Loading...
Search for: network-protocols
0.01 seconds
Total 87 records

    Comment II on "Dense coding in entangled states"

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 68, Issue 1 , 2003 , Pages - ; 10502947 (ISSN) Akhavan, O ; Rezakhani, A. T ; Sharif University of Technology
    American Physical Society  2003

    RCCT: Robust clustering with cooperative transmission for energy efficient wireless sensor networks

    , Article International Conference on Information Technology: New Generations, ITNG 2008, Las Vegas, NV, 7 April 2008 through 9 April 2008 ; 2008 , Pages 761-766 ; 0769530990 (ISBN); 9780769530994 (ISBN) Ghelichi, M ; Jahanbakhsh, S. K ; Sanaei, E ; Sharif University of Technology
    2008
    Abstract
    Data gathering is a common but critical operation in many applications of wireless sensor networks. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks, which can increase scalability and lifetime. These networks require robust wireless communication protocols that are energy efficient and provide low latency. In this paper, we develop and analyze an efficient cooperative transmission protocol with robust clustering (RCCT) for sensor networks that considers a fault-tolerant and energy-efficient distributed clustering with minimum overhead. RCCT distributes... 

    A dynamic-reconfigurable architecture for protocol stacks of networked systems

    , Article 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, 24 July 2007 through 27 July 2007 ; Volume 1 , 2007 , Pages 609-612 ; 07303157 (ISSN) ; 9780769528700 (ISBN) Niamanesh, M ; Jalili, R ; Sharif University of Technology
    2007
    Abstract
    This paper proposes a software framework for dynamic-reconfigurable protocol stack. The framework presents mechanisms andan algorithm/or all required phases for reconfiguration of a running protocol component that include freezing the component in a safe state, changing the component, and state transfer to a new component. Considering that every running protocol component communicates with at least one peer component in another system, we perform the reconfiguration with respect to the peer component. © 2007 IEEE  

    Integrating module checking and deduction in a formal proof for the perlman Spanning Tree Protocol (STP)

    , Article Journal of Universal Computer Science ; Volume 13, Issue 13 , 2007 , Pages 2076-2104 ; 0958695X (ISSN) Hojjat, H ; Nakhost, H ; Sirjani, M ; Sharif University of Technology
    2007
    Abstract
    In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed by Radia Perlman. In this paper, we give a formal proof for correctness of the STP algorithm by showing that finally a single node is selected as the root of the tree and the loops are eliminated correctly. We use formal inductive reasoning to establish these requirements. In order to ensure that the bridges behave correctly regardless of the topology of the surrounding bridges and LANs, the Rebeca, modular verification techniques are applied. These techniques are shown to be efficiently applicable in model checking... 

    An enhanced random-walk method for content locating in P2P networks

    , Article 27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07, Toronto, ON, 22 June 2007 through 29 June 2007 ; 2007 ; 0769528384 (ISBN); 9780769528380 (ISBN) Ronasi, K ; Firooz, M. H ; Pakravan, M. R ; Nasiri Avanaki, A ; Sharif University of Technology
    2007
    Abstract
    The important problem of content location in an unstructured distributed network (such as P2P, with no central searching system, graph construction control or file placement regulation) is addressed. The existing methods that are based on either flooding or random walk impose a large traffic load on the network or require a long time to search. In this work, we propose a method that outperforms the existing methods in both of these measures. These advantages are achieved by publishing traces of the contents of each node in its nearby nodes, so that the closer nodes to the target have a stronger trace of it. Such traces are used to rapidly locate the desired content. The superb performance of... 

    Design and implementation of a dynamic-reconfigurable architecture for protocol stack

    , Article 2nd IPM International Symposium on Fundamentals of Software Engineering, FSEN 2007, Tehran, 17 April 2007 through 19 April 2007 ; Volume 4767 LNCS , 2007 , Pages 396-403 ; 03029743 (ISSN); 9783540756972 (ISBN) Niamanesh, M ; Sabetghadam, S ; Rahaghi, R. Y ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Future communication and computation devices require mechanisms for on-the-fly reconfiguration in their protocol stack to operate in different situations and networks. This paper proposes a component-based framework for dynamic-reconfigurable protocol stack. Considering that every running protocol component communicates with at least one peer component, unlike related work our framework supports synchronous reconfiguration of two peer protocol components in two communicating protocol stacks. © Springer-Verlag Berlin Heidelberg 2007  

    Formalizing compatibility and substitutability in communication protocols using I/O-constraint automata

    , Article 2nd IPM International Symposium on Fundamentals of Software Engineering, FSEN 2007, Tehran, 17 April 2007 through 19 April 2007 ; Volume 4767 LNCS , 2007 , Pages 49-64 ; 03029743 (ISSN); 9783540756972 (ISBN) Niamanesh, M ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    A communication protocol consists of a sequence of messages used by peer entities to communicate. Each entity in a network is equipped by at least one protocol stack. Due to the need for on-the-fly reconfiguration of protocol stack in future communication and computation devices, formalizing substitutability and compatibility of protocol entities are important in correctness assessment of dynamic reconfiguration. In this paper, we extend Constraint Automata and propose I/O-Constraint Automata to model behavior of protocols and propose enough formalism for substitutability and compatibility relations between protocols. We introduce input-blocking property of communication protocols, and show... 

    Communication protocol evolution by natural selection

    , Article CIMCA 2006: International Conference on Computational Intelligence for Modelling, Control and Automation, Jointly with IAWTIC 2006: International Conference on Intelligent Agents Web Technologies and International Commerce, Sydney, NSW, 28 November 2006 through 1 December 2006 ; 2006 ; 0769527310 (ISBN); 9780769527314 (ISBN) Khasteh, S. H ; Shouraki, S. B ; Halavati, R ; Lesani, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    One of the most important issues discussed in multi-agent systems, is communication between agents. Usually, a predefined communication protocol is used, but predefining a protocol between agents causes some problems; for example it is possible that agents recognize a subject that is not defined in their protocol so they can't express anything about it. In this paper we propose a new method for evolution of a communication protocol between intelligent agents by using natural selection mechanism. Experimental results will be discussed in detail. © 2006 IEEE  

    Evolution of a communication protocol between a group of intelligent agents

    , Article 2006 World Automation Congress, WAC'06, Budapest, 24 June 2006 through 26 June 2006 ; 2006 ; 1889335339 (ISBN); 9781889335339 (ISBN) Khasteh, S. H ; Shouraki, S. B ; Halavati, R ; Khameneh, E ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    One of the most important issues that be discussed in multi-agent systems, is the communication between agents. In existing applications usually a communication protocol defined between agents. But defining a protocol between agents cause some problems; for example it is possible that agents recognize a subject, but because it is not defined in their protocol, they can't express any thing about that. In this paper we propose a new method for evolution of a communication protocol between intelligent agents, after that the experimental results will be discussed and at the end of the paper future works and conclusion. Copyright - World Automation Congress (WAC) 2006  

    A new scheme on recovery from failure in NICE overlay protocol

    , Article 1st International Conference on Scalable Information Systems, InfoScale '06, Hong Kong, 30 May 2006 through 1 June 2006 ; Volume 152 , 2006 ; 1595934286 (ISBN); 9781595934284 (ISBN) Abdolhosseini Moghadam, A. R ; Barghi, S ; Rabiee, H. R ; Ghanbari, M ; Sharif University of Technology
    2006
    Abstract
    Overlay networks have been an active area of research for the past few years. The control overhead and the recovery from failure are the two important issues in the topology aware embedded overlay networks. In this research, we have introduced an enhanced version of the NICE protocol, called resilient NICE (R-NICE) that reduces the control overhead significantly. Furthermore, by saving the join path for an end host, the time and overhead of rejoining for isolated nodes have also been reduced. This will cause the clusters and consequently the overall network to become more stable and the effect of a node failure become localized. Our experimental results have confirmed the superior... 

    Reply to "comment on 'quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriersa'"

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 72, Issue 5 , 2005 ; 10502947 (ISSN) Karimipour, V ; Sharif University of Technology
    2005
    Abstract
    We show that the criticism of a recent Comment by Gao on the insecurity of the quantum secret sharing protocol [proposed in S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)] is based on a misconception about the meaning of security and hence is invalid. © 2005 The American Physical Society  

    A new, publicly verifiable, secret sharing scheme

    , Article Scientia Iranica ; Volume 15, Issue 2 , 2008 , Pages 246-251 ; 10263098 (ISSN) Behnad, A ; Eghlidos, T ; Sharif University of Technology
    Sharif University of Technology  2008
    Abstract
    A Publicly Verifiable Secret Sharing (PVSS) scheme, as introduced by Stadler, has a feature where anyone, besides the participants, can verify the validity of the shares distributed by the dealer. Schoenmakers added a new feature, by providing a proof of correctness of the shares released by the players in the reconstruction process. This protocol is claimed to be an improvement on Stadler's and Fujisaki-Okamoto's, both in efficiency and in the type of intractability assumptions. However, Young-Yung improved Schoenmakers' PVSS, using a Discrete-Log instead of a Decision Diffie-Hellman. In this paper, a new PVSS is presented, having an intrinsic difference with its predecessors, that is, the... 

    Performance evaluation of a new backoff method for IEEE 802.11

    , Article Computer Communications ; Volume 30, Issue 18 , 2007 , Pages 3698-3704 ; 01403664 (ISSN) Minooei, H ; Nojumi, H ; Sharif University of Technology
    2007
    Abstract
    Since DCF is the main protocol of accessing other mobile stations in ad hoc networks such as IEEE 802.11 WLANs, a self-controlling method for each station is necessary, called the backoff algorithm. An exponential backoff method has been used in WLANs and significant efforts have been made to analyze its throughput and other important properties such as delay and jitter. In this article, we propose a new backoff algorithm and model it with a discrete-time Markov chain; measuring its saturation throughput under several conditions and several set of parameters which are to be adjusted according to the network condition, with the aim of approaching maximum throughput when stations are... 

    DBMSS: An event-based simulator for analyzing concurrency protocols in database systems

    , Article 2006 Canadian Conference on Electrical and Computer Engineering, CCECE'06, Ottawa, ON, 7 May 2006 through 10 May 2006 ; 2006 , Pages 1874-1877 ; 08407789 (ISSN); 1424400384 (ISBN); 9781424400386 (ISBN) Jalali, L ; Abdollahzadeh, A ; Aliakbarian, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    This paper explores design and implementation of an event-based simulator namely DBMSS for analyzing concurrency protocols in database systems. In the design of DBMSS we interested in event-based approach to create a real world with variety range of event possibilities. DBMSS is explored in the context of the development of a complex simulator for simulating real world conditions and provide an event-based environment to test and evaluate concurrency protocols in database systems. First we discuss the architecture of DBMSS and use it to provide arrival transactions to test and evaluate concurrency protocols in database system. We present the comparison of 4 concurrency protocols in variety... 

    Secure data transmission using qubits

    , Article 6th IEEE International Conference on Computer and Information Technology, CIT 2006, Seoul, 20 September 2006 through 22 September 2006 ; 2006 ; 076952687X (ISBN); 9780769526874 (ISBN) Marvian, I ; Hosseini Khayat, S ; Sharif University of Technology
    2006
    Abstract
    A quantum protocol for secure transmission of data using qubits is presented. This protocol sends one qubit in a round-trip to transmit one bit of data. The protocol offers an improvement over the BB84 QKD protocol. BB84, in conjunction with one-time pad encryption, has been shown to be unconditionally secure. However its security relies on the assumption that the qubit source device does not emit multiple replicas of the same qubit for each transmitted bit. If this happens a multi-qubit emission attack can be launched. In addition, BB84 cannot be used to send predetermined bit strings as it generates a random bit string in the process. Our protocol does not have the above drawbacks, but... 

    Minimizing the error of time difference of arrival method in mobile networks

    , Article 2005 International Conference on Wirelessand Optical Communications Networks, Dubai, 6 March 2005 through 8 March 2005 ; 2005 , Pages 328-332 ; 0780390199 (ISBN); 9780780390195 (ISBN) Malekitabar, A ; Aghababa, H ; Radfar, M. H ; Khalaj, B. H ; Sharif University of Technology
    2005
    Abstract
    Estimating the position of a mobile set is of great importance in new mobile services. However, in most cases, the accuracy should be less than 100 meters. This accuracy is hard to reach especially in urban areas. The main problem is that there are a lot of obstacles like buildings between the BTS and the mobile set. Thus the time measured between BTS and the mobile set is somehow greater than the time it takes the wave to travel directly between two points. This paper introduces an optimized solution for TDOA as one of the most efficient ways for finding the location of a mobile phone. Considering the standards and limitations of both GSM and UMTS, the Authors present a solution for... 

    An empirical comparison of OTIS-mesh and OTIS-hypercube multicomputer systems under deterministic routing

    , Article 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005, Denver, CO, 4 April 2005 through 8 April 2005 ; Volume 2005 , 2005 ; 0769523129 (ISBN); 0769523129 (ISBN); 9780769523125 (ISBN) Najaf abadi, H. H ; Sarbazi azad, H ; Sharif University of Technology
    2005
    Abstract
    In optoelectronic OTIS architectures, electrical and optical interconnects are used for local and global communication, respectively. Interesting instances of the OTIS architecture are the OTIS-hypercube and OTIS-mesh. This paper conducts a performance evaluation and comparison of these networks under different structural conditions and traffic loads. All judgments made, are based on observations from extensive simulation results of the interconnection networks. We conclude that, when the OTIS-hypercube and equivalent 2-D OTIS-mesh are compared under the constraint of equal bisection bandwidth, the performance of the OTIS-hypercube is of superior performance. We however show that the... 

    , M.Sc. Thesis Sharif University of Technology Sajadian, Ali (Author) ; Faez, karim (Supervisor)
    Abstract
    In this thesis all the information about different techniques and methods used in Local Area Network (LAN) are described and organized as follows:
    Chapter 1: The network properties are described including Network definitions and different types of LAN and their relative applications
    Chapter 2 :Different techniques and protocols of data transfer and switching methods are being described and compared.
    Chapter 3 : Network technology consists of different topologies for physical connections and various transfer Medias are covered.
    Chapter 4 :All network protocols are described including different methods of DATA access in LOOP, RING and BUS topologies and the ISO and IEEE... 

    Design of Reconfigurable Hardware Security Module Based on Network Protocol Detection

    , M.Sc. Thesis Sharif University of Technology Zohouri, Hamid Reza (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Nowadays, in the presence of different types of computer attacks and different methods of eavesdropping on network communications, nobody can deny the importance of cryptography. Hardware Security Modules that are specifically designed for this purpose are widely used as a fast and reliable tool for encrypting data in computer networks. In this project, using the common and well-known FPGA platform and by leveraging the reconfigurability feature of this platform and also by adding a network protocol detection module to the traditional architecture of Hardware Security Modules, a novel module has been designed and implemented that can encrypt and decrypt data in a communication network, at... 

    Key splitting for random key distribution schemes

    , Article Proceedings - International Conference on Network Protocols, ICNP ; 2012 ; 10921648 (ISSN) ; 9781467324472 (ISBN) Ehdaie, M ; Alexiou, N ; Ahmadian, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    2012
    Abstract
    A large number of Wireless Sensor Network (WSN) security schemes have been proposed in the literature, relying primarily on symmetric key cryptography. To enable those, Random Key pre-Distribution (RKD) systems have been widely accepted. However, WSN nodes are vulnerable to physical compromise. Capturing one or more nodes operating with RKD would give the adversary keys to compromise communication of other benign nodes. Thus the challenge is to enhance resilience of WSN to node capture, while maintaining the flexibility and low-cost features of RKD. We address this problem, without any special-purpose hardware, proposing a new and simple idea: key splitting. Our scheme does not increase...