Azadeh Faridi
Pompeu Fabra University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Azadeh Faridi.
IEEE Transactions on Vehicular Technology | 2010
Azadeh Faridi; Maria Rita Palattella; Angel Lozano; Mischa Dohler; Gennaro Boggia; Luigi Alfredo Grieco; Pietro Camarda
Supported by IEEE 802.15.4 standardization activities, embedded networks have been gaining popularity in recent years. The focus of this paper is to quantify the behavior of key networking metrics of IEEE 802.15.4 beacon-enabled nodes under typical operating conditions, with the inclusion of packet retransmissions. We corrected and extended previous analyses by scrutinizing the assumptions on which the prevalent Markovian modeling is generally based. By means of a comparative study, we singled out which of the assumptions impact each of the performance metrics (throughput, delay, power consumption, collision probability, and packet-discard probability). In particular, we showed that - unlike what is usually assumed - the probability that a node senses the channel busy is not constant for all the stages of the backoff procedure and that these differences have a noticeable impact on backoff delay, packet-discard probability, and power consumption. Similarly, we showed that - again contrary to common assumption - the probability of obtaining transmission access to the channel depends on the number of nodes that is simultaneously sensing it. We evidenced that ignoring this dependence has a significant impact on the calculated values of throughput and collision probability. Circumventing these and other assumptions, we rigorously characterize, through a semianalytical approach, the key metrics in a beacon-enabled IEEE 802.15.4 system with retransmissions.
international conference on communications | 2013
Luis Sanabria-Russo; Azadeh Faridi; Boris Bellalta; Jaume Barcelo; Miquel Oliver
In this paper a candidate protocol to replace the prevalent CSMA/CA medium access control in Wireless Local Area Networks is presented. The proposed protocol can achieve higher throughput than CSMA/CA, while maintaining fairness, and without additional implementation complexity. Under certain circumstances, it is able to reach and maintain collision-free operation, even when the number of contenders is variable and potentially large. It is backward compatible, allowing for new and legacy stations to coexist without degrading one anothers performance, a property that can make the adoption process by future versions of the standard smooth and inexpensive.
IEEE Transactions on Mobile Computing | 2017
Azadeh Faridi; Boris Bellalta; Alessandro Checco
Dynamic Channel Bonding (DCB) allows for the dynamic selection and use of multiple contiguous basic channels in Wireless Local Area Networks (WLANs). A WLAN operating under DCB can enjoy a larger bandwidth, when available, and therefore achieve a higher throughput. However, the use of larger bandwidths also increases the contention with adjacent WLANs, which can result in longer delays in accessing the channel and consequently, a lower throughput. In this paper, a scenario consisting of multiple WLANs using DCB and operating within carrier-sensing range of one another is considered. An analytical framework for evaluating the performance of such networks is presented. The analysis is carried out using a Markov chain model that characterizes the interactions between adjacent WLANs with overlapping channels. An algorithm is proposed for systematically constructing the Markov chain corresponding to any given scenario. The analytical model is then used to highlight and explain the key properties that differentiate DCB networks of WLANs from those operating on a single shared channel. Furthermore, the analysis is applied to networks of IEEE 802.11ac WLANs operating under DCB–which do not fully comply with some of the simplifying assumptions in our analysis–to show that the analytical model can give accurate results in more realistic scenarios.
IEEE Transactions on Communications | 2013
Ilaria Thibault; Azadeh Faridi; Giovanni Emanuele Corazza; Alessandro Vanelli Coralli; Angel Lozano
This paper presents a new deterministic closed-loop phase-alignment algorithm based on quantized feedback from the receiver for distributed beamforming. In contrast with previously proposed methods, which entailed repeated transmissions from all the nodes in the network, this new algorithm requires each node to transmit only once during the synchronization cycle. This drastically reduces the amount of power consumed to achieve phase alignment, yet the new algorithm converges at least as fast as all other existing schemes. In contrast with previous analyses of distributed beamforming based on random phase updates, where noise had been disregarded, here it is explicitly included in the models and shown to have a considerable effect that cannot be ignored. With and without noise, analytical expressions that characterize the performance of the new algorithm are provided, with emphasis on various limiting regimes of interest.
IEEE Transactions on Information Theory | 2008
Azadeh Faridi; Anthony Ephremides
We investigate the problem of finding minimum-distortion policies for streaming delay-sensitive but distortion-tolerant data. We consider cross-layer approaches which exploit the coupling between presentation and transport layers. We make the natural assumption that the distortion function is convex and decreasing. We focus on a single source-destination pair and analytically find the optimum transmission policy when the transmission is done over an error-free channel. This optimum policy turns out to be independent of the exact form of the convex and decreasing distortion function. Then, for a packet-erasure channel, we analytically find the optimum open-loop transmission policy, which is also independent of the form of the convex distortion function. We then find computationally efficient closed-loop heuristic policies and show, through numerical evaluation, that they outperform the open-loop policy and have near optimal performance.
international conference on computer communications | 2014
Luis Sanabria-Russo; Jaume Barcelo; Azadeh Faridi; Boris Bellalta
Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a distributed MAC protocol for WLANs, capable of achieving greater throughput than the current contention mechanism in WLANs. It does so by changing to a deterministic backoff after successful transmissions, which leads to a collision-free schedule that under ideal conditions can be permanently maintained. This demo shows the first implementation of CSMA/ECA using commercial hardware and OpenFWWF in a realistic network testbed. Results show how CSMA/ECA outperforms the current MAC for WLANs in terms of throughput, even through a permanent collision-free schedule cannot be maintained due to unideal practical conditions.
Computer Networks | 2013
Boris Bellalta; Azadeh Faridi; Dirk Staehle; Jaume Barcelo; Alexey V. Vinel; Miquel Oliver
Wireless objects equipped with multiple antennas are able to simultaneously transmit multiple packets by exploiting the channels spatial dimensions. In this paper, we study the benefits of such Mu ...
Telecommunication Systems | 2014
Jaume Barcelo; Boris Bellalta; Cristina Cano; Azadeh Faridi; Miquel Oliver
This paper introduces a protocol that distributively constructs a collision-free schedule for multi-hop packet radio networks in the presence of hidden terminals. As a preliminary step, each wireless station computes the schedule length after gathering information about the number of flows in its neighbourhood. Then, a combination of deterministic and random backoffs are used to reach a collision-free schedule. A deterministic backoff is used after successful transmissions and a random backoff is used otherwise. It is explained that the short acknowledgement control packets can easily result in channel time fragmentation and, to avoid this, the use of link layer delayed acknowledgements is advocated and implemented. The performance results show that a collision-free protocol easily outperforms a collision-prone protocol such as Aloha. The time that is required for the network to converge to a collision-free schedule is assessed by means of simulation.
Computer Networks | 2014
Boris Bellalta; Azadeh Faridi; Jaume Barcelo; Vanesa Daza; Miquel Oliver
Multiuser Multi-Packet Transmission (MPT) from an Access Point (AP) equipped with multiple antennas to multiple single-antenna nodes can be achieved by exploiting the spatial dimension of the channel. In this paper we present a queueing model to analytically study such systems from the link-layer perspective, in presence of random packet arrivals, heterogeneous channel conditions and packet errors. The analysis relies on a blind estimation of the number of different destinations among the packets waiting in the queue, which allows for building a simple, but general model for MPT systems with per-node First-In First-Out (FIFO) packet scheduling. Simulation results validate the accuracy of the analytical model and provide further insights on the cross-relations between the channel state, the number of antennas, and the number of active users, as well as how they affect the system performance. The simplicity and accuracy of the model makes it suitable for the evaluation of Medium Access Control (MAC) protocols for Ad Hoc or Wireless Local Area Networks supporting Multiuser MPT in non-saturation conditions, where the queueing dynamics play an important role on the achieved performance, and simple user selection algorithms are required.
data compression conference | 2006
Azadeh Faridi; Anthony Ephremides
We investigate the optimum transmission strategy that minimizes the overall distortion for delay-sensitive but distortion-tolerant data. We consider a set of source symbols residing at the transmitter that are encoded into a set of packets using multiresolution source coding. Each packet has a given deadline after which its transmission will be useless. Since multiresolution source codes are being used, the packet lengths can be adjusted by dropping less significant bits in order to allow for the more significant bits of a larger number of packets to be transmitted before the deadline. We find the optimum number of bits that must be transmitted of every packet to minimize the overall distortion when transmissions are error-free. We show that for strictly convex distortion functions the solution is unique and independent of the form of the function, and extend this result to the case where transmitted bits can be affected by noise and find the optimum strategy that leads to the minimum expected distortion. Finally we look at the case where packets arrive according to a given deterministic arrival schedule and present an algorithm that finds the optimum transmission strategy.