1-5hit |
Mohammad BEHDADFAR Hossein SAIDI Masoud-Reza HASHEMI Ali GHIASIAN Hamid ALAEI
Recently, we have proposed a new prefix lookup algorithm which would use the prefixes as scalar numbers. This algorithm could be applied to different tree structures such as Binary Search Tree and some other balanced trees like RB-tree, AVL-tree and B-tree with minor modifications in the search, insert and/or delete procedures to make them capable of finding the prefixes of an incoming string e.g. an IP address. As a result, the search procedure complexity would be O(log n) where n is the number of prefixes stored in the tree. More important, the search complexity would not depend on the address length w i.e. 32 for IPv4 and 128 for IPv6. Here, it is assumed that interface to memory is wide enough to access the prefix and some simple operations like comparison can be done in O(1) even for the word length w. Moreover, insertion and deletion procedures of this algorithm are much simpler and faster than its competitors. In what follows, we report the software implementation results of this algorithm and compare it with other solutions for both IPv4 and IPv6. It also reports on a simple hardware implementation of the algorithm for IPv4. Comparison results show better lookup and update performances or superior storage requirements for Scalar Prefix Search in both average and worst cases.
Amin JAMALI Mehdi BERENJKOUB Hossein SAIDI
Autonomous ad hoc networks are networks with nodes belonging to different authorities, and cooperative behavior of nodes is not guaranteed in such networks. In this paper, defense mechanisms are introduced to protect nodes against injecting traffic attacks in an autonomous ad hoc network, and to stimulate nodes to forward packets for each other. We have a cross-layer approach in the design of our mechanisms, and nodes use information from medium access control (MAC) layer for selecting a good route. In addition, nodes attempt to drop packets of those nodes that violate MAC layer backoff mechanism. Analytical and simulation results demonstrate the effectiveness of our proposed mechanisms in the presence of injecting traffic attacks and MAC layer misbehaviors in an ad hoc network that consists of selfish nodes.
Mohammadali KHOSRAVIFARD Morteza ESMAEILI Hossein SAIDI T. Aaron GULLIVER
A source code for N symbols can be represented by a codeword length sequence (1,2,,N). A binary code is compact if it satisfies = 1. Also we may assume that 1 1 2 N. In this paper, we show that these two constraints can be replaced by max i for 1 i N - 1. Using the latter characterization, we construct a tree T N representing all binary compact codes. In fact every leaf of T N represents a compact code and vice versa. This technique can also be used to generate all compact codes for a given (1,2,,k), k < N.
Pejman GUDARZI Hossein SAIDI Farid SHEIKHOLESLAM
Fairness is one of the most important features of a rate allocation strategy. Proportional fairness criterion has been recently proposed by F. P. Kelly and his colleagues. In this paper, we have proposed a two-level hierarchical technique which allocates proportionally-fair rates to the network elastic users. Part of the network links which are used commonly by the end-users and are congestion prone, constitute the higher (first) level of the hierarchy. In this level, the users with common path in the network are grouped as virtual users. End-users and remaining network links constitute the lower (second) level of hierarchy. To improve the convergence rate of the algorithm, a combination of Jacobi method and fuzzy techniques is deployed in the higher level of hierarchy. Implementing such fast algorithms in the higher level (which is topologically simpler than the whole network), reduces the computational complexity with respect to the use of such algorithms in the whole network. Additionally, the lower level penalty function computation is done once in each N iterations, which reduces the computational complexity furthermore. The simulation results show that the proposed algorithm outperforms that of Kelly in the convergence speed.
Amin JAMALI Seyed Mostafa SAFAVI HEMAMI Mehdi BERENJKOUB Hossein SAIDI Masih ABEDINI
Device-to-device (D2D) communication in cellular networks is defined as direct communication between two mobile users without traversing the base station (BS) or core network. D2D communication can occur on the cellular frequencies (i.e., inband) or unlicensed spectrum (i.e., outband). A high capacity IEEE 802.11-based outband device-to-device communication system for cellular networks is introduced in this paper. Transmissions in device-to-device connections are managed using our proposed medium access control (MAC) protocol. In the proposed MAC protocol, backoff window size is adjusted dynamically considering the current network status and utilizing an appropriate transmission attempt rate. We have considered both cases that the request to send/clear to send (RTS/CTS) mechanism is and is not used in our protocol design. Describing mechanisms for guaranteeing quality of service (QoS) and enhancing reliability of the system is another part of our work. Moreover, performance of the system in the presence of channel impairments is investigated analytically and through simulations. Analytical and simulation results demonstrate that our proposed system has high throughput, and it can provide different levels of QoS for its users.