Farshid Farhat

Farshid Farhat

San Francisco Bay Area
3K followers 500+ connections

About

My current research interests:
. Artificial Intelligence (Machine Learning, Computer…

Activity

Join now to see all activity

Experience

  • AMD Graphic
  • -

  • -

    United States

  • -

    State College, Pennsylvania Area

  • -

    Beijing City, China

  • -

    Redmond, Washington

  • -

  • -

    Tehran, Iran

  • -

Education

Licenses & Certifications

Publications

  • Evaluating the Combined Impact of Datacenter Architecture and Cloud Workload Characteristics on Performance, Network Traffic and Cost

    IISWC 2015

    The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times…

    The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times, packet sizes, inter-node communication overhead, self-similarity, and traffic volume. Then, we study the effect of hardware architectural metrics on network traffic. Our experimental analysis reveals that (1) the message arrival times and packet-size distributions exhibit variances across different cloud applications; (2) the inter-arrival times imply a large amount of self-similarity as the number of nodes increase; (3) the node architecture can play a significant role in shaping the overall network traffic; and finally, (4) the applications we study can be broadly divided into those which perform better in a scale-out or scale-up configuration at node level and into two categories, namely, those that have long-duration, low-burst flows and those that have short-duration, high-burst flows. Using the results of (3) and (4), the paper discusses the performance/cost trade-offs for scale-out and scale-up approaches and proposes an analytical model that can be used to predict the communication and computation demand for different configurations. It is shown that the difference between two different node architecture's performance per dollar cost (under same number of cores system wide) can be as high as 154 percent which disclose the need for accurate characterization of cloud applications before wasting the precious cloud resources by allocating wrong architecture.

    Other authors
  • Evaluating the Combined Impact of Datacenter Architecture and Cloud Workload Characteristics on Performance, Network Traffic and Cost

    IEEE International Symposium on Workload Characterization (IISWC)

    The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times…

    The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times, packet sizes, inter-node communication overhead, self-similarity, and traffic volume. Then, we study the effect of hardware architectural metrics on network traffic. Our experimental analysis reveals that (1) the message arrival times and packet-size distributions exhibit variances across different cloud applications; (2) the inter-arrival times imply a large amount of self-similarity as the number of nodes increase; (3) the node architecture can play a significant role in shaping the overall network traffic; and finally, (4) the applications we study can be broadly divided into those which perform better in a scale-out or scale-up configuration at node level and into two categories, namely, those that have long-duration, low-burst flows and those that have short-duration, high-burst flows.

    Other authors
  • Modeling and Optimization of Straggling Mappers

    Technical Report CSE-14-006, Pennsylvania State University

    MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate
    scheduling can degrade the overall…

    MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate
    scheduling can degrade the overall performance. We analytically
    capture the effects of stragglers (delayed mappers) on the performance. Based on an observed delayed exponential distribution (DED) of the response time of mappers, we then model the map phase by means of hardware, system
    , and application parameters. Mean sojourn time (MST), the time needed to sync the completed map tasks at one reducer, is mathematically formulated. Following that, we optimize MST by finding the task inter-arrival time to each mapper node. The optimal mapping problem leads to an equilibrium property
    investigated for different types of inter-arrival and service time
    distributions in a heterogeneous datacenter (i.e., a datacenter with different types of nodes). Our experimental results show the performance and important parameters of the different types of schedulers targeting MapReduce applications. We also show that, in the case of mixed deterministic and stochastic schedulers, there is an optimal scheduler that can always achieve the lowest MST.

    Other authors
    See publication
  • Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks

    Consumer Communications and Networking Conference (CCNC), 2011 IEEE


    Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against…


    Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to promote cooperation. In comparison with other proposed TFT-like strategies, ours is resilient to systematic errors in detection of selfish nodes and does not lead to unending death spirals.

    Other authors
    See publication
  • Risk of attack coefficient effect on availability of Ad-hoc networks

    Consumer Communications and Networking Conference (CCNC), 2011 IEEE


    Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well…


    Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well. We also present the connectivity coefficient of nodes in a network which shows how important is a node in a network and how much damage is caused if a certain node is compromised.

    Other authors
    See publication
  • An Extended Authentication and Key Agreement Protocol of UMTS

    Springer ISPEC

    A new authentication method in UMTS

    See publication

Courses

  • Advanced Compiler Construction

    CSE521

  • Advanced Machine Learning

    -

  • Advanced Networking

    -

  • Advanced Operating Systems

    CSE511

  • Advanced Programming (C++)

    -

  • Algorithm Design and Analysis

    CSE565

  • Big Data Analytics

    CSE598G

  • Business Dynamics

    -

  • Coding Theory

    -

  • Computer Architecture

    CSE431

  • Data Communications and Computer Networks

    -

  • Distributed Systems

    CSE513

  • Fault-Tolerant Systems

    CSE536

  • Game Theory

    -

  • Information Theory

    -

  • Internet Programming

    -

  • Network Security

    -

  • Network Security

    -

  • Numerical Optimization

    -

  • Operating System Design

    CSE473

  • Performance Evaluation

    -

  • Stochastic Processes

    -

  • Wireless Communications

    -

Projects

  • Parallel File Server

    -

    Other creators
  • Mobile Adhoc Network Simulator

    -

    GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected…

    GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected after eliminating selfish/malicious nodes. The key feature of LMAR to seek safe route free of selfish and malicious nodes in polynomial time is its searching algorithm and flooding stage that its generated traffic is equi-loaded compared to single-path routing protocols but its security efficiency to bypass the attacks is much better than the other multi-path routing protocols. LMAR concept is introduced to provide the security feature known as availability and a simulator has been developed to analyze its behavior in complex network environments [1]. Then we have added detection mechanism to the simulator, which can detect selfish nodes in network. The proposed algorithm is resilient against collision and can be used in networks which wireless nodes use directional antennas and it also defend against an attack that malicious nodes try to break communications by relaying the packets in a specific direction. Some game theoretic strategies to enforce cooperation in network have been implemented in GTNS, for example Forwarding-Ratio Strategy, TFT-Strategy and ERTFT. This tutorial helps new users to get familiar with GTNS and run different network scenarios.

    Other creators
    See project
  • Optical CDMA Network Simulator

    -

    Optical CDMA Wireless Multi-User Network System includes some transmitters and receivers. In this network, an Optical Orthogonal Code (OOC) is assigned to each user (Tx or Rx) to connect to its equivalent-OOC user and after synchronization between this two equivalent-OOC user, they can send and receive data to/from each other.

    In this project, I worked to design and Implement a simulator for Optical CDMA Wireless Multi-User Network. This simulator has eliminated some of practical…

    Optical CDMA Wireless Multi-User Network System includes some transmitters and receivers. In this network, an Optical Orthogonal Code (OOC) is assigned to each user (Tx or Rx) to connect to its equivalent-OOC user and after synchronization between this two equivalent-OOC user, they can send and receive data to/from each other.

    In this project, I worked to design and Implement a simulator for Optical CDMA Wireless Multi-User Network. This simulator has eliminated some of practical problems like number of users can be used by network practically.

    OCNS is the name of the simulator for Optical CDMA Networks. I did this project as my BS Project. My supervisor, Prof. Pakravan, suggested me this project in April 2004. In July 2004, I finished the documentation of this project in persian language. I developed OCNS by using Visual C++ software. I've presented the defined classes in my project below.

    Other creators
    See project

Languages

  • English

    -

  • Farsi

    -

Recommendations received

More activity by Farshid

View Farshid’s full profile

  • See who you know in common
  • Get introduced
  • Contact Farshid directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More