“I was fortunate to work closely with Farshid during my college studies at Sharif university and I certainly learned a great deal of tricks and quick hacks back then. His enthusiasm to figure things out and his analytical skills to approach any problem is what I can vividly remember looking back at our professional encounters. Obviously, we have developed and held a growing friendship over years which was not possible without the team working spirit. Big problems, or hard ones does not intimidate him or make him leave the systemic approach to tackle them. His logical approach to break any problem it being an engineering or programming problem is what I would look when picking a team to take on innovative and challenging tasks.”
About
My current research interests:
. Artificial Intelligence (Machine Learning, Computer…
Activity
-
I’m thrilled to announce that Ultimate App and our mobile team have been acquired by Jupiter Exchange! I’m deeply proud of what we’ve built and…
I’m thrilled to announce that Ultimate App and our mobile team have been acquired by Jupiter Exchange! I’m deeply proud of what we’ve built and…
Liked by Farshid Farhat
-
Why You Should Create Your Personal Brand 🚀 Personal branding is not limited to celebrities or influencers; it's relevant to professionals…
Why You Should Create Your Personal Brand 🚀 Personal branding is not limited to celebrities or influencers; it's relevant to professionals…
Liked by Farshid Farhat
-
The infinite gift 🎁is an interesting object where the side of the nth box is 1/√n. As n→+∞, the gift has infinite surface area and length but finite…
The infinite gift 🎁is an interesting object where the side of the nth box is 1/√n. As n→+∞, the gift has infinite surface area and length but finite…
Liked by Farshid Farhat
Experience
Education
Licenses & Certifications
Publications
-
Evaluating the Combined Impact of Datacenter Architecture and Cloud Workload Characteristics on Performance, Network Traffic and Cost
IISWC 2015
The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times…
The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times, packet sizes, inter-node communication overhead, self-similarity, and traffic volume. Then, we study the effect of hardware architectural metrics on network traffic. Our experimental analysis reveals that (1) the message arrival times and packet-size distributions exhibit variances across different cloud applications; (2) the inter-arrival times imply a large amount of self-similarity as the number of nodes increase; (3) the node architecture can play a significant role in shaping the overall network traffic; and finally, (4) the applications we study can be broadly divided into those which perform better in a scale-out or scale-up configuration at node level and into two categories, namely, those that have long-duration, low-burst flows and those that have short-duration, high-burst flows. Using the results of (3) and (4), the paper discusses the performance/cost trade-offs for scale-out and scale-up approaches and proposes an analytical model that can be used to predict the communication and computation demand for different configurations. It is shown that the difference between two different node architecture's performance per dollar cost (under same number of cores system wide) can be as high as 154 percent which disclose the need for accurate characterization of cloud applications before wasting the precious cloud resources by allocating wrong architecture.
Other authors -
Evaluating the Combined Impact of Datacenter Architecture and Cloud Workload Characteristics on Performance, Network Traffic and Cost
IEEE International Symposium on Workload Characterization (IISWC)
The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times…
The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times, packet sizes, inter-node communication overhead, self-similarity, and traffic volume. Then, we study the effect of hardware architectural metrics on network traffic. Our experimental analysis reveals that (1) the message arrival times and packet-size distributions exhibit variances across different cloud applications; (2) the inter-arrival times imply a large amount of self-similarity as the number of nodes increase; (3) the node architecture can play a significant role in shaping the overall network traffic; and finally, (4) the applications we study can be broadly divided into those which perform better in a scale-out or scale-up configuration at node level and into two categories, namely, those that have long-duration, low-burst flows and those that have short-duration, high-burst flows.
Other authors -
Modeling and Optimization of Straggling Mappers
Technical Report CSE-14-006, Pennsylvania State University
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate
scheduling can degrade the overall…MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate
scheduling can degrade the overall performance. We analytically
capture the effects of stragglers (delayed mappers) on the performance. Based on an observed delayed exponential distribution (DED) of the response time of mappers, we then model the map phase by means of hardware, system
, and application parameters. Mean sojourn time (MST), the time needed to sync the completed map tasks at one reducer, is mathematically formulated. Following that, we optimize MST by finding the task inter-arrival time to each mapper node. The optimal mapping problem leads to an equilibrium property
investigated for different types of inter-arrival and service time
distributions in a heterogeneous datacenter (i.e., a datacenter with different types of nodes). Our experimental results show the performance and important parameters of the different types of schedulers targeting MapReduce applications. We also show that, in the case of mixed deterministic and stochastic schedulers, there is an optimal scheduler that can always achieve the lowest MST.Other authorsSee publication -
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against…
Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to promote cooperation. In comparison with other proposed TFT-like strategies, ours is resilient to systematic errors in detection of selfish nodes and does not lead to unending death spirals.
Other authorsSee publication -
Risk of attack coefficient effect on availability of Ad-hoc networks
Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well…
Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well. We also present the connectivity coefficient of nodes in a network which shows how important is a node in a network and how much damage is caused if a certain node is compromised.
Other authorsSee publication -
An Extended Authentication and Key Agreement Protocol of UMTS
Springer ISPEC
A new authentication method in UMTS
Courses
-
Advanced Compiler Construction
CSE521
-
Advanced Machine Learning
-
-
Advanced Networking
-
-
Advanced Operating Systems
CSE511
-
Advanced Programming (C++)
-
-
Algorithm Design and Analysis
CSE565
-
Big Data Analytics
CSE598G
-
Business Dynamics
-
-
Coding Theory
-
-
Computer Architecture
CSE431
-
Data Communications and Computer Networks
-
-
Distributed Systems
CSE513
-
Fault-Tolerant Systems
CSE536
-
Game Theory
-
-
Information Theory
-
-
Internet Programming
-
-
Network Security
-
-
Network Security
-
-
Numerical Optimization
-
-
Operating System Design
CSE473
-
Performance Evaluation
-
-
Stochastic Processes
-
-
Wireless Communications
-
Projects
-
Mobile Adhoc Network Simulator
-
GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected…
GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected after eliminating selfish/malicious nodes. The key feature of LMAR to seek safe route free of selfish and malicious nodes in polynomial time is its searching algorithm and flooding stage that its generated traffic is equi-loaded compared to single-path routing protocols but its security efficiency to bypass the attacks is much better than the other multi-path routing protocols. LMAR concept is introduced to provide the security feature known as availability and a simulator has been developed to analyze its behavior in complex network environments [1]. Then we have added detection mechanism to the simulator, which can detect selfish nodes in network. The proposed algorithm is resilient against collision and can be used in networks which wireless nodes use directional antennas and it also defend against an attack that malicious nodes try to break communications by relaying the packets in a specific direction. Some game theoretic strategies to enforce cooperation in network have been implemented in GTNS, for example Forwarding-Ratio Strategy, TFT-Strategy and ERTFT. This tutorial helps new users to get familiar with GTNS and run different network scenarios.
Other creatorsSee project -
Optical CDMA Network Simulator
-
Optical CDMA Wireless Multi-User Network System includes some transmitters and receivers. In this network, an Optical Orthogonal Code (OOC) is assigned to each user (Tx or Rx) to connect to its equivalent-OOC user and after synchronization between this two equivalent-OOC user, they can send and receive data to/from each other.
In this project, I worked to design and Implement a simulator for Optical CDMA Wireless Multi-User Network. This simulator has eliminated some of practical…Optical CDMA Wireless Multi-User Network System includes some transmitters and receivers. In this network, an Optical Orthogonal Code (OOC) is assigned to each user (Tx or Rx) to connect to its equivalent-OOC user and after synchronization between this two equivalent-OOC user, they can send and receive data to/from each other.
In this project, I worked to design and Implement a simulator for Optical CDMA Wireless Multi-User Network. This simulator has eliminated some of practical problems like number of users can be used by network practically.
OCNS is the name of the simulator for Optical CDMA Networks. I did this project as my BS Project. My supervisor, Prof. Pakravan, suggested me this project in April 2004. In July 2004, I finished the documentation of this project in persian language. I developed OCNS by using Visual C++ software. I've presented the defined classes in my project below.Other creatorsSee project
Languages
-
English
-
-
Farsi
-
Recommendations received
1 person has recommended Farshid
Join now to viewMore activity by Farshid
-
Pioneering physicist Peter Higgs has passed away at the age of 94. The Higgs particle, often called the God particle, is named after the physics…
Pioneering physicist Peter Higgs has passed away at the age of 94. The Higgs particle, often called the God particle, is named after the physics…
Liked by Farshid Farhat
-
خبر دادن درباره بعضی موضوعات اصلا یک ذوق دیگهای داره! 💡 ربات دلیوری دیجیکالا فاز اول تستهاش رو با موفقیت طی کرد!🤖 هم مسیر جدید ما تونسته با…
خبر دادن درباره بعضی موضوعات اصلا یک ذوق دیگهای داره! 💡 ربات دلیوری دیجیکالا فاز اول تستهاش رو با موفقیت طی کرد!🤖 هم مسیر جدید ما تونسته با…
Liked by Farshid Farhat
-
GXO's partnership with Dexterity, Inc. is part of our push to boost productivity through technology. Neil Shelton breaks it down for Supply Chain…
GXO's partnership with Dexterity, Inc. is part of our push to boost productivity through technology. Neil Shelton breaks it down for Supply Chain…
Liked by Farshid Farhat
-
I’m happy to share that I’m starting a new position as Lecturer at UC Irvine!
I’m happy to share that I’m starting a new position as Lecturer at UC Irvine!
Liked by Farshid Farhat
-
With my scientific fathers, my master advisor, Dr. Zain Navabi and my PhD advisor, Dr. Prabhat Mishra. I am grateful for the guidance, support, and…
With my scientific fathers, my master advisor, Dr. Zain Navabi and my PhD advisor, Dr. Prabhat Mishra. I am grateful for the guidance, support, and…
Liked by Farshid Farhat
-
A significant distinction between visual genAI and language genAI is that unlike language gen AI, there is no straightforward way to modify the…
A significant distinction between visual genAI and language genAI is that unlike language gen AI, there is no straightforward way to modify the…
Liked by Farshid Farhat
-
Thanks Nvidia, what a great GTC 310 🚀🚀
Thanks Nvidia, what a great GTC 310 🚀🚀
Liked by Farshid Farhat
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More