed for this purpose. In the first method, the traffic is generated according to statistical distribution of packets and flow charactristics. In the second method, traffic is generated by modeling the behavior of...
Estimation of Network Parameters for use in Congestion Control Algorithm
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Many congestion control protocols proposed so far to alleviate the problems encountered by TCP protocol in high-speed networks and wireless links have to estimate the parameters of the network. For example, the TCP WESTWOOD congestion window is adjusted based on available bandwidth estimation, or TCP Vegas detects the congestion status based on RTT (Round Trip Time) estimation, and XCP protocol operates according to network traffic load. In this paper, we proposed a novel estimation algorithm that is based on burst identification techniques in router. we show through analysis and simulation that during burst periods this method can estimate the congestion window size of the specific flow...
Performance and Real Time Analysis of Vehicular Ad hoc Network (VANET)
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Today road accidents take the lives of millions of people on a yearly basis through the world. Also, numerous attempts have been proposed to increase safety on the roads. Vehicular Ad hoc Network (VANET) is a subclass of mobile ad hoc networks (MANET); the main goal of which is to increase the safety and efficiency of road traffics and trips. However, like other networks, routing protocols are one of the most important parts of VANET. But, due to the unique characteristics of VANET (high mobility, short radio coverage area, etc.), the process of data dissemination is a more challenging task than other networks. Therefore, the need for efficient, reliable and safe routing protocols which can...
Modeling and Analysis of Real-time Safety Systems in Smart Building
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, using smart buildings to improve performance and welfare of residents is of interest. Usually, these systems consist of safety systems that provide safety and security for residents. For example, fire detection system, sound the alarm and activating sprinkler in the building. For different types of critical events that can occur, variety of safety systems has been designed. Response time of these systems should be less than the deadline and the correct operation must be compeleted. As a result, analyzing and checking out the real-time and logical features of safety systems are the issues that we treat and investigate in this thesis.
In general, these systems are either...
In general, these systems are either...
Design of a High Speed Processor for Network Equipment Test
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
The visible growth in usage of computer networks in daily human life has significantly increased the importance of their correct and flawless operation. Various solutions have been offered to evaluate the operation correctness of network equipment. One of the most important issues in this context is evaluating the performance of such equipment. Due to the increase in speed of network ports, design and implementation of performance evaluation tools have become a challenging issue in terms of parameters such as speed, time accuracy, power consumption and cost. In this thesis, a hardware-based system for testing network equipment with 10 Gbps ports has been designed and implemented. This system...
Network Traffic Analysis & Anomaly Detection based on Benford’s Law
, Ph.D. Dissertation Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
The attempt of this project is to propose a simple model for traffic analysis which eventually leads to the presentation of an online classifier for network traffic anomaly detection. In this research, e show empirically that despite the variety of data networks in size, number of users, applications, and load, the inter-arrival times of normal TCP flows comply with the Weibull distribution whereas specific irregularities (anomalies) causes deviations from the distribution. Consequently, any type of anomalies affecting TCP flows, including intentional intrusions or unintended faults and network failures in general, can be detected by analyzing the discrepancy of TCP flow inter-arrival times...
Enhancing Scalability in Software-defined Networks
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Software Defined Networking (SDN) is an emerging paradigm which makes the network programmable by separating the control plane from data plane and makes both planes to work independently. There is a centralized controller and a programmable data plane in these networks architecture and forwarding data packets is realized by programming the data plane via an open interface called OpenFlow. OpenFlow is a communication protocol between control and data planes. The centralized architecture of these networks provides a global view of the underlying network to upper applications and brings numerous advantages such as routing, traffic engineering and QoS control. Despite these advantages there are...